last executing test programs: 9m35.399235384s ago: executing program 32 (id=3019): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x20102, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r1, 0x8004745a, 0x2000000c) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r3, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2b, 'pids'}]}, 0xb) 9m35.365653204s ago: executing program 33 (id=3018): sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x109482}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)}], 0x1}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 9m35.344319224s ago: executing program 34 (id=3020): bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0xa, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x1, 0x2, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) gettid() sendmsg$unix(r3, &(0x7f0000000640)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) unlink(0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f00000007c0)='./file0\x00', 0x0, 0x8}, 0x18) 9m35.326923414s ago: executing program 35 (id=3021): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000100850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465cbf188ef10871b81ac7553358380b3a1f59916ffc9bf0bdf81524f07fb2819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6cd87cef9000000a39c15a7ef365cc27dfeac7b9b0e9048517354b0ca4f9cf8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19e9b5381791cbf0ceb42122b8635a66ce6b5b92356081bc0f18a0ca83dbc089a9813c1efa26001b3f486ebfaae85c4d0b96778478ae5355e6f923b11056969f486f80a35f7f2339704fa93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d0000000000000000000000004e1fa60acabcf0553910ca2e5ea499fd5889dde9261f0848a5b8af657bfc96049308e8953431b269053627a1523551c160c813969925a892d266792352ec0204596a37ce8d6d260b32239bddbce2e79f93cb5a0ad897adb53b397d07c50f84b74f2605a565ee149016aa75ea31c008fc6da4fb2e98e5083aa3c0ad0d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@ifindex, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xc, [@volatile={0x4}]}, {0x0, [0x5f, 0x71, 0x10, 0x0, 0x61, 0x30, 0x61, 0x0, 0x0, 0x5f]}}, &(0x7f0000000600)=""/135, 0x30, 0x87, 0x0, 0xf5f5, 0x0, @void, @value}, 0x28) r7 = gettid() syz_open_procfs$namespace(r7, &(0x7f0000000540)='ns/pid_for_children\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0xc, 0x18401, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r6, @void, @value}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x4888, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632f77fbac141411e0000601be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 7m33.128430577s ago: executing program 36 (id=3999): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f00000004c0), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x2, 0x4, 0x10008, 0x1, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4000000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='percpu_free_percpu\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 5m25.053790082s ago: executing program 37 (id=4989): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000200), 0xf}, 0x100001, 0x0, 0x3, 0x1, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xd, 0x4, 0xfff, 0x7, 0x19802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r6, @void, @value=r6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000001c2b79cec3f4fc5c7d001b1c1b07ecb09f40368117d050d34bbecf9c384c9b24acdb7be1d74635f682999cd31679497fa93547e0deb0d0a51ac6a4debcf709b3082ec789c29a44ddaa660b0437e9f2ab94c790563fe043d49abb92efca1ea105a7b0d3f195e509bb8fce513de16d6cf44584f7aeed5f9d4f869ad34f6c21bdfb5d2ce318b2bb1587666344a9fb2befdd55ab9a3f885ef3c7ec1cbca85ab429da68c7a31169c56d6b21fcfd7e36dcb5c9359266a1f20c5181fa1174a3a2cfbe9dee453b4256cdc6cf8b568d55cbf8fe10ea890c62d3d4c408e84dcaddebe201e779ab8d7f14b1e0ff8f4ab6d3267c866710f85f7b87cf6a9c6c2c5e987a3df8210186192bcde25d0a2ce588792e72def1f9f0d9a0454c403b"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) 5m25.030771893s ago: executing program 38 (id=4993): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0xc1f1}, 0x8) close(r2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, 0x0, &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000800)='fib6_table_lookup\x00', r4}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 5m24.986533433s ago: executing program 39 (id=4994): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2401, 0x10000007fe) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x10}, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(r4) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="2a00080000000000000080000000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r5) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 5m24.981095233s ago: executing program 40 (id=4995): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 5m24.969769543s ago: executing program 41 (id=4981): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001640)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={r1, &(0x7f0000000900)="3393813c6e3463c03701577e15401b91f578d307a03040804ae430d494a66fcbc6c21c2d0b2a6294e4fb0af2ff6fbf80084a1fcbc3223a805f48333e9d25062d0c50e0e0646a77f1e049449335a8cb64c7013998e54c01f84004d8f531c722a2519368a613c949694bbd6b", &(0x7f0000000980)=""/146}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="170000000000000004000000ff0000000000000048662331e1d80e2ee02020bfd741667f627012ff07a5c9a065971085d2ad70192e052831b2f80248712583e20e663a7f63a039add80a1377020871ac417ca5972508df4ce3fdbcac1916b404bfbb8e8a388a4f02e1", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES8=r4, @ANYRESDEC=r2], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) recvmsg$unix(r7, 0x0, 0x2020) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000580)={r6, &(0x7f0000000780)="8ba9a3401165d4010d0ac46ca880f1df74ad278b3324d82b2867836c5819e59261d115359a94f05092957843208aef792a1e0bbef5cea8600331f3c8fd8193c358c85bc75fd853abfe058c5d5f7492dbdbe36d2ce96e2b2c017513b393fa75fcabf455f3"}, 0x20) r8 = gettid() perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0xf7, 0x0, 0x5, 0x0, 0x4, 0xaa0e0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x2, 0x4}, 0x9000, 0x4, 0xffff7fff, 0x4, 0x401, 0xfff, 0x4b, 0x0, 0x3, 0x0, 0x2}, r8, 0x1, r4, 0x8) syz_open_procfs$namespace(r8, &(0x7f0000000400)='ns/time\x00') r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001880)=ANY=[@ANYRESHEX], &(0x7f0000000840)=""/182, 0xbf, 0xb6, 0x1, 0x7, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="03010000040000b9040000000a00002000000000", @ANYRES32=0x1, @ANYBLOB='z\v\x00'/20, @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="03000000010000000500"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb01f828d6cfe7bfc3d71d9dc740750018000000000000000c0000000c0000000200000002"], 0x0, 0x26, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89a0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a1, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 5m3.928596392s ago: executing program 42 (id=5228): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf090000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000200), 0xf}, 0x100001, 0x0, 0x3, 0x1, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xd, 0x4, 0xfff, 0x7, 0x19802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r8, @void, @value=r8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x10) 4m59.100678875s ago: executing program 43 (id=5296): bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x0, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000}, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xbe66c98086e31622}, 0x42, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xfffffe0000000002, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0, 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000006c7c2700000c0000000cee8948c0df1acb0a00000000000009000000000000000000"], 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000a40)='ns/uts\x00') (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x4, 0x80, 0xa6, 0x3, 0x81, 0x95, 0x0, 0x5, 0x20400, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x18c3, 0x2, @perf_bp={&(0x7f00000004c0), 0x9}, 0x81d1, 0x5aea, 0x0, 0x3, 0x400, 0x200, 0xd0, 0x0, 0xfc38, 0x0, 0xffffffffffffbee3}, r4, 0x7, 0xffffffffffffffff, 0x5) (async) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0x3, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7eebd673}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 3m15.657645805s ago: executing program 2 (id=6265): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, 0x0, 0x0) recvmsg$unix(r0, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2e, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0xa9, @void, @value, @void, @value}, 0x48) 3m15.630086755s ago: executing program 9 (id=6268): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f00000002c0)=""/129, 0x0, 0x81, 0x0, 0x0, 0x0, @void, @value}, 0x20) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc0a00e9bfde908990817b364e51afe9c81a97f0570759f1cae63487ff68fffffffffffe8e3932e2b7185a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba75411890700000000000000d8e5b1dc91c5499bea0977"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xd00, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x45}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 3m15.574726335s ago: executing program 9 (id=6270): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 3m15.573033335s ago: executing program 2 (id=6271): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0xf6ffffffffffffff) 3m15.572595245s ago: executing program 2 (id=6272): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0xb7, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x54, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz1\x00', 0x1ff) (async) mkdirat$cgroup(r3, &(0x7f0000000280)='syz1\x00', 0x1ff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}]}}, &(0x7f0000000b80)=""/230, 0x32, 0xe6, 0x1, 0x0, 0x0, @void, @value}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) syz_clone(0x40803000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800084}, 0xfffffffffffffea9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800084}, 0xfffffffffffffea9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x9, 0x0}, 0x8) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r8, 0x3, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r9, 0x58, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c00)={r10, 0x400}, 0xc) (async) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c00)={r10, 0x400}, 0xc) close(r11) ioctl$TUNSETOFFLOAD(r7, 0x40047451, 0x2000000c) (async) ioctl$TUNSETOFFLOAD(r7, 0x40047451, 0x2000000c) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) syz_clone(0x48000000, &(0x7f0000001340)="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", 0x1000, &(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000640)="ee1eaf2b91d78d950986b1e88f1e93c9fecc3e1014145a936a470a549f74744368524d083da2be7ef452ca4f5be8ece94b397259743887b2bee0f408d15c9d190b9c526b3aedaabbfdf4479d60fbb1d3082c88bca968e492d932a8934ba24696b4ce6bb5ee7144996ca0a685c74d30aac5a5f5a90b9f03bcd7c70535d1ab0985f92dc342b390913b5a19c903ac5e82fd52862a21c8ec44ad4756fedc8be5931bc975067603856909ddc24b29dd2fc38267aaa9e1e79d549caaa7f35074a154c022215d1b601f47f4054b613ff868") (async) r12 = syz_clone(0x48000000, &(0x7f0000001340)="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", 0x1000, &(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000640)="ee1eaf2b91d78d950986b1e88f1e93c9fecc3e1014145a936a470a549f74744368524d083da2be7ef452ca4f5be8ece94b397259743887b2bee0f408d15c9d190b9c526b3aedaabbfdf4479d60fbb1d3082c88bca968e492d932a8934ba24696b4ce6bb5ee7144996ca0a685c74d30aac5a5f5a90b9f03bcd7c70535d1ab0985f92dc342b390913b5a19c903ac5e82fd52862a21c8ec44ad4756fedc8be5931bc975067603856909ddc24b29dd2fc38267aaa9e1e79d549caaa7f35074a154c022215d1b601f47f4054b613ff868") write$cgroup_pid(r4, &(0x7f00000004c0)=r12, 0x12) (async) write$cgroup_pid(r4, &(0x7f00000004c0)=r12, 0x12) 3m15.386599606s ago: executing program 4 (id=6275): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000001c80)=ANY=[@ANYBLOB="1800000032d474c2b507b9e2e0825afec231000000ffff000000000000009500000000925c4a"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001d00)='rpm_return_int\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001f40)=ANY=[@ANYBLOB="0200000005000093652f24eac2007200000000001a6c2ae929a7d449f1d78ca8b2c58aa9b01e45bc21ff28589ac5817328e0a1360b85104f7631da862fe12945c9db90ee0cdc8bd2b8d0ad9b35bab5ce8000e1e724276f7a6616e13002ecd6ea5df0655740ee693db30321f9c0b6ca79bf1c793630a2dcfc20633a801ce13c07a757f62418ef6d5dd4184deef6f71a54", @ANYRES32, @ANYBLOB="00000000fdebffffff06000000000000000000803e207f7979e4521e4d33e99f0de2fe3237016dbba6baa4ca5629ea4d4ffb535e8e487fe212f27cd5d621530da12abe39f2fefbf1023c4977d56409f3b074a1188322d646d78f957536021c1b6cf908460044e5905a7f355fdfbc26e96c91ae69e932615db290f3a99ef8", @ANYRES32=0x0, @ANYRESHEX=r0, @ANYBLOB="0000000000000000000000000000000000000800007bb560df086d0b0fca2eba2c4da96917059d4e3e2299be652bdcda7e99825d75562d34e3da40034fb170710500290fbf0250c5e46b193e1542205ae3f1706eeecc1161d5337d0ccb70f3a7d9882a545cd3c6"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001000)={&(0x7f0000001cc0)='devlink_health_recover_aborted\x00', 0xffffffffffffffff, 0x0, 0xb2}, 0xfffffffffffffcb5) perf_event_open(&(0x7f0000001c00)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc01, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)}, 0x1f00) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 3m15.254092826s ago: executing program 4 (id=6277): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_clone(0x5000000, &(0x7f0000000680)="8892946557dd07ba7237c63e895f616ec7c6655aa4b6e506ac1fa868faf653c715d149d3a62e1424fc24dd03218a7771dbf099a64d227440bf4bf7e8668961e5ca7dc75714b51d47ab06505a601399ebe8955a8e556c228f9703653e074a33046822ee322793d2d8dcbc1dd4309d8ab146c624f65489c74c72dcf76092222abe44a79385b174d00a0b9fdef44ccd344949771a7d911dde9eb400d8d3a9cddad0f8d1715a211ca8ef179c2deb995fe8b761a901b56e87011db8ccc1b740960645ee6a14a8115d9f4fff7edf5b972c343ce0a33d510b166d86d9807d6fa87cce209343be90b8a3e91da1", 0xe9, &(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)="81e00b7dfa238a8d480fc3dff47bb11e864b54fa2b9b250f2b7f97c38058ebfc1b994db57f10c5003d04fcc745249a4c0bcc6c5ffc2d9a28") r3 = syz_clone(0x80000, &(0x7f0000000840)="0929e8540b85a462300dd022b2dac6178c490463c8de84916236e91c58f6fac840a6e0066db217a0665d119ddcce7a99bc475788da83ff995567188be0efaf638706af8486f82abad38a7c74c20725970b4b77982dfe7af0c534428f841372a3907c5a40de849cf1892f74d2ae9e7f39350f309e1408f3ada44ee07dcdc37239a9971971c366a4b57e1dfa9e013a5e606a4d759b885e3fc2d3afd39e98eabf99493e5a1e7e7395b1a052e47daa44734c8e74d34f5dd6a29ab484edbd010e0c22e9f9de19c6e873", 0xc7, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f163bce763271ea7d3cbc813da75ce8b3720d7c5a24565e5b8b81300ccc798de5155c0bda900871b9d8ccaf2c7c8485ad7d90a166145fd212b6a3dc270c2a3ed49f0977fb36f1044437469f5d0adefb264b764da531fac8175d297f72e3661991ca920e2967f5929af6ea76cc757ce866c0a30") r4 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000a40), 0x2, 0x0) r5 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000a80), 0x8) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000ac0), 0x4) r7 = syz_clone(0x2000, &(0x7f0000000b00)="ca6c3977528c463086807d2a9c9aa1f40fc45bdde095babb2e7dca90d79561cd808a29911d2e0d10b392debb737d8c368dcd9287d238fb04b38f3e06e4567eed41275e6da4c0b8f8be42a39b89eaeca86c0aa05b871a7b56fb0d90a9307e9fa3be24ecc135dcbcebd26edb379eb72039729a21985b5052d7de05652ad53d2d527d553c30cf88837f6c327879a5439742507b1c4ef4ca0a7f8582e2c4a2b606ffc40b70df99", 0xa5, &(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)="4f45b232bca361f6ec6c610086979735333328df41436dee62ecb926dd08cf7e") r8 = gettid() sendmsg$unix(r1, &(0x7f0000000d40)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000005c0)=[{&(0x7f00000000c0)="2809a60bf40f2e7ccd26db399cd381318b4c50b7dc62737f9238afc870fd35a852fd4a49a7309fe26103d10ac72042d55b8767ce9dcfe52d9e59df9366d192c5a8c5faa788c7bdc94355c6cdac2034f90097ea64", 0x54}, {&(0x7f0000000140)="32cecc8fb119a0c25bdc8cf3135d744bad5a18c7064076c05de4154959560c4b94f04f3ec4c65e59b002714c10e832329d9b2ee71aeeec7347b81e53a2cc465c1ea8805577ba3cc007045263c1305f5dba4995374b152b8214c662", 0x5b}, {&(0x7f00000001c0)}, {&(0x7f0000000200)="3fc2f5fa999a7f8db6c2baacea0aee75c1edfff4bbc8be25a15d9c28006c2a5ab3e8665a370c384a5750d02e3bf02930affe90ec644a4cd1f4084c2fb15e687df43d70dc4fa896962519de0342331996ac92b1819c316f1158a30dd237ee16dbd7185131e3264875e0e7", 0x6a}, {&(0x7f0000000280)="7ecaca59b13aafa33c2fe79f37c14d2d3205593e8a4d7f1af0e4b81969640212bc345f3c93a3585f5acb44058db951ab11bd9493", 0x34}, {&(0x7f00000002c0)="bf37d6acb61639c3c9ee1667f521cd6cf26cf29198b6f38e337f4ad588f9d3f5bb309a222fe1f91318adc462451dadf627de2afeedf8e71b72cbc6651b1db0c1be95cf983b5b2a6ca22fed6dbecfb234ea", 0x51}, {&(0x7f0000000340)="ec7feaa6396f62f949eaae97856d31446aa3cd7726cc2017ef108055aa838f1d09583ca00e946a9597e5c73bdce37517258681938d383deabd49b748b96b8f5ce0edf598375138dec0c57f097889e002e4d6fcea00cc42908e379ef336998e8b568b47af7348e21210a13db98a48fa4b8e8e6ee96f9977305bf7fc43602188ede0e3eaf175a0a861044f12ac84f202d599c852d06216f0cc8b03b3f7c8acae8729eb1eeb89c73a30b2ace896fda0aff34dac99ae61da8d8aba6e783024416862f907ce15263c6da99fa5e93e6a2714448ee3ff9bbfd261acd859049a15fe06f6aa", 0xe1}, {&(0x7f0000000440)="e3fdda63bb25b114c7b9a3d2c4e89f70e230950abbe2ea5ce1f38fcf2f26bfa37dfe61bc3a4d80cbd4acf0a96de093471b841cbd1210f1ee0d45cb155ab4fd2484716010662ed446b30433918f566924d2403105c37e00b5284f2a2e3678284ddae956e66b13c07284797393ae44ae26f7950c8274f8119534fa9da7658c4156ce1b3782528332388db626444e103731b961bda3ff10", 0x96}, {&(0x7f0000000500)="486d9ca82ab66f569af42a19c252334f986bdf3eb11126e19ed0585f943b77f7d1c4f6dde5f7042eca93e409fce0039f5f43d4a108ee601fa25de6c3642e84c76cb108975b7ed19c77b565a30c9f5c576db6494a4b6b0394f007c75ad9548d7a990fb47c4f312dcdc42ca03626d91e8afab71f5f0e99c353175d16f65e7e106e93", 0x81}], 0x9, &(0x7f0000000c80)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee01, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [r4, r5, r6, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0x0, 0xee01}}}], 0xb8, 0xc010}, 0x4000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000e00)={{0x1, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)='%-010d \x00'}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000f00)={r9, &(0x7f0000000e40)="6111c4c252d58cdf86ee99080b8c4a057b1574df64d8bf758fb8f93f52debbf8d8cc02c2bf1ba8fed5e8d56d4087ef2fc60927d36657d5ed8ee30411b482d5b7225057fc81adb4669c0d2221684c5c26510424121feebf31d518072faa6bdc000e0b9a8749941b7ebf82427acf8877ba82b0f54017cfe6037830e9e3d519b179e0f1298b8ea6"}, 0x20) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000f40), 0x4000, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000f80)={'vxcan1\x00', 0x8000}) recvmsg(r0, &(0x7f0000003200)={&(0x7f0000000fc0)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000002040)=""/99, 0x63}, {&(0x7f00000020c0)=""/4096, 0x1000}], 0x3, &(0x7f0000003100)=""/255, 0xff}, 0x10000) r11 = perf_event_open(&(0x7f0000003280)={0x4, 0x80, 0x8, 0x78, 0x7, 0x7, 0x0, 0x800, 0xc1064, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000003240), 0x4}, 0x0, 0xfff, 0xfffffffd, 0x0, 0x1, 0x1, 0x225, 0x0, 0x7d, 0x0, 0x2}, r8, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r11, 0x4008240b, &(0x7f0000003300)={0x1, 0x80, 0x9, 0xc, 0x0, 0x1, 0x0, 0x9, 0x30882, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x6, 0x7fffffff}, 0x1801, 0x3, 0xc77e05b, 0xf, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, 0xfffffffffffffff8}) ioctl$TUNSETNOCSUM(r10, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r11, 0x2405, r11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000003400)={r9, 0x58, &(0x7f0000003380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000003440)=@base={0x5, 0x1, 0x0, 0x1000, 0x50208, r9, 0x1000, '\x00', r12, r6, 0x3, 0x5, 0x4, 0x0, @void, @value, @value=r5}, 0x50) r14 = openat$cgroup(0xffffffffffffffff, &(0x7f00000034c0)='syz1\x00', 0x200002, 0x0) r15 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003800)={0x18, 0x12, &(0x7f0000003580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x8, 0x3, 0xb, 0x9, 0x2}, @func], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000003640)='syzkaller\x00', 0x3, 0x80, &(0x7f0000003680)=""/128, 0x40f00, 0x48, '\x00', r12, 0x0, r6, 0x8, &(0x7f0000003700)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000003740)={0x2, 0xc, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000003780)=[r9], &(0x7f00000037c0)=[{0x0, 0x2, 0x4, 0x7}, {0x1, 0x4, 0x8, 0xc}, {0x0, 0x5, 0x6, 0x9}, {0x4, 0x5, 0x0, 0xb}], 0x10, 0x6452, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000038c0)={&(0x7f0000003540)='fsi_master_aspeed_opb_read\x00', r16, 0x0, 0x4}, 0x18) write$cgroup_pressure(r16, &(0x7f0000003900)={'full', 0x20, 0x9, 0x20, 0xfff}, 0x2f) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003f00)={r15, 0xe0, &(0x7f0000003e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000003c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000003c80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000003cc0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x6f, &(0x7f0000003d00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000003d40), &(0x7f0000003d80), 0x8, 0xc1, 0x8, 0x8, &(0x7f0000003dc0)}}, 0x10) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000004000)={0x6, 0x2a, &(0x7f0000003940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@generic={0x6, 0xf, 0x7, 0x1, 0x55e}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6e88225b}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xc72}, @generic={0x0, 0x1, 0xd, 0x1, 0x100}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000003ac0)='GPL\x00', 0xfffffffd, 0xdf, &(0x7f0000003b00)=""/223, 0x40f00, 0x0, '\x00', 0x0, @xdp, r6, 0x8, &(0x7f0000003c00)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, r18, r16, 0x6, &(0x7f0000003f40)=[r13, r9, r9], &(0x7f0000003f80)=[{0x3, 0x3, 0x10, 0x9}, {0x2, 0x1, 0xa, 0x4}, {0x917, 0x5, 0xc, 0x7}, {0x3, 0x4, 0x6, 0x8}, {0x0, 0x4, 0xb, 0x4}, {0x2, 0x1, 0x3}], 0x10, 0x2, @void, @value}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000004100)=@o_path={&(0x7f00000040c0)='./file0\x00', r13, 0x4000, r14}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000004140)={r19, r13}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000004340)=@bpf_tracing={0x1a, 0x10, &(0x7f0000004180)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @ldst={0x3, 0x3, 0x6, 0x5, 0x9, 0xffffffffffffffe0, 0x8}], &(0x7f0000004200)='syzkaller\x00', 0x1000, 0x0, 0x0, 0x41100, 0x60, '\x00', r17, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x8461, 0xffffffffffffffff, 0x4, &(0x7f00000042c0)=[r13, r9, r13, r9, r13, 0xffffffffffffffff, r9], &(0x7f0000004300)=[{0x0, 0x5, 0xe, 0xc}, {0x3, 0x5, 0x9}, {0x1, 0x5, 0xc, 0xa}, {0x2, 0x2, 0x6, 0x9}], 0x10, 0x10000, @void, @value}, 0x94) 3m14.760930409s ago: executing program 9 (id=6279): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7ffffffd, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x60002080, 0x0, 0x60, 0x0, 0x0, 0x0) 3m14.675782629s ago: executing program 2 (id=6280): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000e000001000000000400000007010000080700007500fcff0000000095000000d3031a00041f8ea47c2eb2b7639c2ad3a4c89eb40634ab9b5ade7978eb59ff70cd62adbe9c31865cf39dc9e93813d9433f34dad576b1897b3533f883f9e873d9c435ab89afdd4ff0c24c0053f1721e9dc694f461734e10ea76584696317ca540336bc0e60e7d6d44484e01102b1c830d2630c3932755946ba8848b0d93caec1f4d89f99dcd2e9cb4d3646bc48d7ece5cbb87cdd67955cf5c813c05411a276d6afe065ac5849c64aebf30294fc59168bcb9a25164a1826a81cf45e576ef4dd94e292cbbf69d0787fa4b596ce132d7e976b136871cebb77ad2e34ffcf52557e6a0403769815ed13ca7b6c9f2fd7d11461997a57b35715cee9809008af9df0690f5d42d2e0f2d967aa4bc96a7d4b343411ef4d962699ffc5c434cf53339430fe9d668405875e14bea5c4aea70b9de7b9fb36561bdc896a0cc666f0d9b49832984ed9effda637edfb97defbd3219055f5a7ee877c79ec93133f0109e9746acd0cba749390a9b575a129f1838688c21ea8db8"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x10000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, 0x0, 0x0}, 0x20) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0xb, &(0x7f0000002380)=ANY=[@ANYRESDEC=r2, @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={0x0}, 0x10) socketpair(0x18, 0xa, 0x3, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000006fd60000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x3327172531b9be1a) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="560a000000000000611118170000000018000000000000000000000095000000000000001295dc8b8bf90b7a9f81b0f74a0c2bbb2623e98e814c14b9a978f6ca558c8ebd178212dfae201f37be6946ac48d34a47a724de2c459950ef24bd1b49641a32fd34cc925d69a3ead4fb0dd768fb0f638a2f7072f285edd939f05115e0f13524e02854"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000400000000801f0000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d0000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffd5e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x800000000, r0, 0x0) 3m14.58818867s ago: executing program 9 (id=6282): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r2) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803e}, 0x0) 3m14.52074891s ago: executing program 5 (id=6283): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd, @generic={0x2c}, @initr0, @exit, @alu={0x6, 0x0, 0xa}, @printk={@x, {}, {}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, 0x0, 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3m14.398935091s ago: executing program 9 (id=6284): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={0xffffffffffffffff, r0}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x7e1c01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x11, 0x3, 0x0, &(0x7f00000001c0)) sendmsg$inet(r6, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r7, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071113b00000000008510000002000000850000006b00000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 3m14.389342031s ago: executing program 5 (id=6285): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 3m14.254719651s ago: executing program 4 (id=6286): r0 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)={[{0x2b, 'hugetlb'}, {0x2d, 'cpu'}, {0x2b, 'net_cls'}, {0x2b, 'rdma'}]}, 0x1d) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000015c0)={r1, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x34f, 0x0, 0x5f8, 0x0, &(0x7f0000000580)="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", &(0x7f0000001580), 0x5, 0x0, 0xff}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, 0x0, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff000000}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x80ff, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 3m13.876909743s ago: executing program 5 (id=6288): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={0x0, r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b0000000700000001000100080000000100"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 3m13.355772756s ago: executing program 4 (id=6289): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102033a00fe08000e40000200875a65969ff57b00ff0200000000010000000001ffaaaaaa"], 0xfdef) 3m13.351857805s ago: executing program 5 (id=6290): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8949, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 3m13.292272936s ago: executing program 4 (id=6291): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='mm_page_alloc\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 3m13.291934276s ago: executing program 5 (id=6292): socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb704000008000000b703000000000000850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0xc) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f4, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfe3a) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000080)) 3m13.261703426s ago: executing program 4 (id=6293): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0xa, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000e4c600000000002e04740a72ae421d9ca809d3a2000400"/41], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth1_vlan\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8b0f, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8931, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 3m13.067199867s ago: executing program 2 (id=6295): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd, @generic={0x2c}, @initr0, @exit, @alu={0x6, 0x0, 0xa}, @printk={@x, {}, {}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, 0x0, 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3m13.065948057s ago: executing program 2 (id=6297): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000200), 0xf}, 0x100001, 0x0, 0x3, 0x1, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xd, 0x4, 0xfff, 0x7, 0x19802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r7, @void, @value=r7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) 3m13.063841737s ago: executing program 9 (id=6298): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000002) write$cgroup_subtree(r4, 0x0, 0x2000fdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 3m13.063369577s ago: executing program 5 (id=6299): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0xc8, 0x0, 0x8, 0x0, 0x8106, 0x0, 0x0, 0x98}, 0x0, 0x0, 0xffffffffffffffff, 0x8) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007290000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280), 0x6e, &(0x7f0000000200)=[{&(0x7f0000000440)=""/153, 0x99}, {&(0x7f0000000500)=""/205, 0xcd}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x3}, 0x10023) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2c000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m39.213867597s ago: executing program 44 (id=6296): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)='%pB \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)=@o_path={&(0x7f0000000580)='./file0\x00', r2, 0x4000, r1}, 0xfffffffffffffe7e) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r5, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) close(r6) 2m39.212194117s ago: executing program 45 (id=6297): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000200), 0xf}, 0x100001, 0x0, 0x3, 0x1, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xd, 0x4, 0xfff, 0x7, 0x19802, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r7, @void, @value=r7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000001c2b79cec3f4fc5c7d001b1c1b07ecb09f40368117d050d34bbecf9c384c9b24acdb7be1d74635f682999cd31679497fa93547e0deb0d0a51ac6a4debcf709b3082ec789c29a44ddaa660b0437e9f2ab94c790563fe043d49abb92efca1ea105a7b0d3f195e509bb8fce513de16d6cf44584f7aeed5f9d4f869ad34f6c21bdfb5d2ce318b2bb1587666344a9fb2befdd55ab9a3f885ef3c7ec1cbca85ab429da68c7a31169c56d6b21fcfd7e36dcb5c9359266a1f20c5181fa1174a3a2cfbe9dee453b4256cdc6cf8b568d55cbf8fe10ea890c62d3d4c408e84dcaddebe201e779ab8d7f14b1e0ff8f4ab6d3267c866710f85f7b87cf6a9c6c2c5e987a3df8210186192bcde25d0a2ce588792e72def1f9f0d9a0454c403b"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) 2m39.199668197s ago: executing program 46 (id=6298): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000002) write$cgroup_subtree(r4, 0x0, 0x2000fdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 2m39.186082347s ago: executing program 47 (id=6293): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0xa, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000e4c600000000002e04740a72ae421d9ca809d3a2000400"/41], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth1_vlan\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8b0f, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8931, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m39.158117747s ago: executing program 48 (id=6299): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0xc8, 0x0, 0x8, 0x0, 0x8106, 0x0, 0x0, 0x98}, 0x0, 0x0, 0xffffffffffffffff, 0x8) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007290000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280), 0x6e, &(0x7f0000000200)=[{&(0x7f0000000440)=""/153, 0x99}, {&(0x7f0000000500)=""/205, 0xcd}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x3}, 0x10023) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2c000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1m2.702204663s ago: executing program 3 (id=7165): openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r3, &(0x7f0000000300), 0x20000000}, 0x20) close(r1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) 1m2.682451913s ago: executing program 3 (id=7166): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x11, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1m2.664225003s ago: executing program 3 (id=7167): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500210000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1m2.573650044s ago: executing program 3 (id=7168): r0 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)={[{0x2b, 'hugetlb'}, {0x2d, 'cpu'}, {0x2b, 'net_cls'}, {0x2b, 'rdma'}]}, 0x1d) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000015c0)={r1, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x34f, 0x0, 0x5f8, 0x0, &(0x7f0000000580)="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", &(0x7f0000001580), 0x5, 0x0, 0xff}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, 0x0, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x80ff, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1m2.333209175s ago: executing program 3 (id=7170): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x4, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x1, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x37}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) write$cgroup_int(r8, &(0x7f00000001c0)=0x8200000000000000, 0xfffffdef) write$cgroup_devices(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="20f277000000000000"], 0x9) write$cgroup_int(r8, &(0x7f0000000240)=0x100000000, 0x12) 1m2.072170156s ago: executing program 3 (id=7173): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r5) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f00000004c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r6}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) 1m1.766607398s ago: executing program 49 (id=7173): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r5) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f00000004c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r6}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) 4.504600578s ago: executing program 0 (id=7852): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffff8000, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 4.324091339s ago: executing program 0 (id=7854): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000a7000000a7000000090000000d0000000000000e0500000001000000010000000000000100000000230019050900000000000006040000000000000000000008050000000e0000000500000f030000000500000008000000ffffffff030000000900000014000000050000000e1a00000140000001000000000000000180000003000000010100001db500008a74770e00ebffffff000800000000040000000000000700000000070000000000000b0500000000005f30610000613000"], &(0x7f00000008c0)=""/147, 0xc9, 0x93, 0x1, 0x9, 0x10000, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a0000230101000021d6b136cc00010001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000009437000091b910000000000b00"/26, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000280)={r3, 0x0, 0xd3, 0x0, &(0x7f0000000b00)="ae882fc72b6c91ba2fe6b7983047011196e2dba653f2aab020550f1e30a76d85089314c97a0db49455ab536df69f77281775226c469bef8954f548d775223f771d310ffb1fe7aadfe55431f4a1a0ed5557482f030c3eedbbfaed6629f67f91c29dc39e55a7ee98673bf9c7a5398f3bac6324f9a58b9ca05020a2c0295cfe1631689931ce9c763e766b0eb9c7a0e088c5a2920338f832a178eed47901fddffc6760b8bad9165b5170494bbed99ef9ab670ab3726ece41f4e2817c370e16c810aff28eb08e71830eb6fc3059e500226152209489", 0x0, 0x4, 0x0, 0xcb, 0x0, &(0x7f0000000c00)="d40a55b1bf0f8eb5d410e6490a39ad3ba8c4cfc33c6e9a7a1fb864dfac591198cfc785f860eb032cff72572307e03e7e9d45a01fc4154b4315ba1641420a796d03ba866e46845bdc7d1315fc797b218e57e84b6112e26312617e04030149fd981d352c3d0472bc1ac704c33c1742e2e60a2fa7de61da15ac9467d2181ca173c9218b1d76d034ac9a0bf4397ae827e3c1d93b87440ae68bc3f84f50eece3ac28a888b4a329598d05d6e889626f8501424be1fad44f45d01081c76416829af3e52006d5f6c54e34a7d0a5472", 0x0, 0x2, 0x0, 0x10}, 0x50) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd9d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4.09117192s ago: executing program 0 (id=7861): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) 3.968659621s ago: executing program 0 (id=7862): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x292000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'team_slave_0\x00', 0x8000}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000b000000de20983c2e677237f47c8db7bf16ed3fc73409ac43d02f6d8147527aba4822caaa03f279c919992e4f00000000000000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 3.097858245s ago: executing program 0 (id=7869): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x11, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3.005230805s ago: executing program 0 (id=7873): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(r1, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000880), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r5, 0x0, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x61, 0x2e, 0x2e]}}, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r0}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) 1.605052132s ago: executing program 6 (id=7901): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1.554481792s ago: executing program 1 (id=7904): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x2, 0x0, 0x7, 0x80, r0, 0xc6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x9, @void, @value, @void, @value}, 0x50) socketpair(0xb, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r5 = getpid() write$cgroup_pid(r4, &(0x7f00000001c0)=r5, 0x12) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x82400, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000240)={'ip6_vti0\x00', 0x2}) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r5, r7, 0x0, 0xd, &(0x7f00000002c0)='cgroup.procs\x00'}, 0x30) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000340)={'ip6gre0\x00', 0x1000}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f00000003c0)={0x7, &(0x7f0000000380)=[{0x9, 0x18, 0x6, 0x6}, {0x3, 0x3b, 0x9e, 0x4}, {0x0, 0x0, 0x38}, {0x6, 0x5, 0x3, 0x8}, {0x187, 0x3, 0x8, 0x4}, {0x7, 0x2, 0x0, 0x5}, {0xa, 0x2, 0x32, 0x6674}]}) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x23, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd2}, [@exit, @alu={0x4, 0x1, 0x4, 0x5, 0x5, 0x100, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x50}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4e14}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xc}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @generic={0xff, 0xe, 0x2, 0xff0c, 0x2}]}, &(0x7f0000000580)='GPL\x00', 0x2, 0x35, &(0x7f00000005c0)=""/53, 0x41100, 0xe, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000600)=[r0, 0x1, r1, r1, 0x1, 0xffffffffffffffff, r0, r1, r1, r1], &(0x7f0000000640)=[{0x0, 0x5, 0x2, 0xa}, {0x1, 0x3, 0x8, 0x6}, {0x2, 0x3, 0x9, 0x4}, {0x1, 0x5, 0xb, 0x4}, {0x4, 0x1, 0x7, 0x6}, {0x4, 0x2, 0xa, 0x4}, {0x3, 0x5, 0xa, 0xa}], 0x10, 0x8000, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000780)=r8}, 0x20) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0x13, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3e}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000000900)=""/29, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xd, 0xff, 0x6}, 0x10, 0x1e7f0, 0xffffffffffffffff, 0x4, &(0x7f00000009c0)=[r3], &(0x7f0000000a00)=[{0x3, 0x4, 0x3}, {0x4, 0x5, 0xd, 0x1}, {0x7, 0x4, 0xd, 0xc}, {0x1, 0x1, 0x3, 0xc}], 0x10, 0x7, @void, @value}, 0x94) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000b00)=r10) gettid() r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x11, 0x16, &(0x7f0000000b80)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xff}, @map_fd={0x18, 0xc, 0x1, 0x0, r0}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x50000}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x4, 0x0, 0x5, 0x8, 0x7, 0x2, 0x8}], &(0x7f0000000c40)='GPL\x00', 0xf, 0xe2, &(0x7f0000000c80)=""/226, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000d80)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000dc0)={0x4, 0xa, 0xa, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000e00)=[0x1, r1, r1, r9, r9], &(0x7f0000000e40)=[{0x5, 0x3, 0x2, 0x2}, {0x5, 0x5, 0xc, 0xb}, {0x0, 0x5, 0x6, 0x4}, {0x3, 0x4, 0x2, 0xc}, {0x5, 0x5, 0xb, 0x7}, {0x2, 0x1, 0xf, 0x7}], 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f80)={&(0x7f0000000b40)='rxrpc_resend\x00', r11, 0x0, 0x7fffffffffffffff}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000011c0)={r0, 0x58, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001280)={r6, 0x58, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r2, &(0x7f0000001480)={&(0x7f0000000fc0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001100)=[{&(0x7f0000001000)="f87c33c3ffafcd18f3550c71864e32906a2c5628b1d6e42c725364582a5cab7fdc7e6e0b81c3568de6814cff2bb34dc9815de223e2535ac900d10d73747a7b8a21473d699e06a25b008675aa78dceaf3064145fb509baf2847bd45f277395ba8f8dcc62a00b843f5d1a11f6ba5e488b31f2fa6ef611fd3c16e75433b73e076a44daf11ab8b9065015f37f37352f83c1c6152edd4fef5c73fae7b50d0334cee059263ae5268f5a8ea7fd2a55787287f80932b096625f76c29ef8d522b0330d35e529a7fbc86ee52e0269f4949a2700d57f7655679cc52d921", 0xd8}], 0x1, &(0x7f00000012c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r12, @remote, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xb6}}, @ip_tos_int={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@noop, @noop, @rr={0x7, 0xf, 0x56, [@remote, @broadcast, @loopback]}]}}}, @ip_retopts={{0xc8, 0x0, 0x7, {[@timestamp_addr={0x44, 0x54, 0x54, 0x1, 0x3, [{@empty, 0x1}, {@private=0xa010101, 0xcc}, {@private=0xa010102, 0x750}, {@dev={0xac, 0x14, 0x14, 0x15}, 0x28000000}, {@local, 0x7}, {@private=0xa010101, 0x4}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x6}, {@loopback, 0x7f}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7f}, {@remote, 0x2}]}, @timestamp={0x44, 0xc, 0xf8, 0x0, 0x1, [0x6, 0x1]}, @end, @timestamp={0x44, 0x10, 0x36, 0x0, 0x5, [0x3, 0x2, 0x2]}, @timestamp_prespec={0x44, 0x24, 0x8c, 0x3, 0xf, [{@empty, 0x7}, {@local, 0x7}, {@loopback, 0x6}, {@broadcast, 0x8b1}]}, @ssrr={0x89, 0x13, 0xee, [@multicast1, @dev={0xac, 0x14, 0x14, 0x28}, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast]}, @ssrr={0x89, 0xb, 0xb1, [@private=0xa010102, @loopback]}, @end, @ra={0x94, 0x4, 0x1}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @local, @multicast2}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@lsrr={0x83, 0xf, 0x85, [@loopback, @private=0xa010100, @private=0xa010100]}]}}}], 0x1b0}, 0x4018) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000014c0)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r6, 0x800454e0, &(0x7f0000001500)=r14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001580)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001740)={0x80000000, 0x0}, 0x8) r16 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001780)={0x2, 0x4, 0x8, 0x1, 0x80, r14, 0xffffffff, '\x00', 0x0, r14, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001880)=@bpf_lsm={0x1d, 0x4, &(0x7f00000015c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x81}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000001600)='syzkaller\x00', 0x6, 0x47, &(0x7f0000001640)=""/71, 0x41000, 0x40, '\x00', 0x0, 0x1b, r14, 0x8, &(0x7f00000016c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001700)={0x2, 0xd, 0x57e, 0x1}, 0x10, r15, 0x0, 0x1, &(0x7f0000001800)=[r1, r16, r14, r1, r14, r1], &(0x7f0000001840)=[{0x3, 0x1, 0x2, 0x1}], 0x10, 0x1, @void, @value}, 0x94) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002ac0)={0xffffffffffffffff, &(0x7f0000001a00)="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", &(0x7f0000002a00)=""/185, 0x4}, 0x20) 1.550108283s ago: executing program 1 (id=7906): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c01250000001ffff000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.538020722s ago: executing program 1 (id=7907): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1b000000fd90055b6bffb1655c9665000000000000000000007ef96092421000"/41, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1b000000fd90055b6bffb1655c9665000000000000000000007ef96092421000"/41, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_devices(r5, &(0x7f0000000640)=ANY=[@ANYBLOB="0100000000000000288563"], 0xffdd) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 1.177106705s ago: executing program 8 (id=7909): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001c0000000000000018000000180000000200000000000000010000040800000000000000fd000000020000000000"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x4a) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 1.160076024s ago: executing program 1 (id=7910): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x11, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.159874944s ago: executing program 8 (id=7911): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 1.158702804s ago: executing program 1 (id=7912): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (fail_nth: 2) 1.150378694s ago: executing program 8 (id=7913): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)="43def5c8b1bd8327235eb5344cb8902f5c346a341a8b64b9c9f72344e0c73e083a25c6098deec565d3ffe1affd534db85259d77a5ff68edc4d49a1070fdf32278af88cc39c354dc2cce1e89de9041632de4b16eb3c1dfa930da8cdf0fc000a19cd62c6f83a26fab2a9d1bc53551cadad62efe55e05684035caf83302191317acb1d58aee9b0fa1c3e46342145edb0a41c13d7c02aeaed1aea11cce108f83c59b2e925072b32b7ba846ed3ad8da9d2901bb17e6440d4912cd50ede2"}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='afs_cb_break\x00', 0xffffffffffffffff, 0x0, 0xb}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@generic={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x18) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f00000002c0), 0x2, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x9, &(0x7f0000000300)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x4}, @generic={0x4, 0x9, 0x0, 0x4}], &(0x7f0000000380)='syzkaller\x00', 0x8, 0xfb, &(0x7f00000003c0)=""/251, 0x40f00, 0x42, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x3, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r3, r1, r1], 0x0, 0x10, 0x2, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000600)=r4, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='svc_alloc_arg_err\x00', r0, 0x0, 0x1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@cgroup=r2, 0x10, 0x0, 0x4, &(0x7f00000006c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000700)=[0x0], &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r6 = gettid() bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000880)={r0, 0x58, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9, '\x00', r7, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r9 = perf_event_open(&(0x7f0000000980)={0x4, 0x80, 0x8, 0x6, 0x5, 0x1, 0x0, 0x3, 0x40160, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x0, @perf_bp={&(0x7f0000000940), 0x1}, 0x210, 0x5, 0x3, 0xb, 0x4000000000000000, 0x17, 0x3, 0x0, 0x6, 0x0, 0x9}, r6, 0x5, 0xffffffffffffffff, 0x2) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a00), 0x442802, 0x0) ioctl$TUNGETFEATURES(r10, 0x800454cf, &(0x7f0000000a40)) r11 = syz_clone(0x400, &(0x7f0000002e00)="d6b0b6b70b4ce7e474fdd4ad894e341dc77e984507e6d1ae9ce4ae668c7aac6fb7ecec61082d872ad7533046696ba21eefe31373c2853cff58d662c1def464b93f46acc24bc99e3cde7492", 0x4b, &(0x7f0000002e80), &(0x7f0000002ec0), &(0x7f0000002f00)="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") sendmsg$unix(r8, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000000a80)="8d26d2000c868df79b9d21a7563e11fe2fc38eb079e8c0337b7d7a40f27477fa27ca4fc2dd8c2c7d0052cd6a49e3c7790d3931a5d3bee0a0d60866", 0x3b}, {&(0x7f0000000ac0)="667e978877a7fb492341a489ede2b08934bc88a0554c8746b71e6385d27dfb5d0946309c64844ff116db42d53b57bfa04ca4ddceec7c2d4ec37c54f57d87bff813dab08ccb99496d100bb20c63569da1c9bea3e2df4f7e460f6771b918c07978757cfd60f9a1c52fd5c6581e328b7e1d71513a3889c2b6b07a3fa9cc8e9bf91ac4b638d5b760952fbc69537f534a4fbfa067c203fbbd612ccd87f9b86c2cb29ca7a08207388206f7084a", 0xaa}, {&(0x7f0000000b80)="181f3dffc5d4fb98512bbd79e9b6ee6933797e55ab625676e7f86dce3ad97418ab38cb762157ecb5272b545cc726c4fd80dcb328a093b7d007", 0x39}, {&(0x7f0000000bc0)="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", 0x1000}, {&(0x7f0000001bc0)="70a99a417094d57ec7b9e658fd88dceb461f68c4d9", 0x15}, {&(0x7f0000001c00)="6cc80ac59495abbb3d9c8e18d662dcbeeccbe1a9a1a4341638168f2e997ff881bde596f503c65964574f4871b6c1e523827fbfe1273eca4f82090de1ef0d4e53fa4af4df46c66681e3de926d5ec6c5c0c0042eb6ea6c358c7cd3fc1c52e66a5a6cd5f49438eb14eb23d786eeed8161892ab2f9dff440dd3b97c29a8258573a0b6284e6a15e5b501b2ab66e3bb2ee2307ce83ef037adb706026fd76e77a766e36dafcc051ddc0408a64dbabfb4399b3972e676643081b6a3610b4ead0d8bc7370a0ddcb772525512d3280fc687e47737d5c4c8609e897822b70077eeaaa9fe2c7093cf1321e90cda95440a91e8291e233692a21612f14c492168f29a2163b9954e9501999f091eeca5dc9a3d5c854bfc2b7eb7e74ac296df6a819e3b12bc49d723f15a99e0c0c6494e5f752d67aee299203e217ce980fb76f78bae49230bd08864eba2df5d6a67394657edc3ea9e89733a819ce30a3b58c5a78a017a61ead9ffd9f54c974a2bda22c0e71723ec7f3f244fcc3adb8136731d761967c0b9817db29d744b699186fa2272e92d7365781d82664c06aa25841d100779b2d4a7fce4dafe466c3b85cebaa8b188ffdf4800bd07a98c8648ad7ceec70ac6c23707dcf73b3f5d58d64c308a72c09d24486a8eca7cb3de28c3dc3f590a127a3367123d953ed421d811d6be68854e18f079732b264c1e4a4cabec9431ecf2269cfd298010ecf387f2c1851cad8f5182ef51b19bfaf5a16352bbf557587149eda64f0ca9612cf2595852589f686b9e4a92939fe832672344b50a61b347c51c7773b338bbc782cc71b9182ff9c25271812fb5427053bd04034122a7eb292b9b3cd43b5b87d5003fcb2de62c64e71caf707b9ed09fa6c8bc880fd6b19d7d3da429d9f0cbec074af2a93b9b07f6dcb8827aa0832cc7e3a5ea89726ddd7e3bf24313b74c643a6d4d371589fb168bfc2b4df0a098c10458e0eb4131cae249178275e14ac50dbea653c4f8c5d9d76ecba1047325b11f2df589e65efb582a5a0443eeea3549cdde2f80a502384eb981411bb5896dfe96047e021703221fcf9db46ae515876810da1e93fbda4f6a87f0acd83abce65126c4c983d379fc23534bb01e8aa03ffcdd88d2f4f37e2ad50e4a7a2ba949b43e3383d136e1bac9e6dbc0c21f7c16294d4d9e04a2faf257e6f36e9ded1917096bec56defe157e97dc096c32e3cb742b5118fc05a252159cd02bb6c7df08256a30b09784008ef7a268b8b334519e4dab9e4b1a76daba1721e0a787e6cb8d295731afbe7527792426151c037dc44420b3c38efd5058818d68cfc844b7725a30d7a1daedbda7ced3f894367f51a3b55f6b12739b0422d637e88bf6bc6be8698d1527443cd2f6200fc457004a7c31ca7c43df428cd0830e21c89cef247c773d1c6d9ac1eb6085ccabac6dc2c6915895786e05eb7adf6c58733ea7ee7a4675f3e4f4cf78ddd1b8108222fcd776c7a79efce3ee2e1dfff8e12c503853edbe80abbef89a7b980596c32c31f71467548ca5ecb0c66bc8b2b568c9dca0a5344600386c8fac6873ea12ed47ae448b255b8003a61432ebfd33d28618302cf8a6fb9476bac5dced13f1a715b4d18237743811bcae7476ea11c47669d75a0b08112ed29c20e14b768d81aa1f7f1183a3ef4cf33300dc9fed77313199323c460eee65ef5573d5f643e2ba645bd2b000aaf16042af3e6c2339bfedfd62ecca14f91d8c011430ee4ba22a53b0bae60e9a1963ea1012338de1034b77d59f5b9adc5ddd030eac6aff60a72622bb1c709f961b1b16cf9af458c1d52f28979b46a6c2f9cef1ef4936012f1a446bbabd8a4e10f0f5fcbc573eaa028e2f21a6b0e65bfa6ba327dc2ac4adf30c13a7e657ec848a825821ad7ae0f8c6789b28aa990b6aeb8855730a1613db46cad9dac9b88ae99c4e69af3b25bfd4a0768707d5fd3ca2364527fd864ce9f74af7b571175c723b9368b8c58634a6a79365c018e5153089efdca1afe16b60dca7facb58a63133ce25cbca30aae8c56e2ed98b208cac775604f231cc561a4c6cb8e6cc6556a0310e35b241d2215370c4fef259851c79e8a2dbc772c06878196f1ccabdc06cf5155572c83d6f1a4ebfcf396628f51dc7dcd6b621f02f673969752d9f8862f109c560b6efcba1472f603e8e6df77eb448753067eac28d60f0629633af82c6e76b93eadd325b62b73eb44884ca1e6741e2960644dd6cee56497c65ee3f511541a6853d6c44d7d4e2486ea3e08feca6a618108963af0edf5eb9d88bbaa1d920f54645693db229be08827419c6c1aa46334cf732c80684df93201a8f4d7e583f2858102989ad0cdf8c7330d82558f7ae6233acba9f71173961352d41133b6b56dc1157379e47213e55ce1c374870bd70c1600dd4736a11ca69176861d692c3ae1dc44acbd12a4dc1d00c2e7f58a62aaefb6ee05df6ecbdd648dc295da212e3f0aac15b7aea500f948d16fc90493e8f342a444f105d83f7000b4b200b45b6e7d3148cd9607aa56ee3627805f96294c0ba0c33460b7f9545aaf6bb05567261285bda86f885eb595b153c9f5c95dfe39d7039d425a8d3eace5c76e81cfffaaf1ddf1227f1302fa8b77cf099d75d7929b736b4ad31618b3957e6814d47cf4b16a2a7b326a7b6947ec5ce6a5312aa50d9ca60cc4bed08630ca408f73e83a3340b2d5503cd9b1833ce034136d1ca2d0d6caffef01ea41a852cd4d8fa512133e43900ee065eb8274cf7a2b4b4422df3b9be6405ffe78c32cff3ba3b54699952f2225b77294c499a22dd194ce028ec08e85daa999b4a768100f927d40eca0369770e2731fb7d9a83b6bfa2340aff73bcb3722bd915db4b3b479c0fe0fffdf3a49b049735655e1264ec17c491e8c0b95ee4c0d7647f9bd2ee52bc71c50daed4cee02f0a276a3d318bcdb167670e67700448dbf634d5c339d45d6e29c39d560e79608da40a654f29a8711159e8ab36b7465613a43b96fefeb7621fd82eb65a0f04fcf19cb8407a1de84156da9f15e18bc63d329566f038570f91670c36cedcf94649d3a0b1dc5026ba4abe6f5b37ab77186d42626f47a9d3dfe5a0ac699aa337b85c6e81f195855c105f6d01b72158f511b3d0dfb6f616d81bd64bd7017e9ccde89582ef594c3550b9e4e9a1c2bdd88350249c788ec4108f01a0a7bcbc6d0aa82987309cd2f1ab73f02e1dd8b4573fa228c27ebc9975a82839f4dde91379384096e82ec907ea6d12e97268da55af0c254c1548755895733285defdd22da951228ff1a86ee538ca67b408a07e41c13c1e2d750ade05865a9b38687b87b04327b522173cdc90f6213e24345cf2a6da89e647b7ffc1de5eb46f873c68115523db320cfd3df6c8b8705f795cc1034a96bc5371a9bdab98eb86859d7d86f1d14a1b480e37559e6fede8be4258ec7c38c61b72c939e753da9602090aa5190ae64354ab61c78b11849748e9f3889d1d9cf36200a0e213a5369ec6e6e749a753930469284028667892dd9dcd6c9a9c1a315481371ec25ff3ab95394db3b698f2a901417bb76b41f17c4c5f28b2cfa3f8e38e3727b596272f9cf1a5c6092d02f6c30578738661d35cb2e82ddf65219792ad65a72bfa454c24b8ef66afd2dd3ca42ecf486f276e60cfaea4ef1d5562e83ac256956a0aedac420a3faf4b68bd20748d1bd4a5953bac4cd97320de51e81abf92afc6e478943305e27c415c75b0343de294de2e715c4f25373c71294b9ef10a0a25dd2a16cdd4a266649b5eb225ce9600e97b8b33a0b3e515d62d02534ee4fe0038ca2f90da3d8a642327cd0bb082a0098ed494d346edf1c929cfaa7a1c0ef1b61cfaaaf1856bb6b88395f04c0350bbd3f70276fd927edbe5b0bcbf283e24466974903f5572bdcd68cb349d6ec396c2d91e4dc780f26311c00bcbf3986225e43a448859d909dda14926103f0e536c1d8396b5ef84141828b5124db625663eba181bfa8a2767418a42c9c049b5b0f899013a238fc18d34a570fe402084cc8f0f51f742a883b3e6ff83bf33e0ce0d1f94a7dcfecee14b7a8f33b5a3af797685d4cbccbdfd7803e835b281ab5ac32fd13e28dae05dcc976d3af05f8f3adeee8a99ecfeba1a43b9d1a7baaa6ef6f839712eb35b486d1bcf3cc9db20cc4f6752a400674d0798f04e7eb96b6071657aded6953137fdec36cda6ce8085514bf168a3298a93752c4cc318bc507d9946d6e23d5425815ef7a83f7c347f38e30f4d0d169b52805a7410bb4e17b76c464a3caf3ff59084cc9e66bb011dbb518986f65b4fdf98f481070178564da7c214c698a17d0c379eeffa11641b6248820003b7ab710900f59756c1a7b95ec78bf9250fdcc9c1ce81444aa28ddfd457d0973ce451cb39ed826142522170d04aaa4bf3e71dbf28009362fa03c5b5633be2e7f6b071f60322eef4b455186b0770e97bacdc7c6d48ea3430446f4b509b2de061108c6ac27e93c006eaa318cc262a56ff62081b82a959355dd188b489705ca9c7b469e074437548b5534ac80137098a6c24fc97c7211c3be29cd49c8b583c9c4ec34d958e7945081c768079c3994ad1e1d6fc25a695ce58c1e6789bf84fe8c196d4e5c7fc478a02bb75c57cd1e2990a8795250ba31784ce1b8e14c49053edd47e999911ad303e5aa45d68a4457530d31e9537790b595e6d99645def6a1f77776c8ee297a333293239e17f7d1ad3e5de724c1718674500136c84f94073af1f743b1153341323465eb099bd505b48af9c7e05f07b14a4483b59f244c53340ec06add4661d01f97c88ed4bf3e176fe895c11f65a2c8f8999d8ce88c86d312029ce9f91130b368564e4ce57aba0d59364ee3a16c18503c3b8c75fc867e7ce4d246a87842e972ae4a09bedd1956fa41d3f808a85c189752c107407a69ec54734fcad29e5ab727c82edda395a90bcd23dd9e7e711f32ec3b7443565d91dfdb4b3f8da0cc0b576bf8384887315a05a43a2fa57b89f1e56e6af92c26fc7450246ad135549fee7c91c0a548c670bcc938e0bc45f39e9686fa6ee683c46eb1b1f72d5fa922f0ffdeaa295fcc389d62766abba9d00be43712ffbd8b48829d210fbb18a0cc8ddbf592db3b9d55a878d3037582b1b55be67c09339a3a802ed2754ce7e06aa39137451404abda8d9325b6a9b02eb12f0dd3685e31939886c730ea01f43bf70896fc991cb35807f213f902081cbf8ac12e3af6ddcccf506a92f60e58b853d73fc1b1e689cbef1562a19a1e9e8c808f7606e7ea1edbf2b881385f1a75ac2eff017774af7b78c980b15286ccf09dcb82e685a065218cb56c71e1e9895f147f02e3af8737cb5ad67774b1018f1da13ef1ae83c14dc482018c8d259fbca29ca905cb21c227f929a6bf85825ba9f464940378f8a4686befa383647293b9857ebca980322877ef6d8fbe674a2d764eea8bda7ec691b35947060febeba02721fb6847c23e5940b6d6775db600dff5ee2ee4a94946e02cafc453887e0d8ac41d09b360f89ff47897dc3680e5c5055cb9a33bee9c8de4afd6c99a92b323d804ad4ba8a528f8fcfde2916426bb24df28bcae3399de2c576d1f9103593dbb628d09430db7ce73446d381000353b742ecc130d424c9e1f21b998d41072ca01c5e672d39a41f9534c48ba3e72bb4755f89d31e494c3c120dc16777311670d99df0ca0029f686be097d01889e204b8575ba396b84acee5851c9f87089562ed71387f0b0173849a27c5aabf73cc0a4a6b3ff6b6e470a20d747ddabf4bebadff00ec47fd67b35fd516525c90341d8026f91b9f86a95b5a27f1", 0x1000}, {&(0x7f0000002c00)="2ae2d215c5db0c519a29187b4ad2e91f52804e961c45a5cb5c2a0ec34b303faf21cfa484b3742f1959ff19fee8345dbd6f6a9c4fefca53fdfdc5f95496357b7205c3b9455377b653e603e4108c8cc259ff2867cb51864f6e68f478b10c300efca01daca9", 0x64}, {&(0x7f0000002c80)="e3d54fff26ba22e9485b2f5802b68f66038cf4c213b5f04ea0d24a80640ee97ab4f477e6ddd56536be44ae9d05f0b76e97a084ca4eccbbab7a4ed6f9837740f9916ddc9d59bebaf9c9d07b037b069be729608d6197a6d6759ce7da4c96af66b35bea8f8a90976ca66b771ef803878fd70b8c90e98a8211e485b22b4d43a985b4a2e5e4721a8223f85289cc9c0086ccdce5c9ea99e5757b74e845a08f610f837ab306ab3f0aaf291db53ba257841655f9ae8f8bd89c3c98976c20df0e7436d8e8427561f62f8673296956e05527df5c6893ae5c7812a251a04c60f3ce0ee3a950d1b9a6452b7d0e25e901c42a0472c9", 0xef}], 0x8, &(0x7f0000003f00)=[@cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee01}}}], 0x20, 0x4000000}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003f80)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000004000)=@generic={&(0x7f0000003fc0)='./file0\x00', 0x0, 0x8}, 0x18) perf_event_open(&(0x7f0000004080)={0x1, 0x80, 0x9, 0x7, 0x0, 0x81, 0x0, 0x100000001, 0x3ca18, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004040), 0xa}, 0x100030, 0x5dc7, 0x81, 0x0, 0x1, 0x9, 0x9, 0x0, 0x5, 0x0, 0x8000000000000000}, r6, 0x6, r9, 0x8) r12 = openat$cgroup_ro(r2, &(0x7f0000004100)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0xa) perf_event_open$cgroup(&(0x7f0000004140)={0x5, 0x80, 0x1, 0x10, 0x8, 0x2, 0x0, 0x0, 0x80140, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x401}, 0x409, 0x5, 0x0, 0x8, 0x5, 0x6d, 0x7, 0x0, 0x5, 0x0, 0xffff}, r5, 0x8, r12, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004240)={{r1, 0xffffffffffffffff}, &(0x7f00000041c0), &(0x7f0000004200)=r4}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000046c0)={r12, 0xe0, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000004400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000004440)=[0x0], &(0x7f0000004480)=[0x0, 0x0], 0x0, 0x7e, &(0x7f00000044c0)=[{}, {}], 0x10, 0x10, &(0x7f0000004500), &(0x7f0000004540), 0x8, 0x24, 0x8, 0x8, &(0x7f0000004580)}}, 0x10) r15 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000004700)={0x1b, 0x0, 0x0, 0x3, 0x0, r1, 0xece, '\x00', r7, r12, 0x2, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) r16 = bpf$PROG_LOAD(0x5, &(0x7f00000047c0)={0x19, 0xb, &(0x7f0000004280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x74d8}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0x3, 0x3, 0x8, 0xfffffffffffffffc, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}]}, &(0x7f0000004300)='syzkaller\x00', 0x7, 0x15, &(0x7f0000004340)=""/21, 0x41100, 0x22, '\x00', r7, @cgroup_sockopt=0x15, r12, 0x8, &(0x7f0000004380)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000043c0)={0x3, 0x8, 0x9, 0x4}, 0x10, r14, 0xffffffffffffffff, 0x0, &(0x7f0000004780)=[r15, r12, r12, r0, r0, r8, r12], 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000048c0)={&(0x7f0000004880)='cq_drain_complete\x00', r16, 0x0, 0x2}, 0x18) 788.477586ms ago: executing program 8 (id=7914): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r2 = bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x7, [@volatile={0x9}, @struct={0x5, 0x7, 0x0, 0x4, 0x1, 0x5, [{0x8, 0x0, 0x7f}, {0x1, 0x0, 0x241}, {0x10, 0x4, 0x7ab}, {0x5, 0x3, 0x7}, {0xa, 0x3, 0x7}, {0xa, 0x5, 0x8}, {0x4, 0x4, 0x6cb}]}, @restrict={0x0, 0x0, 0x0, 0xb, 0x4}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61, 0x61]}}, &(0x7f0000000500)=""/219, 0x97, 0xdb, 0x1, 0x6, 0x10000, @value=r2}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@var={0x8, 0x0, 0x0, 0xe, 0x4, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x5, 0x2}, @fwd={0x7}, @restrict={0xf}, @struct={0x5, 0x3, 0x0, 0x4, 0x1, 0x6, [{0x1, 0x2, 0x3}, {0xe, 0x0, 0xfffffff9}, {0x1, 0x4, 0x10001}]}, @func={0x8, 0x0, 0x0, 0xc, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x4}}]}, {0x0, [0x5f, 0x2e]}}, &(0x7f0000000140)=""/140, 0xa8, 0x8c, 0x0, 0x800, 0x0, @void, @value}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0900180a0000000000000c00000000000000000000020000601200000000000040000000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 515.230397ms ago: executing program 1 (id=7916): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x292000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'team_slave_0\x00', 0x8000}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000b000000de20983c2e677237f47c8db7bf16ed3fc73409ac43d02f6d8147527aba4822caaa03f279c919992e4f00000000000000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 511.538407ms ago: executing program 6 (id=7917): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000005000000020000000700000042"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r3}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x18) (async) write$cgroup_devices(r2, &(0x7f00000000c0)=ANY=[], 0xffdd) mkdir(0x0, 0x0) 486.484918ms ago: executing program 7 (id=7918): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000340)={'gretap0', 0x32, 0x38}, 0xa) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[], 0xfdef) 482.842168ms ago: executing program 7 (id=7919): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082", @ANYRESDEC=r0, @ANYRES32=r0, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(r5, &(0x7f0000000000), 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_netprio_ifpriomap(r8, &(0x7f0000000340)={'gretap0', 0x32, 0x38}, 0xa) write$cgroup_subtree(r8, &(0x7f0000000580)=ANY=[], 0xfdef) 455.691288ms ago: executing program 7 (id=7920): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa88"], 0xfdef) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) 453.312418ms ago: executing program 7 (id=7921): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYRES32=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x13) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000005c0)={&(0x7f00000001c0)=@name={0x1e, 0x2, 0x28eec9463f268516, {{0x42}, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000240)="d33e49bb19293c7795b0c8757706ad146f588d19231593db2306e58caf2db6d7721318638b9a758f2212fa8a9df266915e92ccb0fe971a4212d63cf2407604345278d113d8ad811cf5120a4d724cacc387aca8e45481b9968a1bec124b91fc88", 0x60}, {&(0x7f00000003c0)="b689d91e4d9aa8bfe3635b32c4dadec22563f4404d192854a25de571d136544db20c57ae57433eaeb178f9c108e1b5bdc033a09783297157f6d977c98fa26c128f30dd4ded48ef955315cad2a5a30d38136f9404f35ee73ab2f562bc9b6fb62940864a5a72cc3a67a33ae9fba9a3634ebe76c58a6352e14a021111a0bfb767139671e19f318cbcf5f67e0eb38acf8018722f148a0b23f3176465dc4e40d66d77ccdf486d766147c15504867ff8e7760b200083aa0c1d66f97c97a025eff4a8c4b0c13174ed5858098f4ef17b24f291b320e1ebd275062bb1e93635f5011587fb7e12b3bf2e7feda72040f0b01ee1", 0xee}, {&(0x7f00000002c0)="e563676a61857a01687e268276f66587fe2f019910a36d239c005112c1c2694d1b16863c022438901a585c640af8a6cbd3cd37b8534a93bf1610e12b65ecc13cd760f9944ca6ff4f7a64ae4eb03b4fd7b1705951c7fac177f37a26044b83508f3d41be750de0686546a11a62c9f7d663e1beb7ac05d330fd6cd31755ee1e2e5279ef9f9e46b0452e9a5027482cd882304742cf467ec2161f8228194c9972c57daf1e0d827405f798db64b8d88f", 0xad}, {&(0x7f00000004c0)="4a1736f88b31c830f48918debe534ceda1e1f28ad84342251e8f217d9dab1f530639087b3df4d70d007d2dd355da603dbf10c14e1ea096be1baa25ff4024af92c027d252775749aec81f3d23113820a373d05898740faf88ffc550845c2bab92d622dbfd1a2afaf208159296da040f899d910b25a0f52f1d5152d7c426da26f5e790a5a84ffdaed58281e9baf6d7a9a562", 0x91}], 0x4, 0x0, 0x0, 0x20000800}, 0x8800) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r4, 0x58, &(0x7f0000000980)}, 0xfd88) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) close(r5) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) write$cgroup_pid(r5, &(0x7f0000000300), 0x20000312) r6 = syz_clone(0x0, &(0x7f0000000740)="6ffddf51173f98e4788f40f908a529b93f7f37090cb92c9dc438067ffba592d57d1c39f8305793037a0f8eec02fc597707f7dace8084269e2dfc9cdae88be1d7d2dd8df6483cf896e0", 0x49, &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)="ea4b750346d93fefd801df1319cd47c4e9e6f16413877365b156976d405375fcff031f44747d69fba1fa51cc4f71cb639c7d1893f98bc813b7a575e542db8f1d68ec1a512a998313f63dbd7a306320f0e012e590583559cdce96355234183d14b270e1b124a4c479d1da94d54bdd9f5e5f45dffa904a4ec50213f683fa182f7fcbdc01b9d7cd42311f4b36f371fbcdb54b9aac1c066df53661dcd148e972a0024d61af8c741babff7cb1528b5aeaa4de9a9fb59334275ee29368141266049e952f57c2515d2043e2f10b895c") write$cgroup_pid(r5, &(0x7f0000000940)=r6, 0x12) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0xfdef) 400.420898ms ago: executing program 6 (id=7922): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001c0000000000000018000000180000000200000000000000010000040800000000000000fd000000020000000000"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x4a) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 400.113988ms ago: executing program 8 (id=7923): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x11, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 399.775768ms ago: executing program 6 (id=7924): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff0000822400000000000000000000cd00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000d81e000000060000000000000000000000e0fd45c35cf220a8e1eb371115adca961c582745f47c56904de34ebbbd3a5ec670f2d2f8d613a9f6b38ade8ebe51725d39", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540)="03a179a24b19c1812a68c127ba20979d022216d5018d5bb01d50836e22f7edee636cf98562e5afc9fa049152978569756af3b7a01aca19e76f09ebafb4ab2867801e311c2f6b8ff3db74def31991e4fe96303e2394cfc5fbd4b8f8283ff5939315edcdd9ed501c1c3e08cb235e84caaf64170b2e981d0fd08d6d12fb38fe1b03b929034a02da79f9ebea78e99994cbf87ab1a484667e7751201e085f185563bcb40f08867fbc5ed82ef53e76c48ba73361d60dec36f60bdcb5664668aacc5c9d8e5b", 0xc2, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 339.059998ms ago: executing program 8 (id=7925): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff0000822400000000000000000000cd00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000d81e000000060000000000000000000000e0fd45c35cf220a8e1eb371115adca961c582745f47c56904de34ebbbd3a5ec670f2d2f8d613a9f6b38ade8ebe51725d39", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540)="03a179a24b19c1812a68c127ba20979d022216d5018d5bb01d50836e22f7edee636cf98562e5afc9fa049152978569756af3b7a01aca19e76f09ebafb4ab2867801e311c2f6b8ff3db74def31991e4fe96303e2394cfc5fbd4b8f8283ff5939315edcdd9ed501c1c3e08cb235e84caaf64170b2e981d0fd08d6d12fb38fe1b03b929034a02da79f9ebea78e99994cbf87ab1a484667e7751201e085f185563bcb40f08867fbc5ed82ef53e76c48ba73361d60dec36f60bdcb5664668aacc5c9d8e5b", 0xc2, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 217.237338ms ago: executing program 6 (id=7926): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3, 0x2}]}]}}, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 129.422499ms ago: executing program 7 (id=7927): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$inet(r1, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) 128.427859ms ago: executing program 7 (id=7937): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff0000822400000000000000000000cd00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000d81e000000060000000000000000000000e0fd45c35cf220a8e1eb371115adca961c582745f47c56904de34ebbbd3a5ec670f2d2f8d613a9f6b38ade8ebe51725d39", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540)="03a179a24b19c1812a68c127ba20979d022216d5018d5bb01d50836e22f7edee636cf98562e5afc9fa049152978569756af3b7a01aca19e76f09ebafb4ab2867801e311c2f6b8ff3db74def31991e4fe96303e2394cfc5fbd4b8f8283ff5939315edcdd9ed501c1c3e08cb235e84caaf64170b2e981d0fd08d6d12fb38fe1b03b929034a02da79f9ebea78e99994cbf87ab1a484667e7751201e085f185563bcb40f08867fbc5ed82ef53e76c48ba73361d60dec36f60bdcb5664668aacc5c9d8e5b", 0xc2, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 0s ago: executing program 6 (id=7928): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00001bb800000000000000", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) unlink(&(0x7f0000000000)='./file0\x00') kernel console output (not intermixed with test programs): ller0: linktype set to 804 [ 465.021912][T11327] FAULT_INJECTION: forcing a failure. [ 465.021912][T11327] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 465.178560][T11327] CPU: 0 PID: 11327 Comm: syz.5.3657 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 465.192381][T11327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 465.202712][T11327] Call Trace: [ 465.205839][T11327] dump_stack_lvl+0x1e2/0x24b [ 465.210351][T11327] ? bfq_pos_tree_add_move+0x43b/0x43b [ 465.215649][T11327] ? kmem_cache_free+0xa9/0x1e0 [ 465.220338][T11327] dump_stack+0x15/0x17 [ 465.224321][T11327] should_fail+0x3c6/0x510 [ 465.228580][T11327] should_fail_usercopy+0x1a/0x20 [ 465.233428][T11327] _copy_from_user+0x20/0xd0 [ 465.237862][T11327] __copy_msghdr_from_user+0xaf/0x7c0 [ 465.243066][T11327] ? __ia32_sys_shutdown+0x70/0x70 [ 465.248020][T11327] ___sys_sendmsg+0x166/0x2e0 [ 465.252525][T11327] ? __sys_sendmsg+0x280/0x280 [ 465.257130][T11327] ? rw_verify_area+0x1c3/0x360 [ 465.261822][T11327] ? __fdget+0x1bc/0x240 [ 465.266168][T11327] __se_sys_sendmsg+0x1b1/0x280 [ 465.270844][T11327] ? __x64_sys_sendmsg+0x90/0x90 [ 465.275793][T11327] ? ksys_write+0x260/0x2c0 [ 465.280219][T11327] ? debug_smp_processor_id+0x17/0x20 [ 465.285427][T11327] __x64_sys_sendmsg+0x7b/0x90 [ 465.290286][T11327] do_syscall_64+0x34/0x70 [ 465.294553][T11327] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 465.300450][T11327] RIP: 0033:0x7f6945ae2819 [ 465.304789][T11327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.325283][T11327] RSP: 002b:00007f694415b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 465.333675][T11327] RAX: ffffffffffffffda RBX: 00007f6945c99fa0 RCX: 00007f6945ae2819 [ 465.342011][T11327] RDX: 0000000000040000 RSI: 0000000020003b00 RDI: 0000000000000003 [ 465.350349][T11327] RBP: 00007f694415b090 R08: 0000000000000000 R09: 0000000000000000 [ 465.358147][T11327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.365958][T11327] R13: 0000000000000000 R14: 00007f6945c99fa0 R15: 00007ffd624fa1a8 [ 466.035565][T11348] FAULT_INJECTION: forcing a failure. [ 466.035565][T11348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 466.048552][T11348] CPU: 1 PID: 11348 Comm: syz.6.3662 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 466.059802][T11348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 466.069715][T11348] Call Trace: [ 466.072821][T11348] dump_stack_lvl+0x1e2/0x24b [ 466.077337][T11348] ? bfq_pos_tree_add_move+0x43b/0x43b [ 466.082901][T11348] ? kasan_set_track+0x5d/0x70 [ 466.087514][T11348] ? __kasan_check_write+0x14/0x20 [ 466.092435][T11348] dump_stack+0x15/0x17 [ 466.096425][T11348] should_fail+0x3c6/0x510 [ 466.100685][T11348] should_fail_usercopy+0x1a/0x20 [ 466.105543][T11348] _copy_from_user+0x20/0xd0 [ 466.109976][T11348] iovec_from_user+0xc7/0x330 [ 466.114689][T11348] __import_iovec+0x6d/0x3b0 [ 466.119209][T11348] ? __fsnotify_parent+0x4b9/0x6c0 [ 466.124396][T11348] import_iovec+0xe5/0x120 [ 466.128828][T11348] ___sys_recvmsg+0x56b/0x690 [ 466.133328][T11348] ? __sys_recvmsg+0x270/0x270 [ 466.137931][T11348] ? __fdget+0x1bc/0x240 [ 466.142005][T11348] __x64_sys_recvmsg+0x1ee/0x2c0 [ 466.146778][T11348] ? ___sys_recvmsg+0x690/0x690 [ 466.151468][T11348] ? debug_smp_processor_id+0x17/0x20 [ 466.156673][T11348] do_syscall_64+0x34/0x70 [ 466.160928][T11348] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 466.166657][T11348] RIP: 0033:0x7fc52546e819 [ 466.170912][T11348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 466.190357][T11348] RSP: 002b:00007fc523ae7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 466.198592][T11348] RAX: ffffffffffffffda RBX: 00007fc525625fa0 RCX: 00007fc52546e819 [ 466.206403][T11348] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 466.214217][T11348] RBP: 00007fc523ae7090 R08: 0000000000000000 R09: 0000000000000000 [ 466.222024][T11348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 466.229836][T11348] R13: 0000000000000000 R14: 00007fc525625fa0 R15: 00007ffd425d1dc8 [ 468.599351][T11413] device pim6reg1 entered promiscuous mode [ 468.623633][T11413] device syzkaller0 entered promiscuous mode [ 468.660367][T11421] FAULT_INJECTION: forcing a failure. [ 468.660367][T11421] name failslab, interval 1, probability 0, space 0, times 0 [ 468.693791][T11421] CPU: 0 PID: 11421 Comm: syz.8.3688 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 468.705076][T11421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 468.715206][T11421] Call Trace: [ 468.718315][T11421] dump_stack_lvl+0x1e2/0x24b [ 468.722818][T11421] ? panic+0x812/0x812 [ 468.726724][T11421] ? bfq_pos_tree_add_move+0x43b/0x43b [ 468.732019][T11421] dump_stack+0x15/0x17 [ 468.736011][T11421] should_fail+0x3c6/0x510 [ 468.740267][T11421] ? security_inode_alloc+0x29/0x120 [ 468.745389][T11421] __should_failslab+0xa4/0xe0 [ 468.749988][T11421] should_failslab+0x9/0x20 [ 468.754334][T11421] kmem_cache_alloc+0x3d/0x2e0 [ 468.758922][T11421] ? slab_post_alloc_hook+0x61/0x2f0 [ 468.764060][T11421] security_inode_alloc+0x29/0x120 [ 468.769086][T11421] inode_init_always+0x767/0x9f0 [ 468.773856][T11421] iget_locked+0x1d6/0x870 [ 468.778104][T11421] kernfs_get_inode+0x4b/0x6b0 [ 468.782704][T11421] ? kernfs_find_ns+0x457/0x4a0 [ 468.787392][T11421] kernfs_iop_lookup+0x1f4/0x2f0 [ 468.792198][T11421] __lookup_slow+0x2b9/0x400 [ 468.796592][T11421] ? lookup_one_len+0x2c0/0x2c0 [ 468.801277][T11421] ? lookup_fast+0x32f/0x7d0 [ 468.805706][T11421] ? security_inode_permission+0xb0/0xf0 [ 468.811171][T11421] ? handle_dots+0x1030/0x1030 [ 468.815774][T11421] ? inode_permission+0xf1/0x500 [ 468.820546][T11421] lookup_slow+0x5a/0x80 [ 468.824624][T11421] walk_component+0x48c/0x610 [ 468.829261][T11421] ? nd_alloc_stack+0xf0/0xf0 [ 468.833741][T11421] ? handle_lookup_down+0x130/0x130 [ 468.838777][T11421] path_lookupat+0x16d/0x450 [ 468.843206][T11421] filename_lookup+0x26a/0x6f0 [ 468.848076][T11421] ? hashlen_string+0x120/0x120 [ 468.852937][T11421] ? memcpy+0x56/0x70 [ 468.856753][T11421] ? getname_kernel+0x1f8/0x2e0 [ 468.861441][T11421] kern_path+0x35/0x40 [ 468.865346][T11421] create_local_trace_uprobe+0xa2/0x6f0 [ 468.870885][T11421] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 468.876005][T11421] ? _copy_from_user+0x96/0xd0 [ 468.880610][T11421] perf_uprobe_init+0xfa/0x1a0 [ 468.885215][T11421] perf_uprobe_event_init+0x106/0x190 [ 468.890413][T11421] perf_try_init_event+0x143/0x410 [ 468.895365][T11421] perf_event_alloc+0xcf5/0x1970 [ 468.900134][T11421] __se_sys_perf_event_open+0x7ab/0x3c30 [ 468.905739][T11421] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 468.911191][T11421] ? __ia32_sys_read+0x90/0x90 [ 468.915975][T11421] __x64_sys_perf_event_open+0xbf/0xd0 [ 468.921251][T11421] do_syscall_64+0x34/0x70 [ 468.925664][T11421] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 468.932591][T11421] RIP: 0033:0x7f7884a4c819 [ 468.936941][T11421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 468.956471][T11421] RSP: 002b:00007f78830c5038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 468.964692][T11421] RAX: ffffffffffffffda RBX: 00007f7884c03fa0 RCX: 00007f7884a4c819 [ 468.972503][T11421] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 468.980315][T11421] RBP: 00007f78830c5090 R08: 0000000000000000 R09: 0000000000000000 [ 468.988127][T11421] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 468.995942][T11421] R13: 0000000000000000 R14: 00007f7884c03fa0 R15: 00007fff35c29268 [ 470.843841][T11458] 8ûÅ: renamed from syzkaller0 [ 479.059916][T11606] FAULT_INJECTION: forcing a failure. [ 479.059916][T11606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 479.211271][T11606] CPU: 0 PID: 11606 Comm: syz.6.3746 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 479.223241][T11606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 479.233392][T11606] Call Trace: [ 479.236577][T11606] dump_stack_lvl+0x1e2/0x24b [ 479.241033][T11606] ? bfq_pos_tree_add_move+0x43b/0x43b [ 479.246328][T11606] dump_stack+0x15/0x17 [ 479.250347][T11606] should_fail+0x3c6/0x510 [ 479.254598][T11606] should_fail_alloc_page+0x52/0x60 [ 479.259607][T11606] __alloc_pages_nodemask+0x1b3/0xaf0 [ 479.264818][T11606] ? __get_vm_area_node+0x156/0x470 [ 479.269847][T11606] ? __vmalloc_node_range+0xdc/0x7c0 [ 479.274976][T11606] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 479.280379][T11606] ? _raw_spin_trylock_bh+0x190/0x190 [ 479.285608][T11606] ? kvm_sched_clock_read+0x18/0x40 [ 479.290591][T11606] ? sched_clock+0x3a/0x40 [ 479.295208][T11606] ? sched_clock_cpu+0x1b/0x3b0 [ 479.301703][T11606] __get_free_pages+0xe/0x30 [ 479.306116][T11606] kasan_populate_vmalloc_pte+0x39/0x130 [ 479.311944][T11606] ? __apply_to_page_range+0x710/0x9e0 [ 479.317206][T11606] __apply_to_page_range+0x720/0x9e0 [ 479.322312][T11606] ? kasan_populate_vmalloc+0x70/0x70 [ 479.327794][T11606] ? kasan_populate_vmalloc+0x70/0x70 [ 479.333073][T11606] apply_to_page_range+0x3b/0x50 [ 479.337938][T11606] kasan_populate_vmalloc+0x65/0x70 [ 479.342969][T11606] alloc_vmap_area+0x1944/0x1a90 [ 479.347750][T11606] ? vm_map_ram+0x9d0/0x9d0 [ 479.352078][T11606] ? __kasan_kmalloc+0x9/0x10 [ 479.356712][T11606] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 479.362093][T11606] ? __get_vm_area_node+0x116/0x470 [ 479.369572][T11606] __get_vm_area_node+0x156/0x470 [ 479.374420][T11606] __vmalloc_node_range+0xdc/0x7c0 [ 479.379363][T11606] ? array_map_alloc+0x319/0x7c0 [ 479.384179][T11606] ? cap_capable+0x1ce/0x270 [ 479.388566][T11606] bpf_map_area_alloc+0xd9/0xf0 [ 479.393248][T11606] ? array_map_alloc+0x319/0x7c0 [ 479.398022][T11606] array_map_alloc+0x319/0x7c0 [ 479.402629][T11606] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 479.408088][T11606] ? fput+0x1a/0x20 [ 479.411746][T11606] ? bpf_map_meta_alloc+0x16b/0x760 [ 479.416775][T11606] array_of_map_alloc+0x55/0xc0 [ 479.423820][T11606] __se_sys_bpf+0x620f/0x11cb0 [ 479.431129][T11606] ? perf_event_output_forward+0x14e/0x1b0 [ 479.439274][T11606] ? perf_prepare_sample+0x1af0/0x1af0 [ 479.444552][T11606] ? __x64_sys_bpf+0x90/0x90 [ 479.450203][T11606] ? __this_cpu_preempt_check+0x13/0x20 [ 479.455576][T11606] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 479.461825][T11606] ? hrtimer_forward+0x1a6/0x2c0 [ 479.466573][T11606] ? perf_swevent_hrtimer+0x4b8/0x560 [ 479.471815][T11606] ? sched_clock+0x3a/0x40 [ 479.476009][T11606] ? sched_clock_cpu+0x1b/0x3b0 [ 479.480887][T11606] ? sched_clock+0x3a/0x40 [ 479.485091][T11606] ? cpu_clock_event_read+0x50/0x50 [ 479.490321][T11606] ? timerqueue_add+0x24c/0x270 [ 479.494937][T11606] ? enqueue_hrtimer+0xad/0x200 [ 479.499617][T11606] ? __hrtimer_run_queues+0x438/0xa50 [ 479.504826][T11606] ? __hrtimer_run_queues+0x9ea/0xa50 [ 479.510045][T11606] ? ktime_get+0x10e/0x140 [ 479.514398][T11606] ? lapic_next_event+0x5f/0x70 [ 479.519078][T11606] ? clockevents_program_event+0x214/0x2c0 [ 479.524718][T11606] ? hrtimer_interrupt+0x6a8/0x8b0 [ 479.529666][T11606] ? debug_smp_processor_id+0x17/0x20 [ 479.535042][T11606] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 479.541037][T11606] __x64_sys_bpf+0x7b/0x90 [ 479.545285][T11606] do_syscall_64+0x34/0x70 [ 479.549533][T11606] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 479.555277][T11606] RIP: 0033:0x7fc52546e819 [ 479.559516][T11606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 479.578956][T11606] RSP: 002b:00007fc523ae7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 479.587232][T11606] RAX: ffffffffffffffda RBX: 00007fc525625fa0 RCX: 00007fc52546e819 [ 479.595022][T11606] RDX: 0000000000000048 RSI: 0000000020000040 RDI: 0000000000000000 [ 479.602996][T11606] RBP: 00007fc523ae7090 R08: 0000000000000000 R09: 0000000000000000 [ 479.610830][T11606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 479.618622][T11606] R13: 0000000000000000 R14: 00007fc525625fa0 R15: 00007ffd425d1dc8 [ 482.871635][T11678] FAULT_INJECTION: forcing a failure. [ 482.871635][T11678] name failslab, interval 1, probability 0, space 0, times 0 [ 483.002594][T11678] CPU: 0 PID: 11678 Comm: syz.5.3769 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 483.013786][T11678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 483.023672][T11678] Call Trace: [ 483.026809][T11678] dump_stack_lvl+0x1e2/0x24b [ 483.031314][T11678] ? bfq_pos_tree_add_move+0x43b/0x43b [ 483.036609][T11678] dump_stack+0x15/0x17 [ 483.040601][T11678] should_fail+0x3c6/0x510 [ 483.044856][T11678] ? security_file_alloc+0x29/0x120 [ 483.049890][T11678] __should_failslab+0xa4/0xe0 [ 483.054748][T11678] should_failslab+0x9/0x20 [ 483.059091][T11678] kmem_cache_alloc+0x3d/0x2e0 [ 483.063694][T11678] ? __alloc_file+0x29/0x330 [ 483.068118][T11678] security_file_alloc+0x29/0x120 [ 483.072980][T11678] __alloc_file+0xbf/0x330 [ 483.077237][T11678] alloc_empty_file+0x95/0x180 [ 483.082264][T11678] alloc_file+0x5a/0x4e0 [ 483.086348][T11678] alloc_file_pseudo+0x259/0x2f0 [ 483.091117][T11678] ? alloc_empty_file_noaccount+0x80/0x80 [ 483.096849][T11678] __anon_inode_getfd+0x2aa/0x430 [ 483.101706][T11678] ? anon_inode_getfd+0x40/0x40 [ 483.106390][T11678] ? __kasan_check_write+0x14/0x20 [ 483.111437][T11678] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 483.116465][T11678] anon_inode_getfd+0x33/0x40 [ 483.120975][T11678] btf_new_fd+0x754/0x9c0 [ 483.125229][T11678] __se_sys_bpf+0x1aed/0x11cb0 [ 483.129845][T11678] ? stack_trace_save+0x113/0x1c0 [ 483.134688][T11678] ? terminate_walk+0x407/0x4f0 [ 483.139372][T11678] ? stack_trace_snprint+0xf0/0xf0 [ 483.144324][T11678] ? kmem_cache_free+0xa9/0x1e0 [ 483.149006][T11678] ? kmem_cache_free+0xa9/0x1e0 [ 483.153693][T11678] ? kasan_set_track+0x5d/0x70 [ 483.158293][T11678] ? __x64_sys_bpf+0x90/0x90 [ 483.162720][T11678] ? __kasan_slab_free+0x11/0x20 [ 483.167493][T11678] ? slab_free_freelist_hook+0xc0/0x190 [ 483.172875][T11678] ? kmem_cache_free+0xa9/0x1e0 [ 483.177559][T11678] ? putname+0xe7/0x140 [ 483.181560][T11678] ? do_sys_openat2+0x1fc/0x710 [ 483.187348][T11678] ? __x64_sys_openat+0x243/0x290 [ 483.192249][T11678] ? do_syscall_64+0x34/0x70 [ 483.196986][T11678] ? _kstrtoull+0x3a0/0x4a0 [ 483.201279][T11678] ? kstrtouint_from_user+0x20a/0x2a0 [ 483.206861][T11678] ? kstrtol_from_user+0x310/0x310 [ 483.211843][T11678] ? memset+0x35/0x40 [ 483.215841][T11678] ? __fsnotify_parent+0x4b9/0x6c0 [ 483.220756][T11678] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 483.227298][T11678] ? proc_fail_nth_write+0x20b/0x290 [ 483.232658][T11678] ? proc_fail_nth_read+0x210/0x210 [ 483.237689][T11678] ? security_file_permission+0x86/0xb0 [ 483.243069][T11678] ? rw_verify_area+0x1c3/0x360 [ 483.247759][T11678] ? preempt_count_add+0x92/0x1a0 [ 483.252615][T11678] ? vfs_write+0x852/0xe70 [ 483.258778][T11678] ? kmem_cache_free+0xa9/0x1e0 [ 483.263670][T11678] ? kernel_write+0x3d0/0x3d0 [ 483.269617][T11678] ? __kasan_check_write+0x14/0x20 [ 483.274553][T11678] ? mutex_lock+0xa5/0x110 [ 483.278810][T11678] ? mutex_trylock+0xa0/0xa0 [ 483.285015][T11678] ? __kasan_check_write+0x14/0x20 [ 483.290030][T11678] ? fput_many+0x160/0x1b0 [ 483.294466][T11678] ? debug_smp_processor_id+0x17/0x20 [ 483.299666][T11678] __x64_sys_bpf+0x7b/0x90 [ 483.303918][T11678] do_syscall_64+0x34/0x70 [ 483.308182][T11678] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 483.313898][T11678] RIP: 0033:0x7f6945ae2819 [ 483.318152][T11678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 483.337602][T11678] RSP: 002b:00007f694415b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 483.345931][T11678] RAX: ffffffffffffffda RBX: 00007f6945c99fa0 RCX: 00007f6945ae2819 [ 483.353834][T11678] RDX: 0000000000000028 RSI: 0000000020000480 RDI: 0000000000000012 [ 483.361666][T11678] RBP: 00007f694415b090 R08: 0000000000000000 R09: 0000000000000000 [ 483.371450][T11678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 483.379251][T11678] R13: 0000000000000000 R14: 00007f6945c99fa0 R15: 00007ffd624fa1a8 [ 484.787260][T11719] device macsec0 entered promiscuous mode [ 484.938622][T11732] syz.5.3788[11732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.938669][T11732] syz.5.3788[11732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.910387][T11781] ÿÿÿÿÿÿ: renamed from vlan1 [ 489.428725][T11823] ÿÿÿÿÿÿ: renamed from vlan1 [ 491.319437][T11875] device syzkaller0 entered promiscuous mode [ 491.547703][ T1511] syzkaller0: tun_net_xmit 48 [ 496.083611][T11991] device syzkaller0 entered promiscuous mode [ 496.657928][T12025] syz.8.3890[12025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 496.657974][T12025] syz.8.3890[12025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.358059][T12054] FAULT_INJECTION: forcing a failure. [ 497.358059][T12054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 497.418048][T12054] CPU: 0 PID: 12054 Comm: syz.6.3901 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 497.432154][T12054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 497.444492][T12054] Call Trace: [ 497.448094][T12054] dump_stack_lvl+0x1e2/0x24b [ 497.452576][T12054] ? bfq_pos_tree_add_move+0x43b/0x43b [ 497.457862][T12054] dump_stack+0x15/0x17 [ 497.461868][T12054] should_fail+0x3c6/0x510 [ 497.466192][T12054] should_fail_usercopy+0x1a/0x20 [ 497.471057][T12054] _copy_to_user+0x20/0x90 [ 497.475491][T12054] simple_read_from_buffer+0xc7/0x150 [ 497.481043][T12054] proc_fail_nth_read+0x1a3/0x210 [ 497.485893][T12054] ? proc_fault_inject_write+0x390/0x390 [ 497.491360][T12054] ? security_file_permission+0x86/0xb0 [ 497.496740][T12054] ? rw_verify_area+0x1c3/0x360 [ 497.501427][T12054] ? proc_fault_inject_write+0x390/0x390 [ 497.506893][T12054] vfs_read+0x200/0xba0 [ 497.510889][T12054] ? kernel_read+0x70/0x70 [ 497.515149][T12054] ? __kasan_check_write+0x14/0x20 [ 497.520085][T12054] ? mutex_lock+0xa5/0x110 [ 497.524337][T12054] ? mutex_trylock+0xa0/0xa0 [ 497.528782][T12054] ? __fdget_pos+0x2e7/0x3a0 [ 497.533200][T12054] ? ksys_read+0x77/0x2c0 [ 497.537755][T12054] ksys_read+0x199/0x2c0 [ 497.541828][T12054] ? vfs_write+0xe70/0xe70 [ 497.546049][T12054] ? debug_smp_processor_id+0x17/0x20 [ 497.551256][T12054] __x64_sys_read+0x7b/0x90 [ 497.555683][T12054] do_syscall_64+0x34/0x70 [ 497.559928][T12054] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 497.565651][T12054] RIP: 0033:0x7fc52546d25c [ 497.570044][T12054] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 497.589569][T12054] RSP: 002b:00007fc523ae7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 497.598484][T12054] RAX: ffffffffffffffda RBX: 00007fc525625fa0 RCX: 00007fc52546d25c [ 497.606398][T12054] RDX: 000000000000000f RSI: 00007fc523ae70a0 RDI: 0000000000000005 [ 497.614218][T12054] RBP: 00007fc523ae7090 R08: 0000000000000000 R09: 0000000000000000 [ 497.622207][T12054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 497.630529][T12054] R13: 0000000000000000 R14: 00007fc525625fa0 R15: 00007ffd425d1dc8 [ 497.683145][T12058] : renamed from veth0_vlan [ 497.844035][T12074] FAULT_INJECTION: forcing a failure. [ 497.844035][T12074] name failslab, interval 1, probability 0, space 0, times 0 [ 497.927275][T12074] CPU: 0 PID: 12074 Comm: syz.6.3910 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 497.940227][T12074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 497.950111][T12074] Call Trace: [ 497.953249][T12074] dump_stack_lvl+0x1e2/0x24b [ 497.957756][T12074] ? panic+0x812/0x812 [ 497.961662][T12074] ? free_unref_page_commit+0x247/0x2e0 [ 497.967042][T12074] ? bfq_pos_tree_add_move+0x43b/0x43b [ 497.972336][T12074] dump_stack+0x15/0x17 [ 497.976333][T12074] should_fail+0x3c6/0x510 [ 497.980585][T12074] ? inode_doinit_use_xattr+0x60/0x400 [ 497.985874][T12074] __should_failslab+0xa4/0xe0 [ 497.991014][T12074] should_failslab+0x9/0x20 [ 497.995327][T12074] kmem_cache_alloc_trace+0x3a/0x2e0 [ 498.000450][T12074] inode_doinit_use_xattr+0x60/0x400 [ 498.005684][T12074] inode_doinit_with_dentry+0xa6c/0x1050 [ 498.011679][T12074] ? sb_finish_set_opts+0x7a0/0x7a0 [ 498.016699][T12074] ? atime_needs_update+0x5a0/0x5a0 [ 498.021731][T12074] ? _raw_spin_unlock+0x4d/0x70 [ 498.026432][T12074] selinux_d_instantiate+0x27/0x40 [ 498.031546][T12074] security_d_instantiate+0x9f/0x100 [ 498.036666][T12074] d_splice_alias+0x6d/0x390 [ 498.041110][T12074] kernfs_iop_lookup+0x2a4/0x2f0 [ 498.045870][T12074] __lookup_slow+0x2b9/0x400 [ 498.050303][T12074] ? lookup_one_len+0x2c0/0x2c0 [ 498.054982][T12074] ? lookup_fast+0x32f/0x7d0 [ 498.059407][T12074] ? security_inode_permission+0xb0/0xf0 [ 498.064871][T12074] ? handle_dots+0x1030/0x1030 [ 498.069597][T12074] ? inode_permission+0xf1/0x500 [ 498.074369][T12074] lookup_slow+0x5a/0x80 [ 498.078448][T12074] walk_component+0x48c/0x610 [ 498.082961][T12074] ? nd_alloc_stack+0xf0/0xf0 [ 498.087475][T12074] ? handle_lookup_down+0x130/0x130 [ 498.092515][T12074] path_lookupat+0x16d/0x450 [ 498.096937][T12074] filename_lookup+0x26a/0x6f0 [ 498.101539][T12074] ? hashlen_string+0x120/0x120 [ 498.106228][T12074] ? memcpy+0x56/0x70 [ 498.110043][T12074] ? getname_kernel+0x1f8/0x2e0 [ 498.114728][T12074] kern_path+0x35/0x40 [ 498.118635][T12074] create_local_trace_uprobe+0xa2/0x6f0 [ 498.124538][T12074] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 498.130147][T12074] ? _copy_from_user+0x96/0xd0 [ 498.134783][T12074] perf_uprobe_init+0xfa/0x1a0 [ 498.139387][T12074] perf_uprobe_event_init+0x106/0x190 [ 498.144598][T12074] perf_try_init_event+0x143/0x410 [ 498.149532][T12074] perf_event_alloc+0xcf5/0x1970 [ 498.154312][T12074] __se_sys_perf_event_open+0x7ab/0x3c30 [ 498.159777][T12074] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 498.166003][T12074] ? __ia32_sys_read+0x90/0x90 [ 498.170727][T12074] __x64_sys_perf_event_open+0xbf/0xd0 [ 498.176840][T12074] do_syscall_64+0x34/0x70 [ 498.181685][T12074] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 498.188194][T12074] RIP: 0033:0x7fc52546e819 [ 498.192586][T12074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 498.212225][T12074] RSP: 002b:00007fc523ae7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 498.220555][T12074] RAX: ffffffffffffffda RBX: 00007fc525625fa0 RCX: 00007fc52546e819 [ 498.228332][T12074] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 498.236152][T12074] RBP: 00007fc523ae7090 R08: 0000000000000000 R09: 0000000000000000 [ 498.243954][T12074] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 498.251773][T12074] R13: 0000000000000000 R14: 00007fc525625fa0 R15: 00007ffd425d1dc8 [ 498.614519][T12098] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 498.623606][T12098] device syzkaller0 entered promiscuous mode [ 498.902844][T12122] device syzkaller0 entered promiscuous mode [ 500.750657][T12162] device veth1_macvtap left promiscuous mode [ 500.841531][T12162] device macsec0 entered promiscuous mode [ 502.715265][T12227] device syzkaller0 entered promiscuous mode [ 503.051848][T12236] : renamed from ipvlan1 [ 503.977856][ T24] audit: type=1400 audit(1732196301.599:176): avc: denied { create } for pid=12251 comm="syz.8.3966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 505.947236][T12298] FAULT_INJECTION: forcing a failure. [ 505.947236][T12298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 505.980543][T12298] CPU: 1 PID: 12298 Comm: syz.6.3979 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 505.991823][T12298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 506.001716][T12298] Call Trace: [ 506.005107][T12298] dump_stack_lvl+0x1e2/0x24b [ 506.009616][T12298] ? bfq_pos_tree_add_move+0x43b/0x43b [ 506.014994][T12298] dump_stack+0x15/0x17 [ 506.018982][T12298] should_fail+0x3c6/0x510 [ 506.023240][T12298] should_fail_alloc_page+0x52/0x60 [ 506.028268][T12298] __alloc_pages_nodemask+0x1b3/0xaf0 [ 506.033487][T12298] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 506.039209][T12298] ? __kasan_kmalloc+0x9/0x10 [ 506.043717][T12298] ? bpf_ringbuf_alloc+0x6b/0x410 [ 506.048589][T12298] bpf_ringbuf_alloc+0x100/0x410 [ 506.053353][T12298] ringbuf_map_alloc+0x275/0x3a0 [ 506.058138][T12298] __se_sys_bpf+0x620f/0x11cb0 [ 506.062732][T12298] ? perf_event_output_forward+0x14e/0x1b0 [ 506.068368][T12298] ? __x64_sys_bpf+0x90/0x90 [ 506.072792][T12298] ? kvm_sched_clock_read+0x18/0x40 [ 506.077826][T12298] ? sched_clock+0x3a/0x40 [ 506.082083][T12298] ? sched_clock_cpu+0x1b/0x3b0 [ 506.086766][T12298] ? sched_clock+0x3a/0x40 [ 506.091048][T12298] ? __irq_exit_rcu+0x40/0x150 [ 506.095618][T12298] ? irq_exit_rcu+0x9/0x10 [ 506.099874][T12298] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 506.105516][T12298] ? memset+0x35/0x40 [ 506.109333][T12298] ? __fsnotify_parent+0x4b9/0x6c0 [ 506.114280][T12298] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 506.120709][T12298] ? proc_fail_nth_write+0x20b/0x290 [ 506.125822][T12298] ? proc_fail_nth_read+0x210/0x210 [ 506.130858][T12298] ? security_file_permission+0x86/0xb0 [ 506.136239][T12298] ? rw_verify_area+0x1c3/0x360 [ 506.140927][T12298] ? preempt_count_add+0x92/0x1a0 [ 506.145784][T12298] ? vfs_write+0x852/0xe70 [ 506.150037][T12298] ? __hrtimer_run_queues+0x438/0xa50 [ 506.155251][T12298] ? kvm_sched_clock_read+0x18/0x40 [ 506.160287][T12298] ? sched_clock+0x3a/0x40 [ 506.164640][T12298] ? sched_clock_cpu+0x1b/0x3b0 [ 506.170511][T12298] ? sched_clock+0x3a/0x40 [ 506.174926][T12298] ? __irq_exit_rcu+0x40/0x150 [ 506.179788][T12298] __x64_sys_bpf+0x7b/0x90 [ 506.187522][T12298] do_syscall_64+0x34/0x70 [ 506.191982][T12298] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 506.198141][T12298] RIP: 0033:0x7fc52546e819 [ 506.202383][T12298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.222268][T12298] RSP: 002b:00007fc523ae7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 506.230492][T12298] RAX: ffffffffffffffda RBX: 00007fc525625fa0 RCX: 00007fc52546e819 [ 506.238321][T12298] RDX: 0000000000000050 RSI: 00000000200009c0 RDI: 0000000000000000 [ 506.246125][T12298] RBP: 00007fc523ae7090 R08: 0000000000000000 R09: 0000000000000000 [ 506.253958][T12298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 506.261833][T12298] R13: 0000000000000000 R14: 00007fc525625fa0 R15: 00007ffd425d1dc8 [ 506.817703][T12322] syz.7.3988[12322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.817757][T12322] syz.7.3988[12322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.675342][ T304] device bridge_slave_1 left promiscuous mode [ 507.695481][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.714078][ T304] device bridge_slave_0 left promiscuous mode [ 507.720351][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.734319][ T304] device veth1_macvtap left promiscuous mode [ 507.752006][ T304] device veth0_vlan left promiscuous mode [ 508.002824][T12356] : renamed from veth0_vlan [ 508.193058][T12393] device syzkaller0 entered promiscuous mode [ 508.266343][T12361] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.273325][T12361] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.280521][T12361] device bridge_slave_0 entered promiscuous mode [ 508.287751][T12361] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.295900][T12361] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.303187][T12361] device bridge_slave_1 entered promiscuous mode [ 508.368971][T12361] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.375890][T12361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 508.383079][T12361] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.389907][T12361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 508.466863][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 508.476799][ T1372] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.651820][ T1372] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.701012][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 508.719426][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 508.727515][ T1372] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.734484][ T1372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 508.741786][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 508.750011][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 508.758251][ T1372] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.765158][ T1372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 508.782840][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 508.790967][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 508.798807][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 508.807443][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 508.848888][T12361] device veth0_vlan entered promiscuous mode [ 508.954425][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 509.082301][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 509.208532][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 509.309164][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 509.342160][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 509.405897][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 509.485374][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 509.533859][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 509.681508][T12361] device veth1_macvtap entered promiscuous mode [ 509.742233][T12434] FAULT_INJECTION: forcing a failure. [ 509.742233][T12434] name failslab, interval 1, probability 0, space 0, times 0 [ 509.798899][T12434] CPU: 1 PID: 12434 Comm: syz.8.4030 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 509.810653][T12434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 509.821146][T12434] Call Trace: [ 509.824288][T12434] dump_stack_lvl+0x1e2/0x24b [ 509.828789][T12434] ? bfq_pos_tree_add_move+0x43b/0x43b [ 509.834089][T12434] dump_stack+0x15/0x17 [ 509.838078][T12434] should_fail+0x3c6/0x510 [ 509.842330][T12434] ? copy_mm+0x198/0x13a0 [ 509.846494][T12434] __should_failslab+0xa4/0xe0 [ 509.851184][T12434] should_failslab+0x9/0x20 [ 509.855521][T12434] kmem_cache_alloc+0x3d/0x2e0 [ 509.860123][T12434] copy_mm+0x198/0x13a0 [ 509.864121][T12434] ? _raw_spin_lock+0xa4/0x1b0 [ 509.868715][T12434] ? copy_signal+0x610/0x610 [ 509.873145][T12434] ? __kasan_check_write+0x14/0x20 [ 509.878086][T12434] ? __init_rwsem+0xd6/0x1c0 [ 509.882515][T12434] ? copy_signal+0x4e3/0x610 [ 509.886943][T12434] copy_process+0x1175/0x3340 [ 509.891456][T12434] ? proc_fail_nth_write+0x20b/0x290 [ 509.896576][T12434] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 509.901519][T12434] ? vfs_write+0x852/0xe70 [ 509.905778][T12434] ? kmem_cache_free+0xa9/0x1e0 [ 509.910472][T12434] kernel_clone+0x21e/0x9e0 [ 509.915801][T12434] ? __kasan_check_write+0x14/0x20 [ 509.920746][T12434] ? create_io_thread+0x1e0/0x1e0 [ 509.925704][T12434] __x64_sys_clone+0x23f/0x290 [ 509.932306][T12434] ? __do_sys_vfork+0x130/0x130 [ 509.938171][T12434] ? debug_smp_processor_id+0x17/0x20 [ 509.943512][T12434] do_syscall_64+0x34/0x70 [ 509.947785][T12434] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 509.953485][T12434] RIP: 0033:0x7f7884a4c819 [ 509.957745][T12434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 509.977612][T12434] RSP: 002b:00007f78830c4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 509.985858][T12434] RAX: ffffffffffffffda RBX: 00007f7884c03fa0 RCX: 00007f7884a4c819 [ 509.993669][T12434] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000025001200 [ 510.001473][T12434] RBP: 00007f78830c5090 R08: 0000000000000000 R09: 0000000000000000 [ 510.009463][T12434] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 510.017356][T12434] R13: 0000000000000000 R14: 00007f7884c03fa0 R15: 00007fff35c29268 [ 510.070102][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 510.094881][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 510.111110][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 510.145607][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 510.161384][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 512.035059][T12515] device syzkaller0 entered promiscuous mode [ 513.982439][T12594] FAULT_INJECTION: forcing a failure. [ 513.982439][T12594] name failslab, interval 1, probability 0, space 0, times 0 [ 514.052935][T12594] CPU: 0 PID: 12594 Comm: syz.9.4085 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 514.064281][T12594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 514.075082][T12594] Call Trace: [ 514.078218][T12594] dump_stack_lvl+0x1e2/0x24b [ 514.083158][T12594] ? panic+0x812/0x812 [ 514.087065][T12594] ? free_unref_page_commit+0x247/0x2e0 [ 514.092443][T12594] ? bfq_pos_tree_add_move+0x43b/0x43b [ 514.097742][T12594] dump_stack+0x15/0x17 [ 514.101744][T12594] should_fail+0x3c6/0x510 [ 514.105992][T12594] ? inode_doinit_use_xattr+0x60/0x400 [ 514.111282][T12594] __should_failslab+0xa4/0xe0 [ 514.115885][T12594] should_failslab+0x9/0x20 [ 514.120216][T12594] kmem_cache_alloc_trace+0x3a/0x2e0 [ 514.125339][T12594] inode_doinit_use_xattr+0x60/0x400 [ 514.130459][T12594] inode_doinit_with_dentry+0xa6c/0x1050 [ 514.135929][T12594] ? sb_finish_set_opts+0x7a0/0x7a0 [ 514.140966][T12594] ? atime_needs_update+0x5a0/0x5a0 [ 514.145997][T12594] ? _raw_spin_unlock+0x4d/0x70 [ 514.151394][T12594] selinux_d_instantiate+0x27/0x40 [ 514.156465][T12594] security_d_instantiate+0x9f/0x100 [ 514.161674][T12594] d_splice_alias+0x6d/0x390 [ 514.169266][T12594] kernfs_iop_lookup+0x2a4/0x2f0 [ 514.174022][T12594] __lookup_slow+0x2b9/0x400 [ 514.178441][T12594] ? lookup_one_len+0x2c0/0x2c0 [ 514.183128][T12594] ? lookup_fast+0x32f/0x7d0 [ 514.188244][T12594] ? security_inode_permission+0xb0/0xf0 [ 514.195335][T12594] ? handle_dots+0x1030/0x1030 [ 514.200280][T12594] ? inode_permission+0xf1/0x500 [ 514.205055][T12594] lookup_slow+0x5a/0x80 [ 514.209473][T12594] walk_component+0x48c/0x610 [ 514.214068][T12594] ? nd_alloc_stack+0xf0/0xf0 [ 514.218578][T12594] ? handle_lookup_down+0x130/0x130 [ 514.223613][T12594] path_lookupat+0x16d/0x450 [ 514.228125][T12594] filename_lookup+0x26a/0x6f0 [ 514.232726][T12594] ? hashlen_string+0x120/0x120 [ 514.237510][T12594] ? memcpy+0x56/0x70 [ 514.241320][T12594] ? getname_kernel+0x1f8/0x2e0 [ 514.246006][T12594] kern_path+0x35/0x40 [ 514.249912][T12594] create_local_trace_uprobe+0xa2/0x6f0 [ 514.255464][T12594] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 514.260584][T12594] ? _copy_from_user+0x96/0xd0 [ 514.265189][T12594] perf_uprobe_init+0xfa/0x1a0 [ 514.269790][T12594] perf_uprobe_event_init+0x106/0x190 [ 514.274993][T12594] perf_try_init_event+0x143/0x410 [ 514.279940][T12594] perf_event_alloc+0xcf5/0x1970 [ 514.284721][T12594] __se_sys_perf_event_open+0x7ab/0x3c30 [ 514.290189][T12594] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 514.295655][T12594] ? __ia32_sys_read+0x90/0x90 [ 514.300271][T12594] __x64_sys_perf_event_open+0xbf/0xd0 [ 514.305558][T12594] do_syscall_64+0x34/0x70 [ 514.310122][T12594] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 514.316006][T12594] RIP: 0033:0x7f1b46936819 [ 514.320249][T12594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 514.340658][T12594] RSP: 002b:00007f1b44faf038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 514.349006][T12594] RAX: ffffffffffffffda RBX: 00007f1b46aedfa0 RCX: 00007f1b46936819 [ 514.356882][T12594] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 514.364945][T12594] RBP: 00007f1b44faf090 R08: 0000000000000000 R09: 0000000000000000 [ 514.373201][T12594] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 514.381098][T12594] R13: 0000000000000000 R14: 00007f1b46aedfa0 R15: 00007ffc53dcc408 [ 514.542830][T12599] device sit0 left promiscuous mode [ 516.443351][T12665] device pim6reg1 entered promiscuous mode [ 522.725228][T12821] device syzkaller0 entered promiscuous mode [ 524.787380][T12873] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.798505][T12873] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.535476][T12886] device bridge_slave_1 left promiscuous mode [ 525.541577][T12886] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.558973][T12886] device bridge_slave_0 left promiscuous mode [ 525.568858][T12886] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.948658][T12950] device macsec0 left promiscuous mode [ 528.321916][T12950] device veth1_macvtap entered promiscuous mode [ 528.328006][T12950] device macsec0 entered promiscuous mode [ 528.482014][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 528.797522][T12966] device sit0 entered promiscuous mode [ 544.196588][T13358] device syzkaller0 entered promiscuous mode [ 544.243581][ T372] syzkaller0: tun_net_xmit 48 [ 545.989975][T13415] device syzkaller0 entered promiscuous mode [ 548.415389][T13504] device syzkaller0 entered promiscuous mode [ 551.525195][T13643] tun0: tun_chr_ioctl cmd 1074812118 [ 553.275020][T13707] device macsec0 left promiscuous mode [ 553.642110][T13744] ÿÿÿÿÿÿ: renamed from vlan1 [ 556.333512][T13825] device syzkaller0 entered promiscuous mode [ 556.414335][T13826] : renamed from veth0_vlan [ 559.699848][T13923] bridge0: port 2(bridge_slave_1) entered disabled state [ 559.707609][T13923] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.950843][T13978] device sit0 left promiscuous mode [ 565.185598][T14060] device syzkaller0 entered promiscuous mode [ 565.205383][ T6106] syzkaller0: tun_net_xmit 48 [ 569.101927][T14172] device macsec0 left promiscuous mode [ 569.520652][T14184] device syzkaller0 entered promiscuous mode [ 573.289301][T14245] device syzkaller0 entered promiscuous mode [ 578.906570][T14369] device wg2 entered promiscuous mode [ 581.112321][T14439] device syzkaller0 entered promiscuous mode [ 596.317762][T14850] device veth1_macvtap left promiscuous mode [ 596.411102][T14850] device macsec0 entered promiscuous mode [ 598.062609][T14914] FAULT_INJECTION: forcing a failure. [ 598.062609][T14914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 598.198051][T14914] CPU: 0 PID: 14914 Comm: syz.9.4903 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 598.211333][T14914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 598.221222][T14914] Call Trace: [ 598.224359][T14914] dump_stack_lvl+0x1e2/0x24b [ 598.228868][T14914] ? bfq_pos_tree_add_move+0x43b/0x43b [ 598.234156][T14914] ? kasan_set_track+0x5d/0x70 [ 598.238756][T14914] ? memset+0x35/0x40 [ 598.242574][T14914] dump_stack+0x15/0x17 [ 598.246564][T14914] should_fail+0x3c6/0x510 [ 598.250820][T14914] should_fail_usercopy+0x1a/0x20 [ 598.255674][T14914] _copy_from_user+0x20/0xd0 [ 598.260102][T14914] iovec_from_user+0xc7/0x330 [ 598.264613][T14914] __import_iovec+0x6d/0x3b0 [ 598.269040][T14914] ? __fsnotify_parent+0x4b9/0x6c0 [ 598.273989][T14914] import_iovec+0xe5/0x120 [ 598.278280][T14914] ___sys_recvmsg+0x56b/0x690 [ 598.282753][T14914] ? __sys_recvmsg+0x270/0x270 [ 598.287401][T14914] ? __fdget+0x1bc/0x240 [ 598.291432][T14914] __x64_sys_recvmsg+0x1ee/0x2c0 [ 598.296215][T14914] ? ___sys_recvmsg+0x690/0x690 [ 598.301332][T14914] ? debug_smp_processor_id+0x17/0x20 [ 598.306998][T14914] do_syscall_64+0x34/0x70 [ 598.311253][T14914] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 598.317541][T14914] RIP: 0033:0x7f1b46936819 [ 598.322308][T14914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 598.344502][T14914] RSP: 002b:00007f1b44faf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 598.352741][T14914] RAX: ffffffffffffffda RBX: 00007f1b46aedfa0 RCX: 00007f1b46936819 [ 598.360555][T14914] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 598.368532][T14914] RBP: 00007f1b44faf090 R08: 0000000000000000 R09: 0000000000000000 [ 598.376342][T14914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 598.384154][T14914] R13: 0000000000000000 R14: 00007f1b46aedfa0 R15: 00007ffc53dcc408 [ 600.848807][T14985] device syzkaller0 entered promiscuous mode [ 636.005807][T15218] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.013018][T15218] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.021197][T15218] device bridge_slave_0 entered promiscuous mode [ 636.028817][T15218] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.035758][T15218] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.042831][T15218] device bridge_slave_1 entered promiscuous mode [ 636.098985][T15220] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.106013][T15220] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.114044][T15220] device bridge_slave_0 entered promiscuous mode [ 636.135282][T15220] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.142362][T15220] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.151381][T15220] device bridge_slave_1 entered promiscuous mode [ 636.177345][T15222] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.184499][T15222] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.191801][T15222] device bridge_slave_0 entered promiscuous mode [ 636.199429][T15222] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.206415][T15222] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.213572][T15222] device bridge_slave_1 entered promiscuous mode [ 636.254101][T15219] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.261230][T15219] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.270567][T15219] device bridge_slave_0 entered promiscuous mode [ 636.278764][T15219] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.287101][T15219] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.294655][T15219] device bridge_slave_1 entered promiscuous mode [ 636.372822][T15221] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.379659][T15221] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.387115][T15221] device bridge_slave_0 entered promiscuous mode [ 636.394346][T15221] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.401208][T15221] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.415718][T15221] device bridge_slave_1 entered promiscuous mode [ 636.461025][T15220] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.470930][T15220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 636.480523][T15220] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.487760][T15220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 636.509239][T15222] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.516090][T15222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 636.523174][T15222] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.529958][T15222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 636.561275][T15218] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.568100][T15218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 636.575208][T15218] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.582000][T15218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 636.603204][T15219] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.610030][T15219] bridge0: port 2(bridge_slave_1) entered forwarding state [ 636.617137][T15219] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.623929][T15219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 636.639648][T15221] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.646490][T15221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 636.653580][T15221] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.660373][T15221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 636.695416][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.702590][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.709480][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 636.716836][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 636.725094][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 636.733110][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 636.740322][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 636.748610][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 636.756742][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.763927][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.771547][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.778503][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 636.786207][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.813691][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 636.821479][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 636.829112][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 636.851156][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 636.858635][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 636.866460][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 636.875545][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 636.883985][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.891354][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 636.902877][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 636.914850][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 636.926081][ T9760] device bridge_slave_1 left promiscuous mode [ 636.940284][ T9760] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.947978][ T9760] device bridge_slave_0 left promiscuous mode [ 636.954418][ T9760] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.962130][ T9760] device veth1_macvtap left promiscuous mode [ 637.057066][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 637.065316][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 637.073391][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 637.080218][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 637.090933][T15222] device veth0_vlan entered promiscuous mode [ 637.111010][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 637.118717][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.127201][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 637.135328][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 637.143554][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 637.150376][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 637.158138][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 637.172665][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 637.180589][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 637.187500][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 637.195218][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 637.203391][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 637.211535][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 637.218356][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 637.225681][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 637.233787][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 637.241874][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 637.248703][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 637.256030][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 637.263858][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 637.271805][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 637.279536][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 637.287261][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 637.295085][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 637.302887][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.310092][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.335966][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 637.344192][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 637.352356][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 637.360177][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 637.369773][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 637.378175][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 637.397492][T15218] device veth0_vlan entered promiscuous mode [ 637.409367][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 637.417992][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 637.429410][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 637.439846][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 637.448258][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 637.456275][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 637.464080][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.471938][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 637.479513][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.487408][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.494943][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.502647][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.510236][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.518393][T15222] device veth1_macvtap entered promiscuous mode [ 637.529918][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.538236][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.545858][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.554323][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 637.564296][T15219] device veth0_vlan entered promiscuous mode [ 637.573239][T15221] device veth0_vlan entered promiscuous mode [ 637.585387][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 637.594107][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 637.603787][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 637.611848][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 637.625017][T15219] device veth1_macvtap entered promiscuous mode [ 637.633980][T15220] device veth0_vlan entered promiscuous mode [ 637.640095][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 637.648358][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 637.656446][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 637.668789][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 637.677825][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 637.686881][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 637.695111][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.703280][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.710708][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.721746][T15218] device veth1_macvtap entered promiscuous mode [ 637.735873][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 637.743616][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 637.752015][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 637.760320][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 637.769107][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 637.789916][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 637.798246][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 637.806512][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 637.814813][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 637.830639][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 637.840421][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 637.852639][T15221] device veth1_macvtap entered promiscuous mode [ 637.875821][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 637.884926][T15220] device veth1_macvtap entered promiscuous mode [ 637.901516][T15241] device veth0_vlan left promiscuous mode [ 637.907679][T15241] device veth0_vlan entered promiscuous mode [ 637.924033][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 637.940620][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 638.002344][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 638.031858][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 638.056078][T15248] bridge0: port 2(bridge_slave_1) entered disabled state [ 638.066671][T15248] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.360946][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 638.376456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 638.385025][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 638.394139][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 638.728191][ T24] audit: type=1400 audit(1732196436.339:177): avc: denied { create } for pid=15275 comm="syz.3.5009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 639.571376][T15288] syz.2.5013[15288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.578731][T15288] syz.2.5013[15288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.931184][ T9760] device bridge_slave_1 left promiscuous mode [ 640.032440][ T9760] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.090380][ T9760] device bridge_slave_0 left promiscuous mode [ 640.107759][ T9760] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.123815][ T9760] device bridge_slave_1 left promiscuous mode [ 640.139281][ T9760] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.167405][ T9760] device bridge_slave_0 left promiscuous mode [ 640.221381][ T9760] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.319966][ T9760] device veth0_vlan left promiscuous mode [ 640.380885][ T9760] device veth0_vlan left promiscuous mode [ 641.604750][T15324] device veth1_macvtap left promiscuous mode [ 641.836213][T15327] bridge0: port 2(bridge_slave_1) entered disabled state [ 641.850678][T15327] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.159678][T15330] bridge0: port 2(bridge_slave_1) entered blocking state [ 642.166573][T15330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 642.173687][T15330] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.180507][T15330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 642.540919][T15330] device bridge0 entered promiscuous mode [ 642.745607][T15341] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 642.939675][T15341] device syzkaller0 entered promiscuous mode [ 644.176313][T15364] device veth0_vlan left promiscuous mode [ 644.252469][T15364] device veth0_vlan entered promiscuous mode [ 644.909029][T15387] device syzkaller0 entered promiscuous mode [ 644.922541][ T397] syzkaller0: tun_net_xmit 48 [ 645.206437][T15392] device veth0_vlan left promiscuous mode [ 645.250400][T15392] device veth0_vlan entered promiscuous mode [ 645.349602][T15394] device veth0_vlan left promiscuous mode [ 645.419468][T15394] device veth0_vlan entered promiscuous mode [ 646.414700][T15443] device syzkaller0 entered promiscuous mode [ 649.053686][T15569] FAULT_INJECTION: forcing a failure. [ 649.053686][T15569] name failslab, interval 1, probability 0, space 0, times 0 [ 649.186659][T15569] CPU: 0 PID: 15569 Comm: syz.3.5109 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 649.197961][T15569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 649.207962][T15569] Call Trace: [ 649.211083][T15569] dump_stack_lvl+0x1e2/0x24b [ 649.215878][T15569] ? bfq_pos_tree_add_move+0x43b/0x43b [ 649.221168][T15569] ? pfn_valid+0x1e0/0x1e0 [ 649.225416][T15569] dump_stack+0x15/0x17 [ 649.229413][T15569] should_fail+0x3c6/0x510 [ 649.233666][T15569] ? vm_area_dup+0x26/0x270 [ 649.238001][T15569] __should_failslab+0xa4/0xe0 [ 649.242601][T15569] should_failslab+0x9/0x20 [ 649.246939][T15569] kmem_cache_alloc+0x3d/0x2e0 [ 649.251542][T15569] vm_area_dup+0x26/0x270 [ 649.255703][T15569] copy_mm+0x8ac/0x13a0 [ 649.259703][T15569] ? copy_signal+0x610/0x610 [ 649.264128][T15569] ? __init_rwsem+0xd6/0x1c0 [ 649.268563][T15569] ? copy_signal+0x4e3/0x610 [ 649.272981][T15569] copy_process+0x1175/0x3340 [ 649.277495][T15569] ? proc_fail_nth_write+0x20b/0x290 [ 649.282620][T15569] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 649.287674][T15569] ? vfs_write+0x852/0xe70 [ 649.291910][T15569] ? kmem_cache_free+0x1c0/0x1e0 [ 649.296935][T15569] kernel_clone+0x21e/0x9e0 [ 649.301391][T15569] ? __kasan_check_write+0x14/0x20 [ 649.306341][T15569] ? create_io_thread+0x1e0/0x1e0 [ 649.311200][T15569] __x64_sys_clone+0x23f/0x290 [ 649.315979][T15569] ? __do_sys_vfork+0x130/0x130 [ 649.320930][T15569] ? debug_smp_processor_id+0x17/0x20 [ 649.326137][T15569] do_syscall_64+0x34/0x70 [ 649.330389][T15569] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 649.336201][T15569] RIP: 0033:0x7ffbc6235819 [ 649.340454][T15569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 649.360071][T15569] RSP: 002b:00007ffbc48adfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 649.369109][T15569] RAX: ffffffffffffffda RBX: 00007ffbc63ecfa0 RCX: 00007ffbc6235819 [ 649.376903][T15569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000025001200 [ 649.384715][T15569] RBP: 00007ffbc48ae090 R08: 0000000000000000 R09: 0000000000000000 [ 649.392528][T15569] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 649.400336][T15569] R13: 0000000000000000 R14: 00007ffbc63ecfa0 R15: 00007ffe26eb11e8 [ 650.222058][T15610] device veth0_vlan left promiscuous mode [ 650.393995][T15610] device veth0_vlan entered promiscuous mode [ 650.932529][T15617] -: renamed from syzkaller0 [ 652.349515][T15667] device veth0_vlan left promiscuous mode [ 652.363162][T15667] device veth0_vlan entered promiscuous mode [ 652.738646][T15702] device veth1_macvtap left promiscuous mode [ 652.745085][T15702] device macsec0 entered promiscuous mode [ 652.919306][T15713] device pim6reg1 entered promiscuous mode [ 653.162332][T15728] device pim6reg1 entered promiscuous mode [ 653.895276][T15762] device veth0_vlan left promiscuous mode [ 654.027590][T15762] device veth0_vlan entered promiscuous mode [ 654.578409][T15795] device veth1_macvtap left promiscuous mode [ 654.715201][T15809] FAULT_INJECTION: forcing a failure. [ 654.715201][T15809] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 654.776797][T15809] CPU: 0 PID: 15809 Comm: syz.4.5197 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 654.787985][T15809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 654.797873][T15809] Call Trace: [ 654.801009][T15809] dump_stack_lvl+0x1e2/0x24b [ 654.805517][T15809] ? bfq_pos_tree_add_move+0x43b/0x43b [ 654.810813][T15809] ? 0xffffffffa00228b8 [ 654.814805][T15809] ? is_bpf_text_address+0x172/0x190 [ 654.819929][T15809] dump_stack+0x15/0x17 [ 654.824007][T15809] should_fail+0x3c6/0x510 [ 654.828257][T15809] should_fail_usercopy+0x1a/0x20 [ 654.833133][T15809] _copy_from_user+0x20/0xd0 [ 654.837549][T15809] __se_sys_bpf+0x232/0x11cb0 [ 654.842060][T15809] ? stack_trace_save+0x113/0x1c0 [ 654.846918][T15809] ? terminate_walk+0x407/0x4f0 [ 654.851714][T15809] ? stack_trace_snprint+0xf0/0xf0 [ 654.856658][T15809] ? kmem_cache_free+0xa9/0x1e0 [ 654.861341][T15809] ? kmem_cache_free+0xa9/0x1e0 [ 654.866123][T15809] ? kasan_set_track+0x5d/0x70 [ 654.870730][T15809] ? __x64_sys_bpf+0x90/0x90 [ 654.875141][T15809] ? __kasan_slab_free+0x11/0x20 [ 654.879917][T15809] ? slab_free_freelist_hook+0xc0/0x190 [ 654.885298][T15809] ? kmem_cache_free+0xa9/0x1e0 [ 654.889980][T15809] ? putname+0xe7/0x140 [ 654.894059][T15809] ? do_sys_openat2+0x1fc/0x710 [ 654.898760][T15809] ? __x64_sys_openat+0x243/0x290 [ 654.904630][T15809] ? do_syscall_64+0x34/0x70 [ 654.909004][T15809] ? _kstrtoull+0x3a0/0x4a0 [ 654.913347][T15809] ? kstrtouint_from_user+0x20a/0x2a0 [ 654.918552][T15809] ? kstrtol_from_user+0x310/0x310 [ 654.923504][T15809] ? memset+0x35/0x40 [ 654.927358][T15809] ? __fsnotify_parent+0x4b9/0x6c0 [ 654.932268][T15809] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 654.938685][T15809] ? proc_fail_nth_write+0x20b/0x290 [ 654.943805][T15809] ? proc_fail_nth_read+0x210/0x210 [ 654.948843][T15809] ? security_file_permission+0x86/0xb0 [ 654.954223][T15809] ? rw_verify_area+0x1c3/0x360 [ 654.958910][T15809] ? preempt_count_add+0x92/0x1a0 [ 654.963772][T15809] ? vfs_write+0x852/0xe70 [ 654.968038][T15809] ? kmem_cache_free+0xa9/0x1e0 [ 654.972803][T15809] ? queue_stack_map_push_elem+0x15a/0x550 [ 654.978804][T15809] ? __kasan_check_write+0x14/0x20 [ 654.983739][T15809] ? mutex_lock+0xa5/0x110 [ 654.988146][T15809] ? queue_stack_map_delete_elem+0x10/0x10 [ 654.993772][T15809] ? bpf_trace_run2+0xf4/0x280 [ 654.998370][T15809] ? __bpf_trace_sys_enter+0x62/0x70 [ 655.003481][T15809] __x64_sys_bpf+0x7b/0x90 [ 655.007820][T15809] do_syscall_64+0x34/0x70 [ 655.012266][T15809] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 655.018145][T15809] RIP: 0033:0x7faab8733819 [ 655.022392][T15809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 655.042701][T15809] RSP: 002b:00007faab6dac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 655.050948][T15809] RAX: ffffffffffffffda RBX: 00007faab88eafa0 RCX: 00007faab8733819 [ 655.058755][T15809] RDX: 0000000000000048 RSI: 0000000020000440 RDI: 0000000000000000 [ 655.066722][T15809] RBP: 00007faab6dac090 R08: 0000000000000000 R09: 0000000000000000 [ 655.074620][T15809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 655.082433][T15809] R13: 0000000000000000 R14: 00007faab88eafa0 R15: 00007ffe07283c38 [ 655.488486][T15835] device veth0_vlan left promiscuous mode [ 655.542624][T15835] device veth0_vlan entered promiscuous mode [ 655.632861][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 655.645301][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 655.669131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 657.368229][T15886] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.387616][T15886] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.402667][T15886] device bridge_slave_0 entered promiscuous mode [ 657.418020][T15886] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.429480][T15886] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.441887][T15886] device bridge_slave_1 entered promiscuous mode [ 657.696367][ T9760] device bridge_slave_1 left promiscuous mode [ 657.703931][ T9760] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.711591][ T9760] device bridge_slave_0 left promiscuous mode [ 657.717587][ T9760] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.725445][ T9760] device veth0_vlan left promiscuous mode [ 657.950946][T15886] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.958405][T15886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 657.966537][T15886] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.973493][T15886] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.006143][T15928] device wg2 entered promiscuous mode [ 658.064036][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.085148][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.097963][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 658.105553][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 658.218152][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 658.228922][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.236186][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.251071][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 658.263007][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.269900][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.277496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 658.285556][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 658.298182][T15943] device veth0_vlan left promiscuous mode [ 658.375512][T15943] device veth0_vlan entered promiscuous mode [ 658.445988][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 658.474254][T15886] device veth0_vlan entered promiscuous mode [ 658.497650][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 658.508123][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 658.541341][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 658.566055][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 658.579221][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 658.618199][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 658.657482][T15886] device veth1_macvtap entered promiscuous mode [ 658.678350][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 658.691766][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 658.706503][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 658.889250][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 658.901217][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 660.225081][T16024] device veth1_macvtap left promiscuous mode [ 660.233233][T16024] device macsec0 entered promiscuous mode [ 661.044626][T16063] device veth0_vlan left promiscuous mode [ 661.209476][T16063] device veth0_vlan entered promiscuous mode [ 662.186226][T16078] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.290775][T16078] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.298446][T16078] device bridge_slave_0 entered promiscuous mode [ 662.307257][T16078] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.330733][T16078] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.396105][T16078] device bridge_slave_1 entered promiscuous mode [ 662.825935][T16078] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.834400][T16078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 662.842666][T16078] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.849913][T16078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 663.123403][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.173795][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.250812][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 664.266115][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 664.293953][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 664.321320][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 664.351140][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 664.358363][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 664.392187][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 664.413455][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 664.452151][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 664.459928][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 664.488658][ T9760] device bridge_slave_1 left promiscuous mode [ 664.494750][ T9760] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.522943][ T9760] device bridge_slave_0 left promiscuous mode [ 664.536393][ T9760] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.554075][ T9760] device veth1_macvtap left promiscuous mode [ 664.568104][ T9760] device veth0_vlan left promiscuous mode [ 664.982595][T16114] device veth0_vlan left promiscuous mode [ 665.080054][T16114] device veth0_vlan entered promiscuous mode [ 665.470610][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 665.479985][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 665.488766][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 665.497044][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 665.614300][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 665.624129][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 665.667771][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 665.689197][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 665.705932][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 665.714654][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 665.722797][T16078] device veth0_vlan entered promiscuous mode [ 665.738391][T16142] device pim6reg1 entered promiscuous mode [ 665.750230][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 665.759269][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 665.769372][T16078] device veth1_macvtap entered promiscuous mode [ 665.796111][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 665.804456][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 665.813658][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 665.828606][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 665.841848][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 666.114088][T16157] device syzkaller0 entered promiscuous mode [ 666.251545][T16078] cgroup: fork rejected by pids controller in /syz9 [ 667.422697][T16185] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.433742][T16185] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.441639][T16185] device bridge_slave_0 entered promiscuous mode [ 667.448672][T16185] bridge0: port 2(bridge_slave_1) entered blocking state [ 667.464458][T16185] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.472255][T16185] device bridge_slave_1 entered promiscuous mode [ 668.056951][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 668.080877][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 668.127054][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 668.135241][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 668.144722][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.155559][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.163525][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 668.174037][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 668.184716][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.191745][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.209739][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 668.217316][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 668.225154][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 668.249212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 668.298192][T16213] device syzkaller0 entered promiscuous mode [ 668.310891][T16213] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 668.327460][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 668.341680][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 668.349974][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 668.358558][T16185] device veth0_vlan entered promiscuous mode [ 668.537597][ T9760] device bridge_slave_1 left promiscuous mode [ 668.545625][ T9760] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.559425][ T9760] device bridge_slave_0 left promiscuous mode [ 668.565857][ T9760] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.573645][ T9760] device veth1_macvtap left promiscuous mode [ 668.579500][ T9760] device veth0_vlan left promiscuous mode [ 668.695701][T16185] device veth1_macvtap entered promiscuous mode [ 668.708289][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 668.716611][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.730464][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 668.759928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 668.770220][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.784074][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 668.793514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.902566][T16249] device veth0_vlan left promiscuous mode [ 668.975665][T16249] device veth0_vlan entered promiscuous mode [ 669.017182][T16257] device veth0_vlan left promiscuous mode [ 669.059084][T16257] device veth0_vlan entered promiscuous mode [ 669.130088][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 669.147296][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 669.195799][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 669.829444][T16277] device syzkaller0 entered promiscuous mode [ 670.361109][T16313] device wg2 left promiscuous mode [ 670.667664][T16330] device veth0_vlan left promiscuous mode [ 670.741337][T16330] device veth0_vlan entered promiscuous mode [ 671.412303][T16345] device sit0 entered promiscuous mode [ 675.114631][T16470] device syzkaller0 entered promiscuous mode [ 675.181332][ T25] syzkaller0: tun_net_xmit 48 [ 677.752927][T16527] device veth0_vlan left promiscuous mode [ 677.840746][T16527] device veth0_vlan entered promiscuous mode [ 678.441023][T16542] device pim6reg1 entered promiscuous mode [ 679.321467][T16570] syz.5.5464[16570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 679.321527][T16570] syz.5.5464[16570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 679.999689][T16603] FAULT_INJECTION: forcing a failure. [ 679.999689][T16603] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 680.023737][T16603] CPU: 0 PID: 16603 Comm: syz.5.5475 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 680.034923][T16603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 680.044823][T16603] Call Trace: [ 680.048041][T16603] dump_stack_lvl+0x1e2/0x24b [ 680.052542][T16603] ? bfq_pos_tree_add_move+0x43b/0x43b [ 680.057833][T16603] dump_stack+0x15/0x17 [ 680.061942][T16603] should_fail+0x3c6/0x510 [ 680.066671][T16603] should_fail_usercopy+0x1a/0x20 [ 680.071626][T16603] strncpy_from_user+0x24/0x2d0 [ 680.076465][T16603] strncpy_from_user_nofault+0x73/0x150 [ 680.081855][T16603] bpf_probe_read_user_str+0x2a/0x70 [ 680.086969][T16603] bpf_prog_bc7c5c6b9645592f+0x35/0x588 [ 680.092347][T16603] bpf_trace_run3+0x121/0x2c0 [ 680.096864][T16603] ? bpf_trace_run2+0x280/0x280 [ 680.101547][T16603] ? __this_cpu_preempt_check+0x13/0x20 [ 680.106930][T16603] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 680.113446][T16603] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 680.119856][T16603] __bpf_trace_sched_switch+0xb/0x10 [ 680.124976][T16603] __traceiter_sched_switch+0x85/0xc0 [ 680.130185][T16603] __schedule+0x10be/0x1330 [ 680.134528][T16603] ? release_firmware_map_entry+0x18d/0x18d [ 680.140254][T16603] ? try_invoke_on_locked_down_task+0x280/0x280 [ 680.146328][T16603] ? preempt_schedule+0xd9/0xe0 [ 680.151015][T16603] preempt_schedule_common+0x9b/0xf0 [ 680.156136][T16603] preempt_schedule+0xd9/0xe0 [ 680.160649][T16603] ? schedule_preempt_disabled+0x20/0x20 [ 680.170091][T16603] ? __kasan_check_write+0x14/0x20 [ 680.175880][T16603] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 680.181255][T16603] preempt_schedule_thunk+0x16/0x18 [ 680.186719][T16603] _raw_spin_unlock_irqrestore+0x74/0x80 [ 680.192192][T16603] prepare_to_wait_event+0x41a/0x480 [ 680.197521][T16603] ? init_wait_entry+0xe0/0xe0 [ 680.202459][T16603] ? stack_trace_save+0x113/0x1c0 [ 680.207302][T16603] synchronize_rcu_expedited+0x4f2/0x660 [ 680.212957][T16603] ? synchronize_rcu+0x120/0x120 [ 680.217726][T16603] ? kvmalloc_node+0x82/0x130 [ 680.222239][T16603] ? bpf_local_storage_map_alloc+0x144/0x420 [ 680.228077][T16603] ? sk_storage_map_alloc+0x19/0x90 [ 680.233088][T16603] ? __se_sys_bpf+0x620f/0x11cb0 [ 680.237880][T16603] ? __x64_sys_bpf+0x7b/0x90 [ 680.243651][T16603] ? do_syscall_64+0x34/0x70 [ 680.248236][T16603] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 680.255136][T16603] ? rcu_exp_handler+0x360/0x360 [ 680.259841][T16603] ? io_schedule+0x120/0x120 [ 680.264438][T16603] synchronize_rcu+0x88/0x120 [ 680.269024][T16603] ? kvfree_call_rcu+0x650/0x650 [ 680.273798][T16603] ? __kasan_kmalloc+0x9/0x10 [ 680.278322][T16603] ? __kasan_check_write+0x14/0x20 [ 680.283258][T16603] ? _raw_spin_lock+0xa4/0x1b0 [ 680.287859][T16603] ? _raw_spin_trylock_bh+0x190/0x190 [ 680.293066][T16603] bpf_local_storage_map_free+0x28/0x160 [ 680.298530][T16603] ? _raw_spin_unlock+0x4d/0x70 [ 680.303217][T16603] sk_storage_map_free+0x48/0x60 [ 680.308004][T16603] __se_sys_bpf+0xe9a6/0x11cb0 [ 680.312590][T16603] ? stack_trace_save+0x113/0x1c0 [ 680.317478][T16603] ? stack_trace_snprint+0xf0/0xf0 [ 680.322515][T16603] ? kmem_cache_free+0xa9/0x1e0 [ 680.327171][T16603] ? kmem_cache_free+0xa9/0x1e0 [ 680.331859][T16603] ? kasan_set_track+0x5d/0x70 [ 680.336461][T16603] ? __x64_sys_bpf+0x90/0x90 [ 680.341377][T16603] ? __kasan_slab_free+0x11/0x20 [ 680.346110][T16603] ? slab_free_freelist_hook+0xc0/0x190 [ 680.351495][T16603] ? kmem_cache_free+0xa9/0x1e0 [ 680.356184][T16603] ? putname+0xe7/0x140 [ 680.360355][T16603] ? do_sys_openat2+0x1fc/0x710 [ 680.365156][T16603] ? __x64_sys_openat+0x243/0x290 [ 680.370006][T16603] ? do_syscall_64+0x34/0x70 [ 680.374587][T16603] ? _kstrtoull+0x3a0/0x4a0 [ 680.378924][T16603] ? kstrtouint_from_user+0x20a/0x2a0 [ 680.384134][T16603] ? kstrtol_from_user+0x310/0x310 [ 680.389071][T16603] ? memset+0x35/0x40 [ 680.392898][T16603] ? __fsnotify_parent+0x4b9/0x6c0 [ 680.397919][T16603] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 680.406999][T16603] ? proc_fail_nth_write+0x20b/0x290 [ 680.415271][T16603] ? proc_fail_nth_read+0x210/0x210 [ 680.420826][T16603] ? security_file_permission+0x86/0xb0 [ 680.426187][T16603] ? rw_verify_area+0x1c3/0x360 [ 680.430872][T16603] ? preempt_count_add+0x92/0x1a0 [ 680.435731][T16603] ? vfs_write+0x852/0xe70 [ 680.439987][T16603] ? kmem_cache_free+0xa9/0x1e0 [ 680.444672][T16603] ? kernel_write+0x3d0/0x3d0 [ 680.449183][T16603] ? __kasan_check_write+0x14/0x20 [ 680.454140][T16603] ? mutex_lock+0xa5/0x110 [ 680.459309][T16603] ? mutex_trylock+0xa0/0xa0 [ 680.463727][T16603] ? __kasan_check_write+0x14/0x20 [ 680.468933][T16603] ? fput_many+0x160/0x1b0 [ 680.473150][T16603] ? debug_smp_processor_id+0x17/0x20 [ 680.478419][T16603] __x64_sys_bpf+0x7b/0x90 [ 680.482794][T16603] do_syscall_64+0x34/0x70 [ 680.487032][T16603] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 680.492929][T16603] RIP: 0033:0x7fbea3ee6819 [ 680.497303][T16603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 680.517635][T16603] RSP: 002b:00007fbea255f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 680.525863][T16603] RAX: ffffffffffffffda RBX: 00007fbea409dfa0 RCX: 00007fbea3ee6819 [ 680.534281][T16603] RDX: 0000000000000048 RSI: 0000000020000440 RDI: 0000000000000000 [ 680.542080][T16603] RBP: 00007fbea255f090 R08: 0000000000000000 R09: 0000000000000000 [ 680.549883][T16603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.557695][T16603] R13: 0000000000000000 R14: 00007fbea409dfa0 R15: 00007ffcf06bea38 [ 682.296961][T16635] device veth0_vlan left promiscuous mode [ 682.405006][T16635] device veth0_vlan entered promiscuous mode [ 684.593941][T16683] device veth0_vlan left promiscuous mode [ 684.670340][T16683] device veth0_vlan entered promiscuous mode [ 687.094961][T16731] device veth0_vlan left promiscuous mode [ 687.242387][T16731] device veth0_vlan entered promiscuous mode [ 687.646510][T16749] device veth0_vlan left promiscuous mode [ 687.719277][T16749] device veth0_vlan entered promiscuous mode [ 687.913725][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 687.941755][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 687.981205][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 688.062050][T16752] ÿÿÿÿÿÿ: renamed from vlan1 [ 689.674806][T16801] device veth0_vlan left promiscuous mode [ 689.741815][T16801] device veth0_vlan entered promiscuous mode [ 689.854601][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 689.921601][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 689.995933][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 690.294495][T16810] device veth0_vlan left promiscuous mode [ 690.361655][T16810] device veth0_vlan entered promiscuous mode [ 691.006003][T16827] device veth0_vlan left promiscuous mode [ 691.049883][T16827] device veth0_vlan entered promiscuous mode [ 691.185616][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 691.199518][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 691.220112][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 691.583975][T16845] device veth0_vlan left promiscuous mode [ 691.649458][T16845] device veth0_vlan entered promiscuous mode [ 693.232111][T16883] FAULT_INJECTION: forcing a failure. [ 693.232111][T16883] name failslab, interval 1, probability 0, space 0, times 0 [ 693.246633][T16883] CPU: 1 PID: 16883 Comm: syz.4.5569 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 693.257803][T16883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 693.267693][T16883] Call Trace: [ 693.270824][T16883] dump_stack_lvl+0x1e2/0x24b [ 693.275451][T16883] ? panic+0x812/0x812 [ 693.279353][T16883] ? bfq_pos_tree_add_move+0x43b/0x43b [ 693.284651][T16883] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 693.291073][T16883] ? proc_fail_nth_write+0x20b/0x290 [ 693.296213][T16883] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 693.302796][T16883] dump_stack+0x15/0x17 [ 693.306783][T16883] should_fail+0x3c6/0x510 [ 693.311071][T16883] ? slhc_init+0x77/0x7a0 [ 693.315204][T16883] __should_failslab+0xa4/0xe0 [ 693.319843][T16883] should_failslab+0x9/0x20 [ 693.324403][T16883] kmem_cache_alloc_trace+0x3a/0x2e0 [ 693.329500][T16883] ? __mutex_lock_slowpath+0xe/0x10 [ 693.334533][T16883] slhc_init+0x77/0x7a0 [ 693.339046][T16883] ppp_ioctl+0x12bf/0x1810 [ 693.343301][T16883] ? ppp_poll+0x250/0x250 [ 693.347468][T16883] ? __fget_files+0x31e/0x380 [ 693.351981][T16883] ? security_file_ioctl+0x84/0xb0 [ 693.356938][T16883] ? ppp_poll+0x250/0x250 [ 693.361090][T16883] __se_sys_ioctl+0x114/0x190 [ 693.365612][T16883] __x64_sys_ioctl+0x7b/0x90 [ 693.370121][T16883] do_syscall_64+0x34/0x70 [ 693.374372][T16883] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 693.380183][T16883] RIP: 0033:0x7faab8733819 [ 693.384439][T16883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 693.406007][T16883] RSP: 002b:00007faab6dac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 693.414248][T16883] RAX: ffffffffffffffda RBX: 00007faab88eafa0 RCX: 00007faab8733819 [ 693.422070][T16883] RDX: 000000002000000c RSI: 0000000040047451 RDI: 0000000000000006 [ 693.429874][T16883] RBP: 00007faab6dac090 R08: 0000000000000000 R09: 0000000000000000 [ 693.437682][T16883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 693.445496][T16883] R13: 0000000000000000 R14: 00007faab88eafa0 R15: 00007ffe07283c38 [ 693.878505][T16893] device sit0 left promiscuous mode [ 694.552374][T16900] device veth0_vlan left promiscuous mode [ 694.676726][T16900] device veth0_vlan entered promiscuous mode [ 694.798194][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 694.832263][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 694.921541][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 695.263811][T16914] device pim6reg1 entered promiscuous mode [ 696.190510][T16938] device veth0_vlan left promiscuous mode [ 696.340256][T16938] device veth0_vlan entered promiscuous mode [ 697.204784][T16963] device veth0_vlan left promiscuous mode [ 697.225328][T16963] device veth0_vlan entered promiscuous mode [ 701.017826][T17081] device veth0_vlan left promiscuous mode [ 701.065716][T17081] device veth0_vlan entered promiscuous mode [ 701.174386][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 701.189052][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 701.224138][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 701.248787][T17077] GPL: port 1(erspan0) entered blocking state [ 701.261426][T17077] GPL: port 1(erspan0) entered disabled state [ 701.274647][T17077] device erspan0 entered promiscuous mode [ 702.175049][T17105] FAULT_INJECTION: forcing a failure. [ 702.175049][T17105] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 702.202739][T17105] CPU: 1 PID: 17105 Comm: syz.2.5641 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 702.213952][T17105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 702.223832][T17105] Call Trace: [ 702.226968][T17105] dump_stack_lvl+0x1e2/0x24b [ 702.231476][T17105] ? bfq_pos_tree_add_move+0x43b/0x43b [ 702.236764][T17105] dump_stack+0x15/0x17 [ 702.240754][T17105] should_fail+0x3c6/0x510 [ 702.245006][T17105] should_fail_usercopy+0x1a/0x20 [ 702.249866][T17105] _copy_to_user+0x20/0x90 [ 702.254152][T17105] simple_read_from_buffer+0xc7/0x150 [ 702.260366][T17105] proc_fail_nth_read+0x1a3/0x210 [ 702.265298][T17105] ? proc_fault_inject_write+0x390/0x390 [ 702.271049][T17105] ? security_file_permission+0x86/0xb0 [ 702.276412][T17105] ? rw_verify_area+0x1c3/0x360 [ 702.281107][T17105] ? proc_fault_inject_write+0x390/0x390 [ 702.286908][T17105] vfs_read+0x200/0xba0 [ 702.290904][T17105] ? kernel_read+0x70/0x70 [ 702.295501][T17105] ? __kasan_check_write+0x14/0x20 [ 702.300478][T17105] ? mutex_lock+0xa5/0x110 [ 702.304699][T17105] ? mutex_trylock+0xa0/0xa0 [ 702.309988][T17105] ? __fdget_pos+0x2e7/0x3a0 [ 702.314411][T17105] ? ksys_read+0x77/0x2c0 [ 702.318719][T17105] ksys_read+0x199/0x2c0 [ 702.322943][T17105] ? vfs_write+0xe70/0xe70 [ 702.327287][T17105] ? fpu__clear_all+0x20/0x20 [ 702.332407][T17105] ? __kasan_check_read+0x11/0x20 [ 702.337269][T17105] __x64_sys_read+0x7b/0x90 [ 702.341758][T17105] do_syscall_64+0x34/0x70 [ 702.345987][T17105] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 702.351715][T17105] RIP: 0033:0x7f9bc00ff25c [ 702.355969][T17105] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 702.375407][T17105] RSP: 002b:00007f9bbe779030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 702.383653][T17105] RAX: ffffffffffffffda RBX: 00007f9bc02b7fa0 RCX: 00007f9bc00ff25c [ 702.391467][T17105] RDX: 000000000000000f RSI: 00007f9bbe7790a0 RDI: 0000000000000005 [ 702.399794][T17105] RBP: 00007f9bbe779090 R08: 0000000000000000 R09: 0000000000000000 [ 702.411794][T17105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 702.420134][T17105] R13: 0000000000000000 R14: 00007f9bc02b7fa0 R15: 00007ffc583eae28 [ 703.001546][T17122] device veth0_vlan left promiscuous mode [ 703.073487][T17122] device veth0_vlan entered promiscuous mode [ 706.775626][T17220] device syzkaller0 entered promiscuous mode [ 706.884701][ T25] syzkaller0: tun_net_xmit 48 [ 707.597536][T17240] device veth0_vlan left promiscuous mode [ 707.680412][T17240] device veth0_vlan entered promiscuous mode [ 708.342394][T17267] GPL: port 1(erspan0) entered blocking state [ 708.370967][T17267] GPL: port 1(erspan0) entered disabled state [ 708.454099][T17267] device erspan0 entered promiscuous mode [ 708.832880][T17283] FAULT_INJECTION: forcing a failure. [ 708.832880][T17283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 708.975301][T17283] CPU: 1 PID: 17283 Comm: syz.2.5703 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 708.986544][T17283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 708.996571][T17283] Call Trace: [ 708.999703][T17283] dump_stack_lvl+0x1e2/0x24b [ 709.004203][T17283] ? bfq_pos_tree_add_move+0x43b/0x43b [ 709.009519][T17283] ? kmem_cache_free+0xa9/0x1e0 [ 709.014187][T17283] dump_stack+0x15/0x17 [ 709.018171][T17283] should_fail+0x3c6/0x510 [ 709.022428][T17283] should_fail_usercopy+0x1a/0x20 [ 709.027288][T17283] _copy_from_user+0x20/0xd0 [ 709.031717][T17283] __copy_msghdr_from_user+0xaf/0x7c0 [ 709.036921][T17283] ? __ia32_sys_shutdown+0x70/0x70 [ 709.041873][T17283] ___sys_sendmsg+0x166/0x2e0 [ 709.046396][T17283] ? __sys_sendmsg+0x280/0x280 [ 709.050989][T17283] ? rw_verify_area+0x1c3/0x360 [ 709.055780][T17283] ? __fdget+0x1bc/0x240 [ 709.059836][T17283] __se_sys_sendmsg+0x1b1/0x280 [ 709.064540][T17283] ? __x64_sys_sendmsg+0x90/0x90 [ 709.069294][T17283] ? ksys_write+0x260/0x2c0 [ 709.073655][T17283] ? debug_smp_processor_id+0x17/0x20 [ 709.078843][T17283] __x64_sys_sendmsg+0x7b/0x90 [ 709.083447][T17283] do_syscall_64+0x34/0x70 [ 709.087702][T17283] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 709.093622][T17283] RIP: 0033:0x7f9bc0100819 [ 709.097851][T17283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 709.117364][T17283] RSP: 002b:00007f9bbe779038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 709.125896][T17283] RAX: ffffffffffffffda RBX: 00007f9bc02b7fa0 RCX: 00007f9bc0100819 [ 709.133694][T17283] RDX: 0000000000000000 RSI: 0000000020000b40 RDI: 0000000000000007 [ 709.141597][T17283] RBP: 00007f9bbe779090 R08: 0000000000000000 R09: 0000000000000000 [ 709.150791][T17283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 709.158597][T17283] R13: 0000000000000000 R14: 00007f9bc02b7fa0 R15: 00007ffc583eae28 [ 709.316561][T17296] device pim6reg1 entered promiscuous mode [ 712.502586][T17371] device syzkaller0 entered promiscuous mode [ 712.639468][T17379] FAULT_INJECTION: forcing a failure. [ 712.639468][T17379] name failslab, interval 1, probability 0, space 0, times 0 [ 712.653639][T17379] CPU: 0 PID: 17379 Comm: syz.2.5735 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 712.665591][T17379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 712.677593][T17379] Call Trace: [ 712.680726][T17379] dump_stack_lvl+0x1e2/0x24b [ 712.685235][T17379] ? panic+0x812/0x812 [ 712.689133][T17379] ? do_syscall_64+0x34/0x70 [ 712.693732][T17379] ? bfq_pos_tree_add_move+0x43b/0x43b [ 712.699025][T17379] dump_stack+0x15/0x17 [ 712.703019][T17379] should_fail+0x3c6/0x510 [ 712.707272][T17379] ? __get_vm_area_node+0x116/0x470 [ 712.712312][T17379] __should_failslab+0xa4/0xe0 [ 712.716907][T17379] should_failslab+0x9/0x20 [ 712.721244][T17379] kmem_cache_alloc_trace+0x3a/0x2e0 [ 712.726363][T17379] __get_vm_area_node+0x116/0x470 [ 712.731236][T17379] __vmalloc_node_range+0xdc/0x7c0 [ 712.736171][T17379] ? copy_process+0x5c8/0x3340 [ 712.740774][T17379] ? kmem_cache_alloc+0x168/0x2e0 [ 712.745634][T17379] ? __kasan_check_write+0x14/0x20 [ 712.750581][T17379] dup_task_struct+0x429/0xc30 [ 712.755178][T17379] ? copy_process+0x5c8/0x3340 [ 712.759780][T17379] copy_process+0x5c8/0x3340 [ 712.764208][T17379] ? proc_fail_nth_write+0x20b/0x290 [ 712.769327][T17379] ? proc_fail_nth_read+0x210/0x210 [ 712.774363][T17379] ? security_file_permission+0x86/0xb0 [ 712.779742][T17379] ? rw_verify_area+0x1c3/0x360 [ 712.784429][T17379] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 712.789376][T17379] ? vfs_write+0x852/0xe70 [ 712.793631][T17379] ? kmem_cache_free+0xa9/0x1e0 [ 712.798319][T17379] kernel_clone+0x21e/0x9e0 [ 712.802659][T17379] ? __kasan_check_write+0x14/0x20 [ 712.807603][T17379] ? create_io_thread+0x1e0/0x1e0 [ 712.812466][T17379] __x64_sys_clone+0x23f/0x290 [ 712.817068][T17379] ? __do_sys_vfork+0x130/0x130 [ 712.821753][T17379] ? debug_smp_processor_id+0x17/0x20 [ 712.826958][T17379] do_syscall_64+0x34/0x70 [ 712.831213][T17379] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 712.836938][T17379] RIP: 0033:0x7f9bc0100819 [ 712.841194][T17379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 712.860631][T17379] RSP: 002b:00007f9bbe778fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 712.868876][T17379] RAX: ffffffffffffffda RBX: 00007f9bc02b7fa0 RCX: 00007f9bc0100819 [ 712.876688][T17379] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 712.884499][T17379] RBP: 00007f9bbe779090 R08: 0000000000000000 R09: 0000000000000000 [ 712.892312][T17379] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 712.900122][T17379] R13: 0000000000000000 R14: 00007f9bc02b7fa0 R15: 00007ffc583eae28 [ 712.908566][T17379] syz.2.5735: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 712.922766][T17379] CPU: 0 PID: 17379 Comm: syz.2.5735 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 712.933928][T17379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 712.943817][T17379] Call Trace: [ 712.946955][T17379] dump_stack_lvl+0x1e2/0x24b [ 712.951461][T17379] ? wake_up_klogd+0xb8/0xf0 [ 712.955885][T17379] ? bfq_pos_tree_add_move+0x43b/0x43b [ 712.961181][T17379] ? pr_cont_kernfs_name+0xf0/0x100 [ 712.966217][T17379] dump_stack+0x15/0x17 [ 712.970207][T17379] warn_alloc+0x21a/0x390 [ 712.974373][T17379] ? __get_vm_area_node+0x116/0x470 [ 712.979407][T17379] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 712.984795][T17379] ? __get_vm_area_node+0x34b/0x470 [ 712.989824][T17379] __vmalloc_node_range+0x287/0x7c0 [ 712.994860][T17379] ? kmem_cache_alloc+0x168/0x2e0 [ 712.999715][T17379] ? __kasan_check_write+0x14/0x20 [ 713.004667][T17379] dup_task_struct+0x429/0xc30 [ 713.009264][T17379] ? copy_process+0x5c8/0x3340 [ 713.013863][T17379] copy_process+0x5c8/0x3340 [ 713.018293][T17379] ? proc_fail_nth_write+0x20b/0x290 [ 713.023415][T17379] ? proc_fail_nth_read+0x210/0x210 [ 713.028445][T17379] ? security_file_permission+0x86/0xb0 [ 713.033829][T17379] ? rw_verify_area+0x1c3/0x360 [ 713.038512][T17379] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 713.043458][T17379] ? vfs_write+0x852/0xe70 [ 713.047716][T17379] ? kmem_cache_free+0xa9/0x1e0 [ 713.052402][T17379] kernel_clone+0x21e/0x9e0 [ 713.056741][T17379] ? __kasan_check_write+0x14/0x20 [ 713.061689][T17379] ? create_io_thread+0x1e0/0x1e0 [ 713.066551][T17379] __x64_sys_clone+0x23f/0x290 [ 713.071148][T17379] ? __do_sys_vfork+0x130/0x130 [ 713.075838][T17379] ? debug_smp_processor_id+0x17/0x20 [ 713.081050][T17379] do_syscall_64+0x34/0x70 [ 713.085298][T17379] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 713.091022][T17379] RIP: 0033:0x7f9bc0100819 [ 713.095277][T17379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 713.114716][T17379] RSP: 002b:00007f9bbe778fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 713.122963][T17379] RAX: ffffffffffffffda RBX: 00007f9bc02b7fa0 RCX: 00007f9bc0100819 [ 713.130771][T17379] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 713.138582][T17379] RBP: 00007f9bbe779090 R08: 0000000000000000 R09: 0000000000000000 [ 713.146396][T17379] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 713.154206][T17379] R13: 0000000000000000 R14: 00007f9bc02b7fa0 R15: 00007ffc583eae28 [ 713.168819][T17379] Mem-Info: [ 713.172316][T17379] active_anon:92 inactive_anon:5034 isolated_anon:0 [ 713.172316][T17379] active_file:25576 inactive_file:4330 isolated_file:0 [ 713.172316][T17379] unevictable:0 dirty:228 writeback:0 [ 713.172316][T17379] slab_reclaimable:8699 slab_unreclaimable:74111 [ 713.172316][T17379] mapped:29721 shmem:218 pagetables:585 bounce:0 [ 713.172316][T17379] free:1563518 free_pcp:890 free_cma:0 [ 713.210128][T17379] Node 0 active_anon:368kB inactive_anon:20136kB active_file:102304kB inactive_file:17320kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118884kB dirty:912kB writeback:0kB shmem:872kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4576kB all_unreclaimable? no [ 713.239389][T17379] DMA32 free:2983352kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984760kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1408kB local_pcp:52kB free_cma:0kB [ 713.275040][T17379] lowmem_reserve[]: 0 3941 3941 [ 713.279805][T17379] Normal free:3272960kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:368kB inactive_anon:20136kB active_file:102304kB inactive_file:17320kB unevictable:0kB writepending:912kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2340kB bounce:0kB free_pcp:2472kB local_pcp:1392kB free_cma:0kB [ 713.313198][T17379] lowmem_reserve[]: 0 0 0 [ 713.317491][T17379] DMA32: 6*4kB (UM) 4*8kB (M) 4*16kB (M) 8*32kB (UM) 7*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2983352kB [ 713.334700][T17379] Normal: 964*4kB (UME) 1274*8kB (UME) 2110*16kB (UME) 722*32kB (UME) 644*64kB (UM) 371*128kB (UME) 182*256kB (UME) 74*512kB (UME) 38*1024kB (M) 14*2048kB (UM) 723*4096kB (M) = 3273088kB [ 713.354530][T17379] 30124 total pagecache pages [ 713.359041][T17379] 0 pages in swap cache [ 713.363380][T17379] Swap cache stats: add 0, delete 0, find 0/0 [ 713.369406][T17379] Free swap = 124996kB [ 713.373794][T17379] Total swap = 124996kB [ 713.377879][T17379] 2097051 pages RAM [ 713.394538][T17379] 0 pages HighMem/MovableOnly [ 713.409230][T17379] 341897 pages reserved [ 713.439790][T17379] 0 pages cma reserved [ 713.650125][T17389] device veth0_vlan left promiscuous mode [ 713.663551][T17389] device veth0_vlan entered promiscuous mode [ 716.328285][ T24] audit: type=1400 audit(1732196513.949:178): avc: denied { create } for pid=17466 comm="syz.9.5768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 716.782324][T17479] device veth0_vlan left promiscuous mode [ 716.790234][T17479] device veth0_vlan entered promiscuous mode [ 717.640619][T17519] device veth0_vlan left promiscuous mode [ 717.714543][T17519] device veth0_vlan entered promiscuous mode [ 718.136901][T17533] device veth0_vlan left promiscuous mode [ 718.183704][T17533] device veth0_vlan entered promiscuous mode [ 718.217268][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 718.231378][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 718.240395][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 718.972909][T17578] device veth0_vlan left promiscuous mode [ 719.059075][T17578] device veth0_vlan entered promiscuous mode [ 720.142798][T17622] device veth0_vlan left promiscuous mode [ 720.152997][T17622] device veth0_vlan entered promiscuous mode [ 720.433655][T17636] device veth1_macvtap left promiscuous mode [ 720.511259][T17636] device macsec0 entered promiscuous mode [ 721.822048][T17673] ÿÿÿÿÿÿ: renamed from vlan1 [ 723.535126][T17704] device syzkaller0 entered promiscuous mode [ 723.722858][T17713] ÿÿÿÿÿÿ: renamed from vlan1 [ 730.036353][T17851] device veth0_vlan left promiscuous mode [ 730.079228][T17851] device veth0_vlan entered promiscuous mode [ 732.599968][T17897] device veth0_vlan left promiscuous mode [ 732.630464][T17897] device veth0_vlan entered promiscuous mode [ 732.770960][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 732.781126][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 732.792539][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 733.007434][T17902] device veth0_vlan left promiscuous mode [ 733.082303][T17902] device veth0_vlan entered promiscuous mode [ 733.352713][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 733.388756][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 733.522060][ T9760] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 733.852455][T17923] device wg2 entered promiscuous mode [ 734.023795][T17934] device veth0_vlan left promiscuous mode [ 734.091318][T17934] device veth0_vlan entered promiscuous mode [ 734.209674][T17939] syz.2.5924[17939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.209736][T17939] syz.2.5924[17939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.327939][T17938] device pim6reg1 entered promiscuous mode [ 737.449654][T18007] device veth0_vlan left promiscuous mode [ 737.513658][T18007] device veth0_vlan entered promiscuous mode [ 737.906493][T18014] FAULT_INJECTION: forcing a failure. [ 737.906493][T18014] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 738.085030][T18014] CPU: 1 PID: 18014 Comm: syz.2.5946 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 738.096246][T18014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 738.106326][T18014] Call Trace: [ 738.109449][T18014] dump_stack_lvl+0x1e2/0x24b [ 738.113966][T18014] ? bfq_pos_tree_add_move+0x43b/0x43b [ 738.119263][T18014] ? sched_clock_cpu+0x1b/0x3b0 [ 738.123951][T18014] ? memset+0x35/0x40 [ 738.127768][T18014] dump_stack+0x15/0x17 [ 738.131762][T18014] should_fail+0x3c6/0x510 [ 738.136008][T18014] should_fail_usercopy+0x1a/0x20 [ 738.140865][T18014] _copy_from_user+0x20/0xd0 [ 738.145307][T18014] __se_sys_bpf+0x232/0x11cb0 [ 738.149808][T18014] ? kvm_sched_clock_read+0x18/0x40 [ 738.154847][T18014] ? perf_event_output_forward+0x14e/0x1b0 [ 738.160500][T18014] ? perf_prepare_sample+0x1af0/0x1af0 [ 738.165794][T18014] ? irq_exit_rcu+0x9/0x10 [ 738.170042][T18014] ? __x64_sys_bpf+0x90/0x90 [ 738.174462][T18014] ? __this_cpu_preempt_check+0x13/0x20 [ 738.179842][T18014] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 738.186069][T18014] ? hrtimer_forward+0x1a6/0x2c0 [ 738.190916][T18014] ? perf_swevent_hrtimer+0x4b8/0x560 [ 738.196126][T18014] ? cpu_clock_event_read+0x50/0x50 [ 738.201172][T18014] ? timerqueue_add+0x24c/0x270 [ 738.206457][T18014] ? enqueue_hrtimer+0xad/0x200 [ 738.211136][T18014] ? __hrtimer_run_queues+0x438/0xa50 [ 738.216522][T18014] ? __hrtimer_run_queues+0x9ea/0xa50 [ 738.222078][T18014] ? ktime_get+0x10e/0x140 [ 738.226326][T18014] ? lapic_next_event+0x5f/0x70 [ 738.231043][T18014] ? clockevents_program_event+0x214/0x2c0 [ 738.237654][T18014] ? hrtimer_interrupt+0x6a8/0x8b0 [ 738.242590][T18014] ? debug_smp_processor_id+0x17/0x20 [ 738.247810][T18014] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 738.253695][T18014] __x64_sys_bpf+0x7b/0x90 [ 738.257943][T18014] do_syscall_64+0x34/0x70 [ 738.262311][T18014] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 738.268005][T18014] RIP: 0033:0x7f9bc0100819 [ 738.272260][T18014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 738.291698][T18014] RSP: 002b:00007f9bbe779038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 738.299942][T18014] RAX: ffffffffffffffda RBX: 00007f9bc02b7fa0 RCX: 00007f9bc0100819 [ 738.307755][T18014] RDX: 0000000000000050 RSI: 0000000020004080 RDI: 0b00000000000000 [ 738.315666][T18014] RBP: 00007f9bbe779090 R08: 0000000000000000 R09: 0000000000000000 [ 738.323464][T18014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 738.331494][T18014] R13: 0000000000000000 R14: 00007f9bc02b7fa0 R15: 00007ffc583eae28 [ 741.443972][T18093] device veth0_vlan left promiscuous mode [ 741.479865][T18093] device veth0_vlan entered promiscuous mode [ 741.620820][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 741.640150][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 741.674776][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 741.851593][T18124] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 743.602103][T18138] device syzkaller0 entered promiscuous mode [ 744.649197][T18178] device syzkaller0 entered promiscuous mode [ 745.877661][T18230] device veth0_vlan left promiscuous mode [ 745.967741][T18230] device veth0_vlan entered promiscuous mode [ 746.602442][T18271] device macsec0 left promiscuous mode [ 746.690287][T18271] device veth1_macvtap entered promiscuous mode [ 746.711646][T18271] device macsec0 entered promiscuous mode [ 746.794091][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 747.224242][T18285] device syzkaller0 entered promiscuous mode [ 748.828397][T18347] device sit0 entered promiscuous mode [ 749.305513][T18363] device veth0_vlan left promiscuous mode [ 749.428268][T18363] device veth0_vlan entered promiscuous mode [ 749.581097][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 749.610536][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 749.659799][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 750.367270][T18407] syz.5.6074[18407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 750.367406][T18407] syz.5.6074[18407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 750.590111][T18409] device veth0_vlan left promiscuous mode [ 750.654074][T18409] device veth0_vlan entered promiscuous mode [ 750.974647][T18430] device pim6reg1 entered promiscuous mode [ 751.022643][T18433] device veth1_macvtap left promiscuous mode [ 751.174130][T18448] device veth0_vlan left promiscuous mode [ 751.223566][T18448] device veth0_vlan entered promiscuous mode [ 751.574129][T18484] ÿÿÿÿÿÿ: renamed from vlan1 [ 754.406395][T18589] device syzkaller0 entered promiscuous mode [ 754.710453][T18608] device sit0 left promiscuous mode [ 755.520423][T18626] device veth0_vlan left promiscuous mode [ 755.643312][T18626] device veth0_vlan entered promiscuous mode [ 755.756931][T18650] device veth0_vlan left promiscuous mode [ 755.884503][T18650] device veth0_vlan entered promiscuous mode [ 757.652027][T18725] device veth1_macvtap left promiscuous mode [ 757.733720][T18725] device macsec0 entered promiscuous mode [ 758.818447][T18777] device syzkaller0 entered promiscuous mode [ 758.844729][ T4467] syzkaller0: tun_net_xmit 48 [ 759.944880][T18827] FAULT_INJECTION: forcing a failure. [ 759.944880][T18827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 759.992927][T18827] CPU: 0 PID: 18827 Comm: syz.5.6213 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 760.004321][T18827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 760.014467][T18827] Call Trace: [ 760.017600][T18827] dump_stack_lvl+0x1e2/0x24b [ 760.022108][T18827] ? bfq_pos_tree_add_move+0x43b/0x43b [ 760.027408][T18827] dump_stack+0x15/0x17 [ 760.031392][T18827] should_fail+0x3c6/0x510 [ 760.035646][T18827] should_fail_alloc_page+0x52/0x60 [ 760.040674][T18827] __alloc_pages_nodemask+0x1b3/0xaf0 [ 760.045883][T18827] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 760.051262][T18827] ? __kernel_text_address+0x9b/0x110 [ 760.056511][T18827] ? __kasan_check_write+0x14/0x20 [ 760.061424][T18827] ? _raw_spin_lock+0xa4/0x1b0 [ 760.066016][T18827] ? _raw_spin_trylock_bh+0x190/0x190 [ 760.071242][T18827] pte_alloc_one+0x1f/0xc0 [ 760.075993][T18827] __pte_alloc+0x75/0x2c0 [ 760.080086][T18827] ? __kasan_check_write+0x14/0x20 [ 760.085120][T18827] ? _raw_spin_lock+0xa4/0x1b0 [ 760.089727][T18827] ? free_pgtables+0x3c0/0x3c0 [ 760.094423][T18827] ? __kasan_check_write+0x14/0x20 [ 760.099381][T18827] copy_page_range+0x29d8/0x3020 [ 760.104144][T18827] ? __kasan_slab_alloc+0xb1/0xe0 [ 760.109211][T18827] ? vm_area_dup+0x26/0x270 [ 760.113536][T18827] ? do_syscall_64+0x34/0x70 [ 760.118075][T18827] ? pfn_valid+0x1e0/0x1e0 [ 760.122304][T18827] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 760.128050][T18827] ? __rb_insert_augmented+0x5de/0x610 [ 760.133420][T18827] ? _raw_write_unlock+0x2e/0x60 [ 760.138202][T18827] copy_mm+0xc4a/0x13a0 [ 760.142461][T18827] ? copy_signal+0x610/0x610 [ 760.146882][T18827] ? __init_rwsem+0xd6/0x1c0 [ 760.152399][T18827] ? copy_signal+0x4e3/0x610 [ 760.156946][T18827] copy_process+0x1175/0x3340 [ 760.161596][T18827] ? proc_fail_nth_write+0x20b/0x290 [ 760.169054][T18827] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 760.174413][T18827] ? vfs_write+0x852/0xe70 [ 760.179276][T18827] ? kmem_cache_free+0x1c0/0x1e0 [ 760.184129][T18827] kernel_clone+0x21e/0x9e0 [ 760.188469][T18827] ? __kasan_check_write+0x14/0x20 [ 760.193408][T18827] ? create_io_thread+0x1e0/0x1e0 [ 760.198280][T18827] __x64_sys_clone+0x23f/0x290 [ 760.202868][T18827] ? __do_sys_vfork+0x130/0x130 [ 760.207558][T18827] ? debug_smp_processor_id+0x17/0x20 [ 760.212762][T18827] do_syscall_64+0x34/0x70 [ 760.217016][T18827] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 760.222744][T18827] RIP: 0033:0x7fbea3ee6819 [ 760.226996][T18827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 760.248704][T18827] RSP: 002b:00007fbea255efe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 760.256941][T18827] RAX: ffffffffffffffda RBX: 00007fbea409dfa0 RCX: 00007fbea3ee6819 [ 760.264836][T18827] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000025001200 [ 760.272644][T18827] RBP: 00007fbea255f090 R08: 0000000000000000 R09: 0000000000000000 [ 760.280467][T18827] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 760.288618][T18827] R13: 0000000000000000 R14: 00007fbea409dfa0 R15: 00007ffcf06bea38 [ 760.297380][T18832] bridge0: port 2(bridge_slave_1) entered blocking state [ 760.305359][T18832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 760.314000][T18832] bridge0: port 1(bridge_slave_0) entered blocking state [ 760.323620][T18832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 760.333103][T18832] device bridge0 entered promiscuous mode [ 761.049573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 764.006671][T18953] device veth0_vlan left promiscuous mode [ 764.025131][T18953] device veth0_vlan entered promiscuous mode [ 764.071206][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 764.109672][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 764.186552][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 764.906532][T18987] device veth0_vlan left promiscuous mode [ 764.959774][T18987] device veth0_vlan entered promiscuous mode [ 766.679951][T19052] device pim6reg1 entered promiscuous mode [ 767.058154][T19061] device veth0_vlan left promiscuous mode [ 767.198700][T19061] device veth0_vlan entered promiscuous mode [ 767.400420][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 767.418548][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 767.439202][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 801.829906][T19140] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.836961][T19140] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.844095][T19140] device bridge_slave_0 entered promiscuous mode [ 801.851538][T19140] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.858359][T19140] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.867849][T19140] device bridge_slave_1 entered promiscuous mode [ 801.902407][T19142] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.912907][T19142] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.920400][T19142] device bridge_slave_0 entered promiscuous mode [ 801.938953][T19142] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.946106][T19142] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.954135][T19142] device bridge_slave_1 entered promiscuous mode [ 801.996100][T19141] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.003351][T19141] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.011753][T19141] device bridge_slave_0 entered promiscuous mode [ 802.032634][T19141] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.039698][T19141] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.046962][T19141] device bridge_slave_1 entered promiscuous mode [ 802.132391][T19144] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.139492][T19144] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.147468][T19144] device bridge_slave_0 entered promiscuous mode [ 802.157841][T19144] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.164845][T19144] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.172576][T19144] device bridge_slave_1 entered promiscuous mode [ 802.178988][T19143] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.186503][T19143] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.193651][T19143] device bridge_slave_0 entered promiscuous mode [ 802.215707][T19143] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.222638][T19143] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.229632][T19143] device bridge_slave_1 entered promiscuous mode [ 802.264963][T19142] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.271830][T19142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.278949][T19142] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.286798][T19142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.309116][T19140] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.316071][T19140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.323162][T19140] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.329929][T19140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.355587][T19141] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.362439][T19141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.369504][T19141] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.376465][T19141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.419146][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 802.426779][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.435107][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.443886][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.451425][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.460087][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.467393][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.485067][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 802.492399][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 802.500728][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.507586][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.530305][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 802.554325][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 802.562431][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.569242][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.576489][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 802.584608][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.591447][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.598853][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 802.607058][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.614699][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.633105][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 802.641715][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.654823][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.678957][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 802.686778][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 802.694837][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 802.703069][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.709884][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.732752][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 802.742797][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 802.751153][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 802.760291][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 802.768584][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 802.777592][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.784540][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.791785][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 802.800129][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.806975][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.814570][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 802.846319][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 802.854399][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 802.862411][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 802.870127][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 802.877899][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 802.887256][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 802.896636][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 802.907796][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 802.919437][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 802.929515][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 802.937579][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.944681][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.952161][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 802.959582][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 802.966914][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 802.976241][T19140] device veth0_vlan entered promiscuous mode [ 802.986452][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 802.994489][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 803.010054][T19142] device veth0_vlan entered promiscuous mode [ 803.019827][T19140] device veth1_macvtap entered promiscuous mode [ 803.026705][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 803.034809][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 803.043257][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.051588][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 803.060130][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 803.068757][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 803.078625][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 803.086621][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 803.094558][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 803.102919][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 803.111116][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 803.118794][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 803.127100][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 803.156936][T19142] device veth1_macvtap entered promiscuous mode [ 803.172751][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 803.180615][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 803.188934][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 803.197289][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 803.205390][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 803.212833][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 803.220572][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 803.228489][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 803.236642][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 803.261943][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 803.270177][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 803.279262][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 803.287871][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 803.296108][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 803.304814][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 803.312980][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 803.320331][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 803.333787][T19144] device veth0_vlan entered promiscuous mode [ 803.341735][T19141] device veth0_vlan entered promiscuous mode [ 803.354916][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 803.363432][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 803.372489][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 803.380456][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 803.389185][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 803.397317][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 803.406391][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 803.419796][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 803.430082][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 803.439062][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 803.447805][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 803.455701][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 803.478490][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 803.486680][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 803.527216][T19144] device veth1_macvtap entered promiscuous mode [ 803.535027][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 803.551728][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 803.569840][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 803.614648][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 803.693916][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 803.798785][T19143] device veth0_vlan entered promiscuous mode [ 803.812915][T19141] device veth1_macvtap entered promiscuous mode [ 803.852360][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 803.862967][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 803.871383][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 803.879393][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 803.888020][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 803.900539][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 803.909719][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 803.918527][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 803.926913][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 803.939656][T19182] device veth0_vlan left promiscuous mode [ 803.949932][T19182] device veth0_vlan entered promiscuous mode [ 803.981196][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 803.997733][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 804.011547][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 804.019848][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 804.030437][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 804.039687][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 804.051477][T19143] device veth1_macvtap entered promiscuous mode [ 804.091793][ T7] device erspan0 left promiscuous mode [ 804.097242][ T7] GPL: port 1(erspan0) entered disabled state [ 804.133771][ T7] device erspan0 left promiscuous mode [ 804.168275][ T7] GPL: port 1(erspan0) entered disabled state [ 804.249820][T19191] device veth1_macvtap left promiscuous mode [ 804.260904][T19191] device macsec0 entered promiscuous mode [ 804.282027][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 804.293701][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 804.313888][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 804.697980][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 804.761409][ T1372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 805.211815][ T7] device bridge_slave_1 left promiscuous mode [ 805.241618][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 805.384839][ T7] device bridge_slave_0 left promiscuous mode [ 805.529604][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 805.582730][ T7] device bridge_slave_1 left promiscuous mode [ 805.588773][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 805.638540][ T7] device bridge_slave_0 left promiscuous mode [ 805.661022][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 805.702828][ T7] device bridge_slave_1 left promiscuous mode [ 805.744796][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.020972][ T7] device bridge_slave_0 left promiscuous mode [ 806.028026][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.214167][ T7] device bridge_slave_1 left promiscuous mode [ 806.220133][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.431285][ T7] device bridge_slave_0 left promiscuous mode [ 806.437366][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.514129][ T7] device bridge_slave_1 left promiscuous mode [ 806.520293][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.548674][ T7] device bridge_slave_0 left promiscuous mode [ 806.558812][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.607954][ T7] device veth0_vlan left promiscuous mode [ 806.691428][ T7] device veth0_vlan left promiscuous mode [ 806.713539][ T7] device veth0_vlan left promiscuous mode [ 806.773698][ T7] device veth0_vlan left promiscuous mode [ 806.779400][ T7] device veth0_vlan left promiscuous mode [ 810.450200][T19299] device veth0_vlan left promiscuous mode [ 810.593243][T19299] device veth0_vlan entered promiscuous mode [ 811.208056][T19325] device veth0_vlan left promiscuous mode [ 811.325937][T19325] device veth0_vlan entered promiscuous mode [ 811.674424][T19334] device veth0_vlan left promiscuous mode [ 811.783034][T19334] device veth0_vlan entered promiscuous mode [ 813.754309][T19364] device veth0_vlan left promiscuous mode [ 813.897295][T19364] device veth0_vlan entered promiscuous mode [ 815.544427][T19397] device sit0 entered promiscuous mode [ 817.679847][T19456] device veth1_macvtap left promiscuous mode [ 817.689198][T19456] device macsec0 entered promiscuous mode [ 817.986782][T19482] device veth0_vlan left promiscuous mode [ 818.036150][T19482] device veth0_vlan entered promiscuous mode [ 818.291782][T19484] device syzkaller0 entered promiscuous mode [ 818.421581][T19493] device veth0_vlan left promiscuous mode [ 818.486031][T19493] device veth0_vlan entered promiscuous mode [ 818.688273][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 818.732798][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 818.820181][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 819.190749][T19530] device syzkaller0 entered promiscuous mode [ 819.557126][T19543] device sit0 left promiscuous mode [ 819.824619][T19559] device veth0_vlan left promiscuous mode [ 819.885639][T19559] device veth0_vlan entered promiscuous mode [ 820.113343][T19567] device veth0_vlan left promiscuous mode [ 820.120931][T19567] device veth0_vlan entered promiscuous mode [ 820.934739][T19629] device syzkaller0 entered promiscuous mode [ 824.588750][T19719] device veth0_vlan left promiscuous mode [ 824.633799][T19719] device veth0_vlan entered promiscuous mode [ 826.295495][T19750] device syzkaller0 entered promiscuous mode [ 826.491088][T19757] device veth0_vlan left promiscuous mode [ 826.544152][T19757] device veth0_vlan entered promiscuous mode [ 827.740310][T19797] device syzkaller0 entered promiscuous mode [ 827.844405][T19806] tun0: tun_chr_ioctl cmd 1074025675 [ 827.852455][T19806] tun0: persist enabled [ 827.921734][T19807] tun0: tun_chr_ioctl cmd 1074025675 [ 827.926852][T19807] tun0: persist disabled [ 828.319728][T19810] device syzkaller0 entered promiscuous mode [ 828.437057][ T1511] syzkaller0: tun_net_xmit 48 [ 829.483913][T19850] ÿÿÿÿÿÿ: renamed from vlan1 [ 829.757461][T19868] device veth0_vlan left promiscuous mode [ 829.937194][T19868] device veth0_vlan entered promiscuous mode [ 830.065210][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 830.081669][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 830.193831][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 830.763731][T19906] device pim6reg1 entered promiscuous mode [ 831.156751][T19916] device syzkaller0 entered promiscuous mode [ 831.341729][T19274] syzkaller0: tun_net_xmit 48 [ 831.491497][T19941] device pim6reg1 entered promiscuous mode [ 833.963509][T20045] device veth1_macvtap left promiscuous mode [ 834.037771][T20045] device macsec0 entered promiscuous mode [ 834.430932][T20066] device pim6reg1 entered promiscuous mode [ 839.177217][T20226] device pim6reg1 entered promiscuous mode [ 839.461141][T20245] : renamed from ipvlan1 [ 841.411128][T20288] device veth1_macvtap left promiscuous mode [ 841.839929][T20310] FAULT_INJECTION: forcing a failure. [ 841.839929][T20310] name failslab, interval 1, probability 0, space 0, times 0 [ 841.972145][T20310] CPU: 1 PID: 20310 Comm: syz.6.6679 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 841.983344][T20310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 841.993240][T20310] Call Trace: [ 841.996367][T20310] dump_stack_lvl+0x1e2/0x24b [ 842.000877][T20310] ? bfq_pos_tree_add_move+0x43b/0x43b [ 842.006167][T20310] ? kmem_cache_free+0xa9/0x1e0 [ 842.010853][T20310] ? kasan_set_track+0x5d/0x70 [ 842.015451][T20310] ? kasan_set_free_info+0x23/0x40 [ 842.020400][T20310] dump_stack+0x15/0x17 [ 842.024391][T20310] should_fail+0x3c6/0x510 [ 842.028643][T20310] ? dup_task_struct+0x57/0xc30 [ 842.033334][T20310] __should_failslab+0xa4/0xe0 [ 842.037932][T20310] should_failslab+0x9/0x20 [ 842.042276][T20310] kmem_cache_alloc+0x3d/0x2e0 [ 842.046889][T20310] ? __kasan_check_write+0x14/0x20 [ 842.052132][T20310] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 842.057088][T20310] dup_task_struct+0x57/0xc30 [ 842.061630][T20310] ? __kasan_check_write+0x14/0x20 [ 842.066699][T20310] copy_process+0x5c8/0x3340 [ 842.071236][T20310] ? proc_fail_nth_write+0x20b/0x290 [ 842.076664][T20310] ? proc_fail_nth_read+0x210/0x210 [ 842.081705][T20310] ? security_file_permission+0x86/0xb0 [ 842.087094][T20310] ? rw_verify_area+0x1c3/0x360 [ 842.091770][T20310] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 842.096710][T20310] ? vfs_write+0x852/0xe70 [ 842.100977][T20310] ? kmem_cache_free+0xa9/0x1e0 [ 842.106095][T20310] kernel_clone+0x21e/0x9e0 [ 842.110886][T20310] ? __kasan_check_write+0x14/0x20 [ 842.115883][T20310] ? create_io_thread+0x1e0/0x1e0 [ 842.120925][T20310] __x64_sys_clone+0x23f/0x290 [ 842.125518][T20310] ? __do_sys_vfork+0x130/0x130 [ 842.130213][T20310] ? __bpf_trace_sys_enter+0x62/0x70 [ 842.135326][T20310] ? syscall_enter_from_user_mode+0x144/0x1a0 [ 842.141228][T20310] do_syscall_64+0x34/0x70 [ 842.145484][T20310] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 842.151207][T20310] RIP: 0033:0x7f3f2abab819 [ 842.155464][T20310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 842.174938][T20310] RSP: 002b:00007f3f29223fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 842.183239][T20310] RAX: ffffffffffffffda RBX: 00007f3f2ad62fa0 RCX: 00007f3f2abab819 [ 842.191131][T20310] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 842.198941][T20310] RBP: 00007f3f29224090 R08: 0000000000000000 R09: 0000000000000000 [ 842.206752][T20310] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 842.214770][T20310] R13: 0000000000000000 R14: 00007f3f2ad62fa0 R15: 00007ffe4e1f2448 [ 842.261020][T20320] device syzkaller0 entered promiscuous mode [ 842.267672][ T1512] syzkaller0: tun_net_xmit 48 [ 842.337425][T20322] device veth0_vlan left promiscuous mode [ 842.430690][T20322] device veth0_vlan entered promiscuous mode [ 842.566920][T20334] device syzkaller0 entered promiscuous mode [ 842.585810][T20346] device pim6reg1 entered promiscuous mode [ 842.699887][T20348] device syzkaller0 entered promiscuous mode [ 844.574712][T20387] device pim6reg1 entered promiscuous mode [ 846.317208][T20419] device macsec0 left promiscuous mode [ 846.756254][T20449] ref_ctr_offset mismatch. inode: 0x1e4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 847.477771][T20471] device syzkaller0 entered promiscuous mode [ 847.512175][T20472] bridge0: port 2(bridge_slave_1) entered disabled state [ 847.673878][T20484] device syzkaller0 entered promiscuous mode [ 849.483318][T20543] device veth0_vlan left promiscuous mode [ 849.697637][T20543] device veth0_vlan entered promiscuous mode [ 849.943425][T20557] FAULT_INJECTION: forcing a failure. [ 849.943425][T20557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 849.983332][T20561] device pim6reg1 entered promiscuous mode [ 850.008180][T20557] CPU: 1 PID: 20557 Comm: syz.3.6768 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 850.019415][T20557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 850.030556][T20557] Call Trace: [ 850.033737][T20557] dump_stack_lvl+0x1e2/0x24b [ 850.038246][T20557] ? bfq_pos_tree_add_move+0x43b/0x43b [ 850.043541][T20557] ? __irq_exit_rcu+0x40/0x150 [ 850.048139][T20557] ? irq_exit_rcu+0x9/0x10 [ 850.052388][T20557] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 850.058029][T20557] dump_stack+0x15/0x17 [ 850.062020][T20557] should_fail+0x3c6/0x510 [ 850.066273][T20557] should_fail_usercopy+0x1a/0x20 [ 850.071133][T20557] strncpy_from_user+0x24/0x2d0 [ 850.075824][T20557] __se_sys_bpf+0x1389/0x11cb0 [ 850.081327][T20557] ? perf_event_output_forward+0x14e/0x1b0 [ 850.086986][T20557] ? __perf_event_task_sched_in+0x1f9/0x2a0 [ 850.092778][T20557] ? perf_prepare_sample+0x1af0/0x1af0 [ 850.098066][T20557] ? finish_task_switch+0x130/0x5a0 [ 850.103100][T20557] ? __x64_sys_bpf+0x90/0x90 [ 850.107610][T20557] ? __this_cpu_preempt_check+0x13/0x20 [ 850.113526][T20557] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 850.119591][T20557] ? hrtimer_forward+0x1a6/0x2c0 [ 850.124362][T20557] ? cpu_clock_event_read+0x50/0x50 [ 850.129659][T20557] ? preempt_schedule_irq+0xe7/0x140 [ 850.134782][T20557] ? timerqueue_add+0x24c/0x270 [ 850.139463][T20557] ? enqueue_hrtimer+0xad/0x200 [ 850.147360][T20557] ? __hrtimer_run_queues+0x438/0xa50 [ 850.152649][T20557] ? __hrtimer_run_queues+0x9ea/0xa50 [ 850.158115][T20557] ? ktime_get+0x10e/0x140 [ 850.162344][T20557] ? lapic_next_event+0x5f/0x70 [ 850.167051][T20557] ? clockevents_program_event+0x214/0x2c0 [ 850.172679][T20557] ? hrtimer_interrupt+0x6a8/0x8b0 [ 850.177630][T20557] ? debug_smp_processor_id+0x17/0x20 [ 850.182826][T20557] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 850.188724][T20557] __x64_sys_bpf+0x7b/0x90 [ 850.193062][T20557] do_syscall_64+0x34/0x70 [ 850.197586][T20557] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 850.203303][T20557] RIP: 0033:0x7f1587923819 [ 850.207559][T20557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 850.226997][T20557] RSP: 002b:00007f1585f9c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 850.235242][T20557] RAX: ffffffffffffffda RBX: 00007f1587adafa0 RCX: 00007f1587923819 [ 850.243054][T20557] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 850.251473][T20557] RBP: 00007f1585f9c090 R08: 0000000000000000 R09: 0000000000000000 [ 850.259372][T20557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 850.267186][T20557] R13: 0000000000000000 R14: 00007f1587adafa0 R15: 00007ffc799733d8 [ 850.689855][T20564] device syzkaller0 entered promiscuous mode [ 850.757303][T20570] device syzkaller0 entered promiscuous mode [ 850.767968][ T6109] syzkaller0: tun_net_xmit 48 [ 850.787846][T20560] device pim6reg1 entered promiscuous mode [ 852.897468][T20613] device veth0_vlan left promiscuous mode [ 853.083459][T20613] device veth0_vlan entered promiscuous mode [ 855.189834][T20663] FAULT_INJECTION: forcing a failure. [ 855.189834][T20663] name failslab, interval 1, probability 0, space 0, times 0 [ 855.202863][T20663] CPU: 1 PID: 20663 Comm: syz.6.6801 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 855.214546][T20663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 855.224977][T20663] Call Trace: [ 855.228104][T20663] dump_stack_lvl+0x1e2/0x24b [ 855.232605][T20663] ? panic+0x812/0x812 [ 855.236687][T20663] ? bfq_pos_tree_add_move+0x43b/0x43b [ 855.241979][T20663] ? avc_has_perm_noaudit+0x153/0x240 [ 855.247192][T20663] ? avc_has_perm_noaudit+0x117/0x240 [ 855.252395][T20663] dump_stack+0x15/0x17 [ 855.256380][T20663] should_fail+0x3c6/0x510 [ 855.260636][T20663] ? __get_vm_area_node+0x116/0x470 [ 855.265673][T20663] __should_failslab+0xa4/0xe0 [ 855.270269][T20663] should_failslab+0x9/0x20 [ 855.274617][T20663] kmem_cache_alloc_trace+0x3a/0x2e0 [ 855.279732][T20663] __get_vm_area_node+0x116/0x470 [ 855.284595][T20663] __vmalloc_node_range+0xdc/0x7c0 [ 855.289538][T20663] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 855.294925][T20663] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 855.300670][T20663] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 855.306033][T20663] __vmalloc+0x7a/0x90 [ 855.310086][T20663] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 855.315862][T20663] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 855.321409][T20663] bpf_prog_alloc+0x21/0x1e0 [ 855.326888][T20663] __se_sys_bpf+0x9856/0x11cb0 [ 855.331954][T20663] ? kvm_sched_clock_read+0x18/0x40 [ 855.337165][T20663] ? perf_prepare_sample+0x1af0/0x1af0 [ 855.342636][T20663] ? __x64_sys_bpf+0x90/0x90 [ 855.347251][T20663] ? __this_cpu_preempt_check+0x13/0x20 [ 855.352988][T20663] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 855.359037][T20663] ? hrtimer_forward+0x1a6/0x2c0 [ 855.363950][T20663] ? cpu_clock_event_read+0x50/0x50 [ 855.368967][T20663] ? timerqueue_add+0x24c/0x270 [ 855.373652][T20663] ? enqueue_hrtimer+0xad/0x200 [ 855.378325][T20663] ? __hrtimer_run_queues+0x438/0xa50 [ 855.383537][T20663] ? __hrtimer_run_queues+0x9ea/0xa50 [ 855.394318][T20663] ? ktime_get+0x10e/0x140 [ 855.398735][T20663] ? lapic_next_event+0x5f/0x70 [ 855.403421][T20663] ? clockevents_program_event+0x214/0x2c0 [ 855.411527][T20663] ? hrtimer_interrupt+0x6a8/0x8b0 [ 855.418438][T20663] ? debug_smp_processor_id+0x17/0x20 [ 855.423739][T20663] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 855.429644][T20663] __x64_sys_bpf+0x7b/0x90 [ 855.433888][T20663] do_syscall_64+0x34/0x70 [ 855.438146][T20663] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 855.443868][T20663] RIP: 0033:0x7f3f2abab819 [ 855.448124][T20663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 855.467571][T20663] RSP: 002b:00007f3f29224038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 855.476258][T20663] RAX: ffffffffffffffda RBX: 00007f3f2ad62fa0 RCX: 00007f3f2abab819 [ 855.484323][T20663] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 855.492127][T20663] RBP: 00007f3f29224090 R08: 0000000000000000 R09: 0000000000000000 [ 855.499934][T20663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 855.507746][T20663] R13: 0000000000000000 R14: 00007f3f2ad62fa0 R15: 00007ffe4e1f2448 [ 855.820958][T20663] syz.6.6801: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz6,mems_allowed=0 [ 856.271106][T20663] CPU: 0 PID: 20663 Comm: syz.6.6801 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 856.284700][T20663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 856.294594][T20663] Call Trace: [ 856.298057][T20663] dump_stack_lvl+0x1e2/0x24b [ 856.302492][T20663] ? wake_up_klogd+0xb8/0xf0 [ 856.306947][T20663] ? bfq_pos_tree_add_move+0x43b/0x43b [ 856.312472][T20663] ? pr_cont_kernfs_name+0xf0/0x100 [ 856.317596][T20663] dump_stack+0x15/0x17 [ 856.321586][T20663] warn_alloc+0x21a/0x390 [ 856.325761][T20663] ? __get_vm_area_node+0x116/0x470 [ 856.330804][T20663] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 856.336164][T20663] ? __kasan_kmalloc+0x9/0x10 [ 856.340684][T20663] ? __get_vm_area_node+0x34b/0x470 [ 856.345714][T20663] __vmalloc_node_range+0x287/0x7c0 [ 856.350759][T20663] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 856.356394][T20663] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 856.361772][T20663] __vmalloc+0x7a/0x90 [ 856.365677][T20663] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 856.371058][T20663] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 856.376264][T20663] bpf_prog_alloc+0x21/0x1e0 [ 856.380730][T20663] __se_sys_bpf+0x9856/0x11cb0 [ 856.385948][T20663] ? kvm_sched_clock_read+0x18/0x40 [ 856.392520][T20663] ? perf_prepare_sample+0x1af0/0x1af0 [ 856.399204][T20663] ? __x64_sys_bpf+0x90/0x90 [ 856.404541][T20663] ? __this_cpu_preempt_check+0x13/0x20 [ 856.409918][T20663] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 856.419129][T20663] ? hrtimer_forward+0x1a6/0x2c0 [ 856.424013][T20663] ? cpu_clock_event_read+0x50/0x50 [ 856.429375][T20663] ? timerqueue_add+0x24c/0x270 [ 856.434054][T20663] ? enqueue_hrtimer+0xad/0x200 [ 856.438724][T20663] ? __hrtimer_run_queues+0x438/0xa50 [ 856.443924][T20663] ? __hrtimer_run_queues+0x9ea/0xa50 [ 856.449136][T20663] ? ktime_get+0x10e/0x140 [ 856.453385][T20663] ? lapic_next_event+0x5f/0x70 [ 856.458074][T20663] ? clockevents_program_event+0x214/0x2c0 [ 856.463712][T20663] ? hrtimer_interrupt+0x6a8/0x8b0 [ 856.468666][T20663] ? debug_smp_processor_id+0x17/0x20 [ 856.473959][T20663] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 856.480030][T20663] __x64_sys_bpf+0x7b/0x90 [ 856.484283][T20663] do_syscall_64+0x34/0x70 [ 856.488552][T20663] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 856.494257][T20663] RIP: 0033:0x7f3f2abab819 [ 856.498516][T20663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 856.517953][T20663] RSP: 002b:00007f3f29224038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 856.526202][T20663] RAX: ffffffffffffffda RBX: 00007f3f2ad62fa0 RCX: 00007f3f2abab819 [ 856.534009][T20663] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 856.541828][T20663] RBP: 00007f3f29224090 R08: 0000000000000000 R09: 0000000000000000 [ 856.549763][T20663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 856.557654][T20663] R13: 0000000000000000 R14: 00007f3f2ad62fa0 R15: 00007ffe4e1f2448 [ 856.975510][T20663] Mem-Info: [ 856.978480][T20663] active_anon:121 inactive_anon:13898 isolated_anon:0 [ 856.978480][T20663] active_file:25648 inactive_file:4319 isolated_file:0 [ 856.978480][T20663] unevictable:0 dirty:389 writeback:0 [ 856.978480][T20663] slab_reclaimable:7855 slab_unreclaimable:76171 [ 856.978480][T20663] mapped:32519 shmem:3231 pagetables:566 bounce:0 [ 856.978480][T20663] free:1549800 free_pcp:825 free_cma:0 [ 857.319109][T20663] Node 0 active_anon:484kB inactive_anon:63292kB active_file:102592kB inactive_file:17276kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:137676kB dirty:1556kB writeback:0kB shmem:20524kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4704kB all_unreclaimable? no [ 857.724659][T20663] DMA32 free:2983352kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984760kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1408kB local_pcp:52kB free_cma:0kB [ 857.782457][T20663] lowmem_reserve[]: 0 3941 3941 [ 857.787172][T20663] Normal free:3196088kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:484kB inactive_anon:75592kB active_file:102592kB inactive_file:17276kB unevictable:0kB writepending:1556kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2560kB bounce:0kB free_pcp:848kB local_pcp:520kB free_cma:0kB [ 857.922641][T20663] lowmem_reserve[]: 0 0 0 [ 857.927050][T20663] DMA32: 6*4kB (UM) 4*8kB (M) 4*16kB (M) 8*32kB (UM) 7*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2983352kB [ 857.990894][T20663] Normal: 202*4kB (UME) 169*8kB (UE) 1445*16kB (UME) 239*32kB (UE) 429*64kB (UME) 289*128kB (UME) 155*256kB (UME) 73*512kB (UME) 40*1024kB (UM) 14*2048kB (UM) 719*4096kB (M) = 3189088kB [ 858.049255][T20663] 40625 total pagecache pages [ 858.060478][T20663] 0 pages in swap cache [ 858.105421][T20663] Swap cache stats: add 0, delete 0, find 0/0 [ 858.133324][T20663] Free swap = 124996kB [ 858.143856][T20663] Total swap = 124996kB [ 858.162959][T20663] 2097051 pages RAM [ 858.166681][T20663] 0 pages HighMem/MovableOnly [ 858.195490][T20663] 341897 pages reserved [ 858.199470][T20663] 0 pages cma reserved [ 862.660379][T20858] device syzkaller0 entered promiscuous mode [ 862.733325][T18326] syzkaller0: tun_net_xmit 48 [ 863.196560][T20862] device syzkaller0 entered promiscuous mode [ 864.662838][T20883] geneve1: tun_chr_ioctl cmd 1074025677 [ 864.698694][T20883] geneve1: linktype set to 6 [ 865.224599][T20908] syz.8.6882[20908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 865.224655][T20908] syz.8.6882[20908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 866.675899][T20950] device veth0_vlan left promiscuous mode [ 866.730035][T20950] device veth0_vlan entered promiscuous mode [ 866.837004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 866.850114][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 866.870877][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 867.243458][T20962] syz.7.6898[20962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.243550][T20962] syz.7.6898[20962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 869.152972][T21012] syz.7.6914[21012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 869.281213][T21012] syz.7.6914[21012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 870.097613][T21030] device syzkaller0 entered promiscuous mode [ 874.467287][T21134] device veth0_vlan left promiscuous mode [ 874.501868][T21134] device veth0_vlan entered promiscuous mode [ 874.510173][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 874.562210][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 874.661753][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 876.024326][T21170] device veth0_vlan left promiscuous mode [ 876.049538][T21170] device veth0_vlan entered promiscuous mode [ 876.207422][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 876.226732][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 876.299026][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 877.388475][T21200] device veth0_vlan left promiscuous mode [ 877.475056][T21200] device veth0_vlan entered promiscuous mode [ 878.321362][T21244] device veth0_vlan left promiscuous mode [ 878.328785][T21244] device veth0_vlan entered promiscuous mode [ 878.485630][T21247] device veth1_macvtap entered promiscuous mode [ 878.492842][T21247] device macsec0 entered promiscuous mode [ 878.500427][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 878.509352][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 878.518427][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 878.526510][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 883.122242][T21350] syz.3.7029[21350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 883.122301][T21350] syz.3.7029[21350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 883.611550][T21362] syz.1.7034[21362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 883.751507][T21362] syz.1.7034[21362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 887.274675][T21403] device veth0_vlan left promiscuous mode [ 887.447493][T21403] device veth0_vlan entered promiscuous mode [ 887.482340][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 887.491317][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 887.498661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 888.572694][T21422] syz.8.7053[21422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 888.572754][T21422] syz.8.7053[21422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 890.709975][T21519] device sit0 entered promiscuous mode [ 891.181130][T21525] device veth0_vlan left promiscuous mode [ 891.255489][T21525] device veth0_vlan entered promiscuous mode [ 891.284673][T21531] syz.6.7089[21531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 891.284731][T21531] syz.6.7089[21531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 891.406876][T21538] FAULT_INJECTION: forcing a failure. [ 891.406876][T21538] name failslab, interval 1, probability 0, space 0, times 0 [ 891.555360][T21540] device macsec0 left promiscuous mode [ 891.609108][T21541] device veth1_macvtap entered promiscuous mode [ 891.630856][T21538] CPU: 0 PID: 21538 Comm: syz.8.7092 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 891.642040][T21538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 891.651938][T21538] Call Trace: [ 891.655070][T21538] dump_stack_lvl+0x1e2/0x24b [ 891.659600][T21538] ? bfq_pos_tree_add_move+0x43b/0x43b [ 891.664902][T21538] dump_stack+0x15/0x17 [ 891.668877][T21538] should_fail+0x3c6/0x510 [ 891.673322][T21538] ? kvmalloc_node+0x82/0x130 [ 891.678822][T21538] __should_failslab+0xa4/0xe0 [ 891.684962][T21538] should_failslab+0x9/0x20 [ 891.689851][T21538] __kmalloc+0x60/0x330 [ 891.693828][T21538] kvmalloc_node+0x82/0x130 [ 891.698162][T21538] btf_new_fd+0x2c3/0x9c0 [ 891.700812][T21541] device macsec0 entered promiscuous mode [ 891.702333][T21538] __se_sys_bpf+0x1aed/0x11cb0 [ 891.712832][T21538] ? stack_trace_save+0x113/0x1c0 [ 891.717685][T21538] ? terminate_walk+0x407/0x4f0 [ 891.721163][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 891.722381][T21538] ? stack_trace_snprint+0xf0/0xf0 [ 891.736632][T21538] ? kmem_cache_free+0xa9/0x1e0 [ 891.742016][T21538] ? kmem_cache_free+0xa9/0x1e0 [ 891.746681][T21538] ? kasan_set_track+0x5d/0x70 [ 891.751368][T21538] ? __x64_sys_bpf+0x90/0x90 [ 891.755791][T21538] ? __kasan_slab_free+0x11/0x20 [ 891.760565][T21538] ? slab_free_freelist_hook+0xc0/0x190 [ 891.765955][T21538] ? kmem_cache_free+0xa9/0x1e0 [ 891.770635][T21538] ? putname+0xe7/0x140 [ 891.774627][T21538] ? do_sys_openat2+0x1fc/0x710 [ 891.779311][T21538] ? __x64_sys_openat+0x243/0x290 [ 891.784175][T21538] ? do_syscall_64+0x34/0x70 [ 891.788600][T21538] ? _kstrtoull+0x3a0/0x4a0 [ 891.792943][T21538] ? kstrtouint_from_user+0x20a/0x2a0 [ 891.798148][T21538] ? kstrtol_from_user+0x310/0x310 [ 891.803536][T21538] ? memset+0x35/0x40 [ 891.807638][T21538] ? __fsnotify_parent+0x4b9/0x6c0 [ 891.812555][T21538] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 891.819103][T21538] ? proc_fail_nth_write+0x20b/0x290 [ 891.824230][T21538] ? proc_fail_nth_read+0x210/0x210 [ 891.829237][T21538] ? security_file_permission+0x86/0xb0 [ 891.834614][T21538] ? rw_verify_area+0x1c3/0x360 [ 891.839326][T21538] ? preempt_count_add+0x92/0x1a0 [ 891.844161][T21538] ? vfs_write+0x852/0xe70 [ 891.849631][T21538] ? kmem_cache_free+0xa9/0x1e0 [ 891.854582][T21538] ? kernel_write+0x3d0/0x3d0 [ 891.860936][T21538] ? __kasan_check_write+0x14/0x20 [ 891.866535][T21538] ? mutex_lock+0xa5/0x110 [ 891.870860][T21538] ? mutex_trylock+0xa0/0xa0 [ 891.877157][T21538] ? __kasan_check_write+0x14/0x20 [ 891.882828][T21538] ? fput_many+0x160/0x1b0 [ 891.887361][T21538] ? debug_smp_processor_id+0x17/0x20 [ 891.892851][T21538] __x64_sys_bpf+0x7b/0x90 [ 891.897445][T21538] do_syscall_64+0x34/0x70 [ 891.901690][T21538] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 891.908320][T21538] RIP: 0033:0x7fa3fb54b819 [ 891.912765][T21538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 891.932623][T21538] RSP: 002b:00007fa3f9bc4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 891.940853][T21538] RAX: ffffffffffffffda RBX: 00007fa3fb702fa0 RCX: 00007fa3fb54b819 [ 891.948670][T21538] RDX: 0000000000000028 RSI: 0000000020004680 RDI: 0000000000000012 [ 891.956473][T21538] RBP: 00007fa3f9bc4090 R08: 0000000000000000 R09: 0000000000000000 [ 891.964286][T21538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.972216][T21538] R13: 0000000000000001 R14: 00007fa3fb702fa0 R15: 00007ffcf910d298 [ 892.004998][T21550] device wg1 entered promiscuous mode [ 893.306507][T21624] syz.6.7123[21624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.306564][T21624] syz.6.7123[21624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.332470][T21626] syz.7.7124[21626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.461173][T21626] syz.7.7124[21626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 894.248067][T21649] FAULT_INJECTION: forcing a failure. [ 894.248067][T21649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 894.453685][T21649] CPU: 0 PID: 21649 Comm: syz.8.7132 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 894.465677][T21649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 894.475641][T21649] Call Trace: [ 894.478790][T21649] dump_stack_lvl+0x1e2/0x24b [ 894.483281][T21649] ? bfq_pos_tree_add_move+0x43b/0x43b [ 894.489010][T21649] dump_stack+0x15/0x17 [ 894.492994][T21649] should_fail+0x3c6/0x510 [ 894.497270][T21649] should_fail_usercopy+0x1a/0x20 [ 894.502104][T21649] _copy_from_user+0x20/0xd0 [ 894.506531][T21649] btf_new_fd+0x334/0x9c0 [ 894.510697][T21649] __se_sys_bpf+0x1aed/0x11cb0 [ 894.515300][T21649] ? stack_trace_save+0x113/0x1c0 [ 894.520163][T21649] ? terminate_walk+0x407/0x4f0 [ 894.525290][T21649] ? stack_trace_snprint+0xf0/0xf0 [ 894.530552][T21649] ? kmem_cache_free+0xa9/0x1e0 [ 894.535612][T21649] ? kmem_cache_free+0xa9/0x1e0 [ 894.540728][T21649] ? kasan_set_track+0x5d/0x70 [ 894.545382][T21649] ? __x64_sys_bpf+0x90/0x90 [ 894.549769][T21649] ? __kasan_slab_free+0x11/0x20 [ 894.554627][T21649] ? slab_free_freelist_hook+0xc0/0x190 [ 894.560022][T21649] ? kmem_cache_free+0xa9/0x1e0 [ 894.564703][T21649] ? putname+0xe7/0x140 [ 894.568968][T21649] ? do_sys_openat2+0x1fc/0x710 [ 894.573668][T21649] ? __x64_sys_openat+0x243/0x290 [ 894.578673][T21649] ? do_syscall_64+0x34/0x70 [ 894.583135][T21649] ? _kstrtoull+0x3a0/0x4a0 [ 894.587481][T21649] ? kstrtouint_from_user+0x20a/0x2a0 [ 894.592697][T21649] ? kstrtol_from_user+0x310/0x310 [ 894.597627][T21649] ? memset+0x35/0x40 [ 894.601448][T21649] ? __fsnotify_parent+0x4b9/0x6c0 [ 894.606392][T21649] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 894.612811][T21649] ? proc_fail_nth_write+0x20b/0x290 [ 894.617933][T21649] ? proc_fail_nth_read+0x210/0x210 [ 894.622970][T21649] ? security_file_permission+0x86/0xb0 [ 894.628350][T21649] ? rw_verify_area+0x1c3/0x360 [ 894.633040][T21649] ? preempt_count_add+0x92/0x1a0 [ 894.637897][T21649] ? vfs_write+0x852/0xe70 [ 894.642152][T21649] ? kmem_cache_free+0xa9/0x1e0 [ 894.646937][T21649] ? kernel_write+0x3d0/0x3d0 [ 894.651441][T21649] ? __kasan_check_write+0x14/0x20 [ 894.657204][T21649] ? mutex_lock+0xa5/0x110 [ 894.661532][T21649] ? mutex_trylock+0xa0/0xa0 [ 894.666001][T21649] ? __kasan_check_write+0x14/0x20 [ 894.670922][T21649] ? fput_many+0x160/0x1b0 [ 894.675877][T21649] ? debug_smp_processor_id+0x17/0x20 [ 894.681071][T21649] __x64_sys_bpf+0x7b/0x90 [ 894.685420][T21649] do_syscall_64+0x34/0x70 [ 894.689800][T21649] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 894.695692][T21649] RIP: 0033:0x7fa3fb54b819 [ 894.699948][T21649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 894.719567][T21649] RSP: 002b:00007fa3f9bc4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 894.728176][T21649] RAX: ffffffffffffffda RBX: 00007fa3fb702fa0 RCX: 00007fa3fb54b819 [ 894.736566][T21649] RDX: 0000000000000028 RSI: 0000000020004680 RDI: 0000000000000012 [ 894.744372][T21649] RBP: 00007fa3f9bc4090 R08: 0000000000000000 R09: 0000000000000000 [ 894.752184][T21649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 894.759995][T21649] R13: 0000000000000001 R14: 00007fa3fb702fa0 R15: 00007ffcf910d298 [ 894.959257][T21658] device pimreg0 entered promiscuous mode [ 895.275682][T21673] FAULT_INJECTION: forcing a failure. [ 895.275682][T21673] name failslab, interval 1, probability 0, space 0, times 0 [ 895.291329][T21673] CPU: 0 PID: 21673 Comm: syz.1.7141 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 895.302134][T21672] syz.7.7142[21672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 895.302864][T21673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 895.302878][T21673] Call Trace: [ 895.327094][T21673] dump_stack_lvl+0x1e2/0x24b [ 895.331621][T21673] ? bfq_pos_tree_add_move+0x43b/0x43b [ 895.336896][T21673] ? selinux_capable+0x2f1/0x430 [ 895.341669][T21673] dump_stack+0x15/0x17 [ 895.345660][T21673] should_fail+0x3c6/0x510 [ 895.349913][T21673] ? btf_new_fd+0x112/0x9c0 [ 895.354253][T21673] __should_failslab+0xa4/0xe0 [ 895.358858][T21673] should_failslab+0x9/0x20 [ 895.363194][T21673] kmem_cache_alloc_trace+0x3a/0x2e0 [ 895.368334][T21673] btf_new_fd+0x112/0x9c0 [ 895.372492][T21673] __se_sys_bpf+0x1aed/0x11cb0 [ 895.377609][T21673] ? stack_trace_save+0x113/0x1c0 [ 895.382655][T21673] ? terminate_walk+0x407/0x4f0 [ 895.387465][T21673] ? stack_trace_snprint+0xf0/0xf0 [ 895.392746][T21673] ? kmem_cache_free+0xa9/0x1e0 [ 895.397569][T21673] ? kmem_cache_free+0xa9/0x1e0 [ 895.402335][T21673] ? kasan_set_track+0x5d/0x70 [ 895.409234][T21673] ? __x64_sys_bpf+0x90/0x90 [ 895.414713][T21673] ? __kasan_slab_free+0x11/0x20 [ 895.420064][T21673] ? slab_free_freelist_hook+0xc0/0x190 [ 895.425697][T21673] ? kmem_cache_free+0xa9/0x1e0 [ 895.430377][T21673] ? putname+0xe7/0x140 [ 895.432222][T21672] syz.7.7142[21672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 895.434366][T21673] ? do_sys_openat2+0x1fc/0x710 [ 895.450363][T21673] ? __x64_sys_openat+0x243/0x290 [ 895.455733][T21673] ? do_syscall_64+0x34/0x70 [ 895.460175][T21673] ? _kstrtoull+0x3a0/0x4a0 [ 895.464486][T21673] ? kstrtouint_from_user+0x20a/0x2a0 [ 895.469698][T21673] ? kstrtol_from_user+0x310/0x310 [ 895.474634][T21673] ? memset+0x35/0x40 [ 895.478451][T21673] ? __fsnotify_parent+0x4b9/0x6c0 [ 895.483403][T21673] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 895.489997][T21673] ? proc_fail_nth_write+0x20b/0x290 [ 895.495392][T21673] ? proc_fail_nth_read+0x210/0x210 [ 895.500860][T21673] ? security_file_permission+0x86/0xb0 [ 895.506248][T21673] ? rw_verify_area+0x1c3/0x360 [ 895.510936][T21673] ? preempt_count_add+0x92/0x1a0 [ 895.515795][T21673] ? vfs_write+0x852/0xe70 [ 895.520074][T21673] ? kmem_cache_free+0x1c0/0x1e0 [ 895.524832][T21673] ? kernel_write+0x3d0/0x3d0 [ 895.529344][T21673] ? __kasan_check_write+0x14/0x20 [ 895.534288][T21673] ? mutex_lock+0xa5/0x110 [ 895.538538][T21673] ? mutex_trylock+0xa0/0xa0 [ 895.542963][T21673] ? __kasan_check_write+0x14/0x20 [ 895.547933][T21673] ? fput_many+0x160/0x1b0 [ 895.552365][T21673] ? debug_smp_processor_id+0x17/0x20 [ 895.557565][T21673] __x64_sys_bpf+0x7b/0x90 [ 895.561813][T21673] do_syscall_64+0x34/0x70 [ 895.566065][T21673] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 895.571793][T21673] RIP: 0033:0x7f96931c9819 [ 895.576047][T21673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 895.595702][T21673] RSP: 002b:00007f9691842038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 895.603913][T21673] RAX: ffffffffffffffda RBX: 00007f9693380fa0 RCX: 00007f96931c9819 [ 895.611714][T21673] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 0000000000000012 [ 895.619708][T21673] RBP: 00007f9691842090 R08: 0000000000000000 R09: 0000000000000000 [ 895.627511][T21673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 895.636239][T21673] R13: 0000000000000001 R14: 00007f9693380fa0 R15: 00007ffeaf8c0d48 [ 896.518120][T21693] device wg2 entered promiscuous mode [ 897.344952][T21725] syz.3.7159[21725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 897.345025][T21725] syz.3.7159[21725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 899.422180][ T304] device bridge_slave_1 left promiscuous mode [ 899.505659][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 899.519631][ T304] device bridge_slave_0 left promiscuous mode [ 899.526370][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 899.536042][ T304] device veth1_macvtap left promiscuous mode [ 899.550992][ T304] device veth0_vlan left promiscuous mode [ 900.076574][T21759] bridge0: port 1(bridge_slave_0) entered blocking state [ 900.248783][T21759] bridge0: port 1(bridge_slave_0) entered disabled state [ 900.341218][T21759] device bridge_slave_0 entered promiscuous mode [ 900.388254][T21759] bridge0: port 2(bridge_slave_1) entered blocking state [ 900.411132][T21759] bridge0: port 2(bridge_slave_1) entered disabled state [ 900.430311][T21759] device bridge_slave_1 entered promiscuous mode [ 901.200854][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 901.245742][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 901.341975][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 901.442639][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 901.529944][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 901.536851][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 901.555361][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 901.564176][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 901.584978][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 901.591947][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 901.603499][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 901.611593][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 901.627545][T21759] device veth0_vlan entered promiscuous mode [ 901.665439][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 901.748328][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 901.801594][T21803] syz.6.7187[21803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 901.801651][T21803] syz.6.7187[21803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 901.813795][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 901.832890][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 901.840140][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 901.919362][T21759] device veth1_macvtap entered promiscuous mode [ 901.957445][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 901.976363][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 902.055759][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 902.185835][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 902.271581][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 902.334894][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 902.350168][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 903.390453][T21857] FAULT_INJECTION: forcing a failure. [ 903.390453][T21857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 903.531348][T21857] CPU: 0 PID: 21857 Comm: syz.0.7205 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 903.542939][T21857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 903.552828][T21857] Call Trace: [ 903.555956][T21857] dump_stack_lvl+0x1e2/0x24b [ 903.560460][T21857] ? panic+0x812/0x812 [ 903.565166][T21857] ? bfq_pos_tree_add_move+0x43b/0x43b [ 903.570448][T21857] ? vsnprintf+0x1b96/0x1c70 [ 903.574963][T21857] dump_stack+0x15/0x17 [ 903.578953][T21857] should_fail+0x3c6/0x510 [ 903.583201][T21857] should_fail_usercopy+0x1a/0x20 [ 903.588056][T21857] _copy_to_user+0x20/0x90 [ 903.592316][T21857] bpf_verifier_vlog+0x1ab/0x330 [ 903.597086][T21857] __btf_verifier_log+0xd1/0x120 [ 903.601862][T21857] ? bpf_verifier_vlog+0x1b8/0x330 [ 903.606806][T21857] ? btf_check_sec_info+0x4f0/0x4f0 [ 903.611839][T21857] ? btf_parse_hdr+0x1d5/0x770 [ 903.616446][T21857] ? memcpy+0x56/0x70 [ 903.620266][T21857] btf_parse_hdr+0x342/0x770 [ 903.624698][T21857] btf_new_fd+0x487/0x9c0 [ 903.629009][T21857] __se_sys_bpf+0x1aed/0x11cb0 [ 903.633992][T21857] ? stack_trace_save+0x113/0x1c0 [ 903.639113][T21857] ? terminate_walk+0x407/0x4f0 [ 903.644067][T21857] ? stack_trace_snprint+0xf0/0xf0 [ 903.649098][T21857] ? kmem_cache_free+0xa9/0x1e0 [ 903.656089][T21857] ? kmem_cache_free+0xa9/0x1e0 [ 903.661024][T21857] ? kasan_set_track+0x5d/0x70 [ 903.665882][T21857] ? __x64_sys_bpf+0x90/0x90 [ 903.670406][T21857] ? memset+0x35/0x40 [ 903.674212][T21857] ? _kstrtoull+0x3a0/0x4a0 [ 903.678643][T21857] ? kstrtouint_from_user+0x20a/0x2a0 [ 903.683843][T21857] ? kstrtol_from_user+0x310/0x310 [ 903.688795][T21857] ? memset+0x35/0x40 [ 903.692629][T21857] ? __fsnotify_parent+0x4b9/0x6c0 [ 903.697573][T21857] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 903.704423][T21857] ? proc_fail_nth_write+0x20b/0x290 [ 903.709740][T21857] ? proc_fail_nth_read+0x210/0x210 [ 903.716020][T21857] ? security_file_permission+0x86/0xb0 [ 903.721558][T21857] ? rw_verify_area+0x1c3/0x360 [ 903.726496][T21857] ? preempt_count_add+0x92/0x1a0 [ 903.731446][T21857] ? vfs_write+0x852/0xe70 [ 903.735790][T21857] ? putname+0xe7/0x140 [ 903.739774][T21857] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 903.745417][T21857] ? kmem_cache_free+0x1c0/0x1e0 [ 903.750187][T21857] ? kernel_write+0x3d0/0x3d0 [ 903.754703][T21857] ? __kasan_check_write+0x14/0x20 [ 903.759652][T21857] ? dev_map_lookup_elem+0x68/0x100 [ 903.764684][T21857] ? bpf_trace_run2+0xf4/0x280 [ 903.769283][T21857] ? __bpf_trace_sys_enter+0x62/0x70 [ 903.774406][T21857] __x64_sys_bpf+0x7b/0x90 [ 903.779459][T21857] do_syscall_64+0x34/0x70 [ 903.784620][T21857] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 903.791121][T21857] RIP: 0033:0x7fb90302e819 [ 903.796074][T21857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 903.816464][T21857] RSP: 002b:00007fb9016a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 903.825249][T21857] RAX: ffffffffffffffda RBX: 00007fb9031e5fa0 RCX: 00007fb90302e819 [ 903.833033][T21857] RDX: 0000000000000028 RSI: 0000000020004680 RDI: 0000000000000012 [ 903.840843][T21857] RBP: 00007fb9016a7090 R08: 0000000000000000 R09: 0000000000000000 [ 903.848653][T21857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.856473][T21857] R13: 0000000000000001 R14: 00007fb9031e5fa0 R15: 00007ffd65045578 [ 905.496834][T21924] syz.0.7226[21924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 905.496892][T21924] syz.0.7226[21924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 907.309594][T21975] device syzkaller0 entered promiscuous mode [ 907.450952][ T319] syzkaller0: tun_net_xmit 48 [ 907.967087][T22030] device veth1_macvtap left promiscuous mode [ 908.070097][T22030] device macsec0 entered promiscuous mode [ 908.434681][T22052] device pim6reg1 entered promiscuous mode [ 908.567338][T22052] syz.8.7269[22052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 908.567394][T22052] syz.8.7269[22052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 908.860245][T22068] device syzkaller0 entered promiscuous mode [ 909.142457][T22089] device veth0_vlan left promiscuous mode [ 909.195917][T22089] device veth0_vlan entered promiscuous mode [ 909.564958][T22101] device veth0_vlan left promiscuous mode [ 909.839366][T22101] device veth0_vlan entered promiscuous mode [ 910.025637][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 910.045513][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 910.154144][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 910.264164][T22112] device pim6reg1 entered promiscuous mode [ 910.957368][T22144] device pim6reg1 entered promiscuous mode [ 911.298868][T22163] syz.7.7311[22163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 911.298930][T22163] syz.7.7311[22163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 914.067597][T22236] syz.7.7332[22236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 914.211530][T22236] syz.7.7332[22236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 914.254974][T22242] syz.0.7335[22242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 914.321595][T22244] syz.1.7336[22244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 914.401889][T22242] syz.0.7335[22242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 914.457815][T22244] syz.1.7336[22244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 916.408937][T22272] syz.8.7345[22272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 916.439749][T22272] syz.8.7345[22272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 917.637507][T22303] syz.0.7354[22303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 917.721307][T22303] syz.0.7354[22303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 919.224643][T22361] syz.1.7374[22361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 919.315995][T22361] syz.1.7374[22361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 919.798400][T22389] device macsec0 entered promiscuous mode [ 920.231433][T22407] FAULT_INJECTION: forcing a failure. [ 920.231433][T22407] name failslab, interval 1, probability 0, space 0, times 0 [ 920.244859][T22407] CPU: 0 PID: 22407 Comm: syz.1.7391 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 920.256812][T22407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 920.266850][T22407] Call Trace: [ 920.269926][T22407] dump_stack_lvl+0x1e2/0x24b [ 920.274431][T22407] ? panic+0x812/0x812 [ 920.278335][T22407] ? bfq_pos_tree_add_move+0x43b/0x43b [ 920.283633][T22407] ? kfree+0xc3/0x270 [ 920.287621][T22407] ? kfree+0xc3/0x270 [ 920.291558][T22407] dump_stack+0x15/0x17 [ 920.295544][T22407] should_fail+0x3c6/0x510 [ 920.300160][T22407] ? radix_tree_node_alloc+0x80/0x3c0 [ 920.305433][T22407] __should_failslab+0xa4/0xe0 [ 920.310002][T22407] should_failslab+0x9/0x20 [ 920.314293][T22407] kmem_cache_alloc+0x3d/0x2e0 [ 920.318999][T22407] radix_tree_node_alloc+0x80/0x3c0 [ 920.326315][T22407] idr_get_free+0x281/0x8e0 [ 920.330814][T22407] idr_alloc_cyclic+0x1dc/0x5d0 [ 920.335497][T22407] ? idr_alloc+0x2f0/0x2f0 [ 920.339923][T22407] ? __kasan_check_write+0x14/0x20 [ 920.345042][T22407] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 920.350624][T22407] ? debug_smp_processor_id+0x17/0x20 [ 920.355809][T22407] btf_new_fd+0x682/0x9c0 [ 920.360058][T22407] __se_sys_bpf+0x1aed/0x11cb0 [ 920.364657][T22407] ? __send_signal+0x8b5/0xb90 [ 920.369253][T22407] ? send_signal+0x4c1/0x5e0 [ 920.373685][T22407] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 920.379410][T22407] ? do_send_sig_info+0xfb/0x230 [ 920.384179][T22407] ? __x64_sys_bpf+0x90/0x90 [ 920.388604][T22407] ? group_send_sig_info+0x1b0/0x320 [ 920.393726][T22407] ? __x64_sys_openat+0x243/0x290 [ 920.398583][T22407] ? do_syscall_64+0x34/0x70 [ 920.403021][T22407] ? _kstrtoull+0x3a0/0x4a0 [ 920.407351][T22407] ? kstrtouint_from_user+0x20a/0x2a0 [ 920.412559][T22407] ? kstrtol_from_user+0x310/0x310 [ 920.418588][T22407] ? strncpy_from_kernel_nofault+0x169/0x1e0 [ 920.424481][T22407] ? memset+0x35/0x40 [ 920.428299][T22407] ? __fsnotify_parent+0x4b9/0x6c0 [ 920.433248][T22407] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 920.439669][T22407] ? proc_fail_nth_write+0x20b/0x290 [ 920.444790][T22407] ? proc_fail_nth_read+0x210/0x210 [ 920.449937][T22407] ? security_file_permission+0x86/0xb0 [ 920.456250][T22407] ? rw_verify_area+0x1c3/0x360 [ 920.461812][T22407] ? preempt_count_add+0x92/0x1a0 [ 920.466677][T22407] ? vfs_write+0x852/0xe70 [ 920.470916][T22407] ? putname+0xe7/0x140 [ 920.475257][T22407] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 920.481258][T22407] ? kmem_cache_free+0x1c0/0x1e0 [ 920.486037][T22407] ? kernel_write+0x3d0/0x3d0 [ 920.490568][T22407] ? __kasan_check_write+0x14/0x20 [ 920.495666][T22407] ? mutex_lock+0xa5/0x110 [ 920.500176][T22407] ? mutex_trylock+0xa0/0xa0 [ 920.504606][T22407] ? __kasan_check_write+0x14/0x20 [ 920.509552][T22407] ? fput_many+0x160/0x1b0 [ 920.513813][T22407] ? debug_smp_processor_id+0x17/0x20 [ 920.519014][T22407] __x64_sys_bpf+0x7b/0x90 [ 920.523267][T22407] do_syscall_64+0x34/0x70 [ 920.527516][T22407] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 920.533243][T22407] RIP: 0033:0x7f96931c9819 [ 920.537500][T22407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 920.557808][T22407] RSP: 002b:00007f9691842038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 920.566141][T22407] RAX: ffffffffffffffda RBX: 00007f9693380fa0 RCX: 00007f96931c9819 [ 920.574041][T22407] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 0000000000000012 [ 920.581849][T22407] RBP: 00007f9691842090 R08: 0000000000000000 R09: 0000000000000000 [ 920.590531][T22407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 920.598352][T22407] R13: 0000000000000000 R14: 00007f9693380fa0 R15: 00007ffeaf8c0d48 [ 920.656100][T22416] syz.1.7394[22416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 920.656148][T22416] syz.1.7394[22416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 921.464815][T22451] Â: renamed from pim6reg1 [ 922.209390][T22469] syz.0.7413[22469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 922.209446][T22469] syz.0.7413[22469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.639553][T22512] syz.1.7429[22512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.660780][T22512] syz.1.7429[22512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.782757][T22517] device syzkaller0 entered promiscuous mode [ 925.031108][T22581] syz.1.7456[22581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 925.031166][T22581] syz.1.7456[22581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 926.171956][T22627] FAULT_INJECTION: forcing a failure. [ 926.171956][T22627] name failslab, interval 1, probability 0, space 0, times 0 [ 926.211154][T22627] CPU: 1 PID: 22627 Comm: syz.6.7472 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 926.222414][T22627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 926.232263][T22627] Call Trace: [ 926.235395][T22627] dump_stack_lvl+0x1e2/0x24b [ 926.240005][T22627] ? bfq_pos_tree_add_move+0x43b/0x43b [ 926.245574][T22627] dump_stack+0x15/0x17 [ 926.250088][T22627] should_fail+0x3c6/0x510 [ 926.254351][T22627] ? kvmalloc_node+0x82/0x130 [ 926.254720][T22630] syz.0.7470[22630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 926.259030][T22627] __should_failslab+0xa4/0xe0 [ 926.259081][T22630] syz.0.7470[22630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 926.270356][T22627] should_failslab+0x9/0x20 [ 926.270368][T22627] __kmalloc+0x60/0x330 [ 926.270377][T22627] ? btf_check_all_metas+0x745/0x820 [ 926.270387][T22627] ? kvmalloc_node+0x82/0x130 [ 926.270395][T22627] kvmalloc_node+0x82/0x130 [ 926.270406][T22627] btf_parse_type_sec+0x1fa/0x16b0 [ 926.270423][T22627] ? __btf_verifier_log+0x120/0x120 [ 926.318451][T22627] ? sort+0x37/0x50 [ 926.322099][T22627] ? btf_verifier_log+0x2a0/0x2a0 [ 926.327375][T22627] ? btf_parse_hdr+0x1d5/0x770 [ 926.331976][T22627] ? btf_verifier_log_vsi+0x4d0/0x4d0 [ 926.337253][T22627] ? btf_parse_hdr+0x597/0x770 [ 926.342211][T22627] ? btf_parse_str_sec+0x1b0/0x270 [ 926.349511][T22627] btf_new_fd+0x53b/0x9c0 [ 926.353674][T22627] __se_sys_bpf+0x1aed/0x11cb0 [ 926.358277][T22627] ? __send_signal+0x8b5/0xb90 [ 926.362889][T22627] ? send_signal+0x4c1/0x5e0 [ 926.367305][T22627] ? kmem_cache_free+0xa9/0x1e0 [ 926.371997][T22627] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 926.377638][T22627] ? __x64_sys_bpf+0x90/0x90 [ 926.382585][T22627] ? _kstrtoull+0x3a0/0x4a0 [ 926.386928][T22627] ? kstrtouint_from_user+0x20a/0x2a0 [ 926.393765][T22627] ? kstrtol_from_user+0x310/0x310 [ 926.398686][T22627] ? bpf_send_signal_common+0x2d8/0x420 [ 926.404406][T22627] ? memset+0x35/0x40 [ 926.408219][T22627] ? __fsnotify_parent+0x4b9/0x6c0 [ 926.415661][T22627] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 926.422059][T22627] ? proc_fail_nth_write+0x20b/0x290 [ 926.427180][T22627] ? proc_fail_nth_read+0x210/0x210 [ 926.432212][T22627] ? security_file_permission+0x86/0xb0 [ 926.437593][T22627] ? rw_verify_area+0x1c3/0x360 [ 926.442283][T22627] ? preempt_count_add+0x92/0x1a0 [ 926.447138][T22627] ? vfs_write+0x852/0xe70 [ 926.451394][T22627] ? kmem_cache_free+0x1c0/0x1e0 [ 926.456165][T22627] ? kernel_write+0x3d0/0x3d0 [ 926.461116][T22627] ? __kasan_check_write+0x14/0x20 [ 926.466181][T22627] ? mutex_lock+0xa5/0x110 [ 926.470434][T22627] ? mutex_trylock+0xa0/0xa0 [ 926.474903][T22627] ? __kasan_check_write+0x14/0x20 [ 926.479801][T22627] ? fput_many+0x160/0x1b0 [ 926.484059][T22627] ? debug_smp_processor_id+0x17/0x20 [ 926.489269][T22627] __x64_sys_bpf+0x7b/0x90 [ 926.493971][T22627] do_syscall_64+0x34/0x70 [ 926.498214][T22627] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 926.503932][T22627] RIP: 0033:0x7f3f2abab819 [ 926.508183][T22627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 926.527838][T22627] RSP: 002b:00007f3f29224038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 926.536077][T22627] RAX: ffffffffffffffda RBX: 00007f3f2ad62fa0 RCX: 00007f3f2abab819 [ 926.543890][T22627] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 0000000000000012 [ 926.551969][T22627] RBP: 00007f3f29224090 R08: 0000000000000000 R09: 0000000000000000 [ 926.559777][T22627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 926.568276][T22627] R13: 0000000000000001 R14: 00007f3f2ad62fa0 R15: 00007ffe4e1f2448 [ 927.303470][T22653] syz.6.7482[22653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 927.303529][T22653] syz.6.7482[22653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 928.229956][T22689] syz.6.7495[22689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 928.458476][T22689] syz.6.7495[22689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 928.589140][T22694] FAULT_INJECTION: forcing a failure. [ 928.589140][T22694] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 928.892338][T22694] CPU: 1 PID: 22694 Comm: syz.0.7496 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 928.904582][T22694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 928.916662][T22694] Call Trace: [ 928.920436][T22694] dump_stack_lvl+0x1e2/0x24b [ 928.925120][T22694] ? panic+0x812/0x812 [ 928.929021][T22694] ? bfq_pos_tree_add_move+0x43b/0x43b [ 928.934505][T22694] ? vsnprintf+0x1b96/0x1c70 [ 928.938920][T22694] dump_stack+0x15/0x17 [ 928.943029][T22694] should_fail+0x3c6/0x510 [ 928.947285][T22694] should_fail_usercopy+0x1a/0x20 [ 928.952145][T22694] _copy_to_user+0x20/0x90 [ 928.956394][T22694] bpf_verifier_vlog+0x1ab/0x330 [ 928.961208][T22694] __btf_verifier_log+0xd1/0x120 [ 928.965947][T22694] ? bpf_verifier_vlog+0x1b8/0x330 [ 928.970891][T22694] ? btf_check_sec_info+0x4f0/0x4f0 [ 928.975924][T22694] ? btf_parse_hdr+0x1d5/0x770 [ 928.980524][T22694] ? memcpy+0x56/0x70 [ 928.984343][T22694] btf_parse_hdr+0x415/0x770 [ 928.988882][T22694] btf_new_fd+0x487/0x9c0 [ 928.993196][T22694] __se_sys_bpf+0x1aed/0x11cb0 [ 928.997802][T22694] ? __send_signal+0x8b5/0xb90 [ 929.002407][T22694] ? send_signal+0x4c1/0x5e0 [ 929.006876][T22694] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 929.012551][T22694] ? do_send_sig_info+0xfb/0x230 [ 929.017322][T22694] ? __x64_sys_bpf+0x90/0x90 [ 929.021748][T22694] ? group_send_sig_info+0x1b0/0x320 [ 929.026867][T22694] ? __x64_sys_openat+0x243/0x290 [ 929.031730][T22694] ? do_syscall_64+0x34/0x70 [ 929.036157][T22694] ? _kstrtoull+0x3a0/0x4a0 [ 929.040495][T22694] ? kstrtouint_from_user+0x20a/0x2a0 [ 929.045704][T22694] ? kstrtol_from_user+0x310/0x310 [ 929.050653][T22694] ? strncpy_from_kernel_nofault+0x169/0x1e0 [ 929.056468][T22694] ? memset+0x35/0x40 [ 929.060292][T22694] ? __fsnotify_parent+0x4b9/0x6c0 [ 929.065237][T22694] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 929.071655][T22694] ? proc_fail_nth_write+0x20b/0x290 [ 929.076930][T22694] ? proc_fail_nth_read+0x210/0x210 [ 929.083041][T22694] ? security_file_permission+0x86/0xb0 [ 929.088432][T22694] ? rw_verify_area+0x1c3/0x360 [ 929.093093][T22694] ? preempt_count_add+0x92/0x1a0 [ 929.097997][T22694] ? vfs_write+0x852/0xe70 [ 929.102206][T22694] ? putname+0xe7/0x140 [ 929.106202][T22694] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 929.111844][T22694] ? kmem_cache_free+0x1c0/0x1e0 [ 929.116623][T22694] ? kernel_write+0x3d0/0x3d0 [ 929.121130][T22694] ? __kasan_check_write+0x14/0x20 [ 929.126072][T22694] ? mutex_lock+0xa5/0x110 [ 929.130518][T22694] ? mutex_trylock+0xa0/0xa0 [ 929.136845][T22694] ? __kasan_check_write+0x14/0x20 [ 929.141776][T22694] ? fput_many+0x160/0x1b0 [ 929.148392][T22694] ? debug_smp_processor_id+0x17/0x20 [ 929.153595][T22694] __x64_sys_bpf+0x7b/0x90 [ 929.157960][T22694] do_syscall_64+0x34/0x70 [ 929.162185][T22694] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 929.167911][T22694] RIP: 0033:0x7fb90302e819 [ 929.172160][T22694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 929.191597][T22694] RSP: 002b:00007fb9016a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 929.199841][T22694] RAX: ffffffffffffffda RBX: 00007fb9031e5fa0 RCX: 00007fb90302e819 [ 929.207654][T22694] RDX: 0000000000000028 RSI: 0000000020004680 RDI: 0000000000000012 [ 929.215551][T22694] RBP: 00007fb9016a7090 R08: 0000000000000000 R09: 0000000000000000 [ 929.223364][T22694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 929.231312][T22694] R13: 0000000000000001 R14: 00007fb9031e5fa0 R15: 00007ffd65045578 [ 929.931371][T22700] device veth0_vlan left promiscuous mode [ 930.220900][T22700] device veth0_vlan entered promiscuous mode [ 930.318995][T22728] syz.8.7509[22728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 930.319064][T22728] syz.8.7509[22728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 930.793890][T22754] FAULT_INJECTION: forcing a failure. [ 930.793890][T22754] name failslab, interval 1, probability 0, space 0, times 0 [ 931.033840][T22754] CPU: 0 PID: 22754 Comm: syz.8.7517 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 931.045026][T22754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 931.054915][T22754] Call Trace: [ 931.058056][T22754] dump_stack_lvl+0x1e2/0x24b [ 931.062561][T22754] ? bfq_pos_tree_add_move+0x43b/0x43b [ 931.067855][T22754] dump_stack+0x15/0x17 [ 931.071846][T22754] should_fail+0x3c6/0x510 [ 931.076103][T22754] ? security_file_alloc+0x29/0x120 [ 931.081135][T22754] __should_failslab+0xa4/0xe0 [ 931.085735][T22754] should_failslab+0x9/0x20 [ 931.090076][T22754] kmem_cache_alloc+0x3d/0x2e0 [ 931.094674][T22754] ? __alloc_file+0x29/0x330 [ 931.099104][T22754] security_file_alloc+0x29/0x120 [ 931.103960][T22754] __alloc_file+0xbf/0x330 [ 931.108214][T22754] alloc_empty_file+0x95/0x180 [ 931.112815][T22754] alloc_file+0x5a/0x4e0 [ 931.116896][T22754] alloc_file_pseudo+0x259/0x2f0 [ 931.121670][T22754] ? alloc_empty_file_noaccount+0x80/0x80 [ 931.127225][T22754] __anon_inode_getfd+0x2aa/0x430 [ 931.132087][T22754] ? anon_inode_getfd+0x40/0x40 [ 931.136770][T22754] ? __kasan_check_write+0x14/0x20 [ 931.141720][T22754] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 931.146578][T22754] anon_inode_getfd+0x33/0x40 [ 931.151094][T22754] btf_new_fd+0x754/0x9c0 [ 931.155259][T22754] __se_sys_bpf+0x1aed/0x11cb0 [ 931.159857][T22754] ? __send_signal+0x8b5/0xb90 [ 931.164457][T22754] ? send_signal+0x4c1/0x5e0 [ 931.168883][T22754] ? kmem_cache_free+0xa9/0x1e0 [ 931.173574][T22754] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 931.179213][T22754] ? __x64_sys_bpf+0x90/0x90 [ 931.183641][T22754] ? _kstrtoull+0x3a0/0x4a0 [ 931.187999][T22754] ? kstrtouint_from_user+0x20a/0x2a0 [ 931.193204][T22754] ? kstrtol_from_user+0x310/0x310 [ 931.198143][T22754] ? bpf_send_signal_common+0x2d8/0x420 [ 931.203516][T22754] ? memset+0x35/0x40 [ 931.207335][T22754] ? __fsnotify_parent+0x4b9/0x6c0 [ 931.212283][T22754] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 931.218703][T22754] ? proc_fail_nth_write+0x20b/0x290 [ 931.223838][T22754] ? proc_fail_nth_read+0x210/0x210 [ 931.228862][T22754] ? security_file_permission+0x86/0xb0 [ 931.234252][T22754] ? rw_verify_area+0x1c3/0x360 [ 931.238936][T22754] ? preempt_count_add+0x92/0x1a0 [ 931.244397][T22754] ? vfs_write+0x852/0xe70 [ 931.248658][T22754] ? kmem_cache_free+0x1c0/0x1e0 [ 931.253435][T22754] ? kernel_write+0x3d0/0x3d0 [ 931.257986][T22754] ? __kasan_check_write+0x14/0x20 [ 931.262890][T22754] ? mutex_lock+0xa5/0x110 [ 931.267140][T22754] ? mutex_trylock+0xa0/0xa0 [ 931.271568][T22754] ? __kasan_check_write+0x14/0x20 [ 931.276944][T22754] ? fput_many+0x160/0x1b0 [ 931.281200][T22754] ? debug_smp_processor_id+0x17/0x20 [ 931.286402][T22754] __x64_sys_bpf+0x7b/0x90 [ 931.290654][T22754] do_syscall_64+0x34/0x70 [ 931.294914][T22754] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 931.300633][T22754] RIP: 0033:0x7fa3fb54b819 [ 931.304889][T22754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 931.324614][T22754] RSP: 002b:00007fa3f9bc4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 931.332854][T22754] RAX: ffffffffffffffda RBX: 00007fa3fb702fa0 RCX: 00007fa3fb54b819 [ 931.340819][T22754] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 0000000000000012 [ 931.349462][T22754] RBP: 00007fa3f9bc4090 R08: 0000000000000000 R09: 0000000000000000 [ 931.357275][T22754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 931.365351][T22754] R13: 0000000000000000 R14: 00007fa3fb702fa0 R15: 00007ffcf910d298 [ 931.437398][T22765] FAULT_INJECTION: forcing a failure. [ 931.437398][T22765] name failslab, interval 1, probability 0, space 0, times 0 [ 931.644398][T22765] CPU: 1 PID: 22765 Comm: syz.0.7520 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 931.657130][T22765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 931.667817][T22765] Call Trace: [ 931.670951][T22765] dump_stack_lvl+0x1e2/0x24b [ 931.675434][T22765] ? bfq_pos_tree_add_move+0x43b/0x43b [ 931.680865][T22765] dump_stack+0x15/0x17 [ 931.684847][T22765] should_fail+0x3c6/0x510 [ 931.689095][T22765] ? kvmalloc_node+0x82/0x130 [ 931.693606][T22765] __should_failslab+0xa4/0xe0 [ 931.698201][T22765] should_failslab+0x9/0x20 [ 931.702542][T22765] __kmalloc+0x60/0x330 [ 931.706702][T22765] ? btf_check_all_metas+0x745/0x820 [ 931.711829][T22765] ? kvmalloc_node+0x82/0x130 [ 931.716426][T22765] kvmalloc_node+0x82/0x130 [ 931.720764][T22765] btf_parse_type_sec+0x21c/0x16b0 [ 931.725884][T22765] ? __btf_verifier_log+0x120/0x120 [ 931.730927][T22765] ? sort+0x37/0x50 [ 931.734570][T22765] ? btf_verifier_log+0x2a0/0x2a0 [ 931.739422][T22765] ? btf_parse_hdr+0x1d5/0x770 [ 931.744023][T22765] ? btf_verifier_log_vsi+0x4d0/0x4d0 [ 931.749230][T22765] ? btf_parse_hdr+0x597/0x770 [ 931.753831][T22765] ? btf_parse_str_sec+0x1b0/0x270 [ 931.758776][T22765] btf_new_fd+0x53b/0x9c0 [ 931.762946][T22765] __se_sys_bpf+0x1aed/0x11cb0 [ 931.767550][T22765] ? __send_signal+0x8b5/0xb90 [ 931.772149][T22765] ? send_signal+0x4c1/0x5e0 [ 931.776571][T22765] ? kmem_cache_free+0xa9/0x1e0 [ 931.781261][T22765] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 931.786901][T22765] ? __x64_sys_bpf+0x90/0x90 [ 931.791325][T22765] ? _kstrtoull+0x3a0/0x4a0 [ 931.795664][T22765] ? kstrtouint_from_user+0x20a/0x2a0 [ 931.800873][T22765] ? kstrtol_from_user+0x310/0x310 [ 931.805820][T22765] ? bpf_send_signal_common+0x2d8/0x420 [ 931.811202][T22765] ? memset+0x35/0x40 [ 931.815022][T22765] ? __fsnotify_parent+0x4b9/0x6c0 [ 931.820048][T22765] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 931.826483][T22765] ? proc_fail_nth_write+0x20b/0x290 [ 931.831601][T22765] ? proc_fail_nth_read+0x210/0x210 [ 931.837425][T22765] ? security_file_permission+0x86/0xb0 [ 931.842815][T22765] ? rw_verify_area+0x1c3/0x360 [ 931.847518][T22765] ? preempt_count_add+0x92/0x1a0 [ 931.852357][T22765] ? vfs_write+0x852/0xe70 [ 931.856608][T22765] ? kmem_cache_free+0x1c0/0x1e0 [ 931.861394][T22765] ? kernel_write+0x3d0/0x3d0 [ 931.865892][T22765] ? __kasan_check_write+0x14/0x20 [ 931.870842][T22765] ? mutex_lock+0xa5/0x110 [ 931.875093][T22765] ? mutex_trylock+0xa0/0xa0 [ 931.879702][T22765] ? __kasan_check_write+0x14/0x20 [ 931.885742][T22765] ? fput_many+0x160/0x1b0 [ 931.889961][T22765] ? debug_smp_processor_id+0x17/0x20 [ 931.895181][T22765] __x64_sys_bpf+0x7b/0x90 [ 931.899410][T22765] do_syscall_64+0x34/0x70 [ 931.903768][T22765] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 931.909680][T22765] RIP: 0033:0x7fb90302e819 [ 931.914008][T22765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 931.934754][T22765] RSP: 002b:00007fb9016a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 931.942985][T22765] RAX: ffffffffffffffda RBX: 00007fb9031e5fa0 RCX: 00007fb90302e819 [ 931.950802][T22765] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 0000000000000012 [ 931.958607][T22765] RBP: 00007fb9016a7090 R08: 0000000000000000 R09: 0000000000000000 [ 931.966418][T22765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 931.974230][T22765] R13: 0000000000000001 R14: 00007fb9031e5fa0 R15: 00007ffd65045578 [ 932.207642][T22786] syz.8.7527[22786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 932.207706][T22786] syz.8.7527[22786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 933.528146][T22819] device pim6reg1 entered promiscuous mode [ 935.131390][T22889] FAULT_INJECTION: forcing a failure. [ 935.131390][T22889] name failslab, interval 1, probability 0, space 0, times 0 [ 935.292638][T22889] CPU: 0 PID: 22889 Comm: syz.7.7569 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 935.305246][T22889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 935.315201][T22889] Call Trace: [ 935.318333][T22889] dump_stack_lvl+0x1e2/0x24b [ 935.323625][T22889] ? panic+0x812/0x812 [ 935.327526][T22889] ? bfq_pos_tree_add_move+0x43b/0x43b [ 935.332820][T22889] dump_stack+0x15/0x17 [ 935.336810][T22889] should_fail+0x3c6/0x510 [ 935.341065][T22889] ? __alloc_file+0x29/0x330 [ 935.345492][T22889] __should_failslab+0xa4/0xe0 [ 935.350093][T22889] should_failslab+0x9/0x20 [ 935.354433][T22889] kmem_cache_alloc+0x3d/0x2e0 [ 935.359029][T22889] ? _raw_spin_lock+0xa4/0x1b0 [ 935.363633][T22889] __alloc_file+0x29/0x330 [ 935.368184][T22889] ? alloc_empty_file+0x42/0x180 [ 935.372968][T22889] alloc_empty_file+0x95/0x180 [ 935.377568][T22889] alloc_file+0x5a/0x4e0 [ 935.381740][T22889] alloc_file_pseudo+0x259/0x2f0 [ 935.386619][T22889] ? alloc_empty_file_noaccount+0x80/0x80 [ 935.393389][T22889] __anon_inode_getfd+0x2aa/0x430 [ 935.400265][T22889] ? anon_inode_getfd+0x40/0x40 [ 935.404968][T22889] ? __kasan_check_write+0x14/0x20 [ 935.409982][T22889] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 935.416128][T22889] anon_inode_getfd+0x33/0x40 [ 935.420738][T22889] btf_new_fd+0x754/0x9c0 [ 935.424889][T22889] __se_sys_bpf+0x1aed/0x11cb0 [ 935.429487][T22889] ? __send_signal+0x8b5/0xb90 [ 935.434080][T22889] ? send_signal+0x4c1/0x5e0 [ 935.438510][T22889] ? kmem_cache_free+0xa9/0x1e0 [ 935.443188][T22889] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 935.448903][T22889] ? __x64_sys_bpf+0x90/0x90 [ 935.453357][T22889] ? _kstrtoull+0x3a0/0x4a0 [ 935.457806][T22889] ? kstrtouint_from_user+0x20a/0x2a0 [ 935.463544][T22889] ? kstrtol_from_user+0x310/0x310 [ 935.468762][T22889] ? bpf_send_signal_common+0x2d8/0x420 [ 935.474133][T22889] ? memset+0x35/0x40 [ 935.478022][T22889] ? __fsnotify_parent+0x4b9/0x6c0 [ 935.483003][T22889] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 935.489921][T22889] ? proc_fail_nth_write+0x20b/0x290 [ 935.495825][T22889] ? proc_fail_nth_read+0x210/0x210 [ 935.501001][T22889] ? security_file_permission+0x86/0xb0 [ 935.506381][T22889] ? rw_verify_area+0x1c3/0x360 [ 935.511073][T22889] ? preempt_count_add+0x92/0x1a0 [ 935.515930][T22889] ? vfs_write+0x852/0xe70 [ 935.520188][T22889] ? kmem_cache_free+0x1c0/0x1e0 [ 935.524955][T22889] ? kernel_write+0x3d0/0x3d0 [ 935.529468][T22889] ? __kasan_check_write+0x14/0x20 [ 935.534413][T22889] ? mutex_lock+0xa5/0x110 [ 935.538667][T22889] ? mutex_trylock+0xa0/0xa0 [ 935.543383][T22889] ? __kasan_check_write+0x14/0x20 [ 935.548504][T22889] ? fput_many+0x160/0x1b0 [ 935.552767][T22889] ? debug_smp_processor_id+0x17/0x20 [ 935.558229][T22889] __x64_sys_bpf+0x7b/0x90 [ 935.562489][T22889] do_syscall_64+0x34/0x70 [ 935.566730][T22889] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 935.572463][T22889] RIP: 0033:0x7f124683c819 [ 935.576713][T22889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 935.596150][T22889] RSP: 002b:00007f1244eb5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 935.604394][T22889] RAX: ffffffffffffffda RBX: 00007f12469f3fa0 RCX: 00007f124683c819 [ 935.612210][T22889] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 0000000000000012 [ 935.620015][T22889] RBP: 00007f1244eb5090 R08: 0000000000000000 R09: 0000000000000000 [ 935.627828][T22889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 935.635639][T22889] R13: 0000000000000000 R14: 00007f12469f3fa0 R15: 00007fff2e7237a8 [ 936.114615][T22915] device pim6reg1 entered promiscuous mode [ 936.288303][T22921] device pim6reg1 entered promiscuous mode [ 937.284728][T22945] device veth0_vlan left promiscuous mode [ 937.347517][T22945] device veth0_vlan entered promiscuous mode [ 937.580198][T22959] device pim6reg1 entered promiscuous mode [ 937.994174][T22977] device sit0 entered promiscuous mode [ 939.018780][T23000] device pim6reg1 entered promiscuous mode [ 939.060055][T23008] device syzkaller0 entered promiscuous mode [ 939.092195][ T54] syzkaller0: tun_net_xmit 48 [ 939.289365][T23022] syz.8.7618[23022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 939.289423][T23022] syz.8.7618[23022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 940.023779][T23046] syz.1.7625[23046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 940.035800][T23046] syz.1.7625[23046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 940.083306][T23048] FAULT_INJECTION: forcing a failure. [ 940.083306][T23048] name failslab, interval 1, probability 0, space 0, times 0 [ 940.190850][T23048] CPU: 0 PID: 23048 Comm: syz.7.7626 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 940.202495][T23048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 940.213088][T23048] Call Trace: [ 940.216302][T23048] dump_stack_lvl+0x1e2/0x24b [ 940.220811][T23048] ? bfq_pos_tree_add_move+0x43b/0x43b [ 940.226103][T23048] dump_stack+0x15/0x17 [ 940.230097][T23048] should_fail+0x3c6/0x510 [ 940.234349][T23048] ? security_file_alloc+0x29/0x120 [ 940.239384][T23048] __should_failslab+0xa4/0xe0 [ 940.243982][T23048] should_failslab+0x9/0x20 [ 940.248320][T23048] kmem_cache_alloc+0x3d/0x2e0 [ 940.253133][T23048] ? __alloc_file+0x29/0x330 [ 940.257825][T23048] security_file_alloc+0x29/0x120 [ 940.262785][T23048] __alloc_file+0xbf/0x330 [ 940.267025][T23048] alloc_empty_file+0x95/0x180 [ 940.272397][T23048] alloc_file+0x5a/0x4e0 [ 940.277004][T23048] alloc_file_pseudo+0x259/0x2f0 [ 940.282085][T23048] ? alloc_empty_file_noaccount+0x80/0x80 [ 940.287620][T23048] __anon_inode_getfd+0x2aa/0x430 [ 940.292837][T23048] ? anon_inode_getfd+0x40/0x40 [ 940.297523][T23048] ? __kasan_check_write+0x14/0x20 [ 940.303087][T23048] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 940.308511][T23048] anon_inode_getfd+0x33/0x40 [ 940.312995][T23048] btf_new_fd+0x754/0x9c0 [ 940.317166][T23048] __se_sys_bpf+0x1aed/0x11cb0 [ 940.324459][T23048] ? __send_signal+0x8b5/0xb90 [ 940.332001][T23048] ? send_signal+0x4c1/0x5e0 [ 940.336556][T23048] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 940.342236][T23048] ? do_send_sig_info+0xfb/0x230 [ 940.348370][T23048] ? __x64_sys_bpf+0x90/0x90 [ 940.352792][T23048] ? group_send_sig_info+0x1b0/0x320 [ 940.357982][T23048] ? __x64_sys_openat+0x243/0x290 [ 940.362852][T23048] ? do_syscall_64+0x34/0x70 [ 940.367272][T23048] ? _kstrtoull+0x3a0/0x4a0 [ 940.371605][T23048] ? kstrtouint_from_user+0x20a/0x2a0 [ 940.376816][T23048] ? kstrtol_from_user+0x310/0x310 [ 940.381764][T23048] ? bpf_do_trace_printk+0x270/0x270 [ 940.386883][T23048] ? memset+0x35/0x40 [ 940.390703][T23048] ? __fsnotify_parent+0x4b9/0x6c0 [ 940.395663][T23048] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 940.402157][T23048] ? proc_fail_nth_write+0x20b/0x290 [ 940.413654][T23048] ? proc_fail_nth_read+0x210/0x210 [ 940.419266][T23048] ? security_file_permission+0x86/0xb0 [ 940.424647][T23048] ? rw_verify_area+0x1c3/0x360 [ 940.429430][T23048] ? preempt_count_add+0x92/0x1a0 [ 940.434379][T23048] ? vfs_write+0x852/0xe70 [ 940.438630][T23048] ? putname+0xe7/0x140 [ 940.443236][T23048] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 940.449423][T23048] ? kmem_cache_free+0x1c0/0x1e0 [ 940.454262][T23048] ? kernel_write+0x3d0/0x3d0 [ 940.458952][T23048] ? __kasan_check_write+0x14/0x20 [ 940.463990][T23048] ? mutex_lock+0xa5/0x110 [ 940.468784][T23048] ? mutex_trylock+0xa0/0xa0 [ 940.473203][T23048] ? __kasan_check_write+0x14/0x20 [ 940.478164][T23048] ? fput_many+0x160/0x1b0 [ 940.482401][T23048] ? debug_smp_processor_id+0x17/0x20 [ 940.487611][T23048] __x64_sys_bpf+0x7b/0x90 [ 940.492040][T23048] do_syscall_64+0x34/0x70 [ 940.496293][T23048] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 940.502024][T23048] RIP: 0033:0x7f124683c819 [ 940.506447][T23048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 940.525884][T23048] RSP: 002b:00007f1244eb5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 940.534130][T23048] RAX: ffffffffffffffda RBX: 00007f12469f3fa0 RCX: 00007f124683c819 [ 940.542118][T23048] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 0000000000000012 [ 940.550014][T23048] RBP: 00007f1244eb5090 R08: 0000000000000000 R09: 0000000000000000 [ 940.558523][T23048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.566416][T23048] R13: 0000000000000000 R14: 00007f12469f3fa0 R15: 00007fff2e7237a8 [ 940.946683][T23086] syz.6.7641[23086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 940.946896][T23086] syz.6.7641[23086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 943.136058][T23202] FAULT_INJECTION: forcing a failure. [ 943.136058][T23202] name failslab, interval 1, probability 0, space 0, times 0 [ 943.164492][T23202] CPU: 1 PID: 23202 Comm: syz.7.7684 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 943.175680][T23202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 943.185834][T23202] Call Trace: [ 943.188967][T23202] dump_stack_lvl+0x1e2/0x24b [ 943.193475][T23202] ? panic+0x812/0x812 [ 943.197383][T23202] ? bfq_pos_tree_add_move+0x43b/0x43b [ 943.202677][T23202] dump_stack+0x15/0x17 [ 943.206666][T23202] should_fail+0x3c6/0x510 [ 943.210921][T23202] ? __se_sys_bpf+0x4beb/0x11cb0 [ 943.215834][T23202] __should_failslab+0xa4/0xe0 [ 943.220454][T23202] should_failslab+0x9/0x20 [ 943.224791][T23202] __kmalloc_track_caller+0x5f/0x320 [ 943.229901][T23202] memdup_user+0x25/0xb0 [ 943.233973][T23202] __se_sys_bpf+0x4beb/0x11cb0 [ 943.238574][T23202] ? __send_signal+0x8b5/0xb90 [ 943.243176][T23202] ? send_signal+0x4c1/0x5e0 [ 943.247604][T23202] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 943.253248][T23202] ? do_send_sig_info+0xfb/0x230 [ 943.258011][T23202] ? __x64_sys_bpf+0x90/0x90 [ 943.262956][T23202] ? group_send_sig_info+0x1b0/0x320 [ 943.268175][T23202] ? __x64_sys_openat+0x243/0x290 [ 943.273109][T23202] ? do_syscall_64+0x34/0x70 [ 943.277795][T23202] ? _kstrtoull+0x3a0/0x4a0 [ 943.282138][T23202] ? kstrtouint_from_user+0x20a/0x2a0 [ 943.287529][T23202] ? kstrtol_from_user+0x310/0x310 [ 943.292986][T23202] ? bpf_do_trace_printk+0x270/0x270 [ 943.298190][T23202] ? strncpy_from_kernel_nofault+0x169/0x1e0 [ 943.304010][T23202] ? memset+0x35/0x40 [ 943.307826][T23202] ? __fsnotify_parent+0x4b9/0x6c0 [ 943.312775][T23202] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 943.319194][T23202] ? proc_fail_nth_write+0x20b/0x290 [ 943.324319][T23202] ? proc_fail_nth_read+0x210/0x210 [ 943.329352][T23202] ? security_file_permission+0x86/0xb0 [ 943.334732][T23202] ? rw_verify_area+0x1c3/0x360 [ 943.339418][T23202] ? preempt_count_add+0x92/0x1a0 [ 943.344371][T23202] ? vfs_write+0x852/0xe70 [ 943.349070][T23202] ? putname+0xe7/0x140 [ 943.353048][T23202] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 943.358687][T23202] ? kmem_cache_free+0x1c0/0x1e0 [ 943.363461][T23202] ? kernel_write+0x3d0/0x3d0 [ 943.367973][T23202] ? __kasan_check_write+0x14/0x20 [ 943.373187][T23202] ? mutex_lock+0xa5/0x110 [ 943.377433][T23202] ? mutex_trylock+0xa0/0xa0 [ 943.381859][T23202] ? __kasan_check_write+0x14/0x20 [ 943.391692][T23202] ? fput_many+0x160/0x1b0 [ 943.398036][T23202] ? debug_smp_processor_id+0x17/0x20 [ 943.403493][T23202] __x64_sys_bpf+0x7b/0x90 [ 943.407912][T23202] do_syscall_64+0x34/0x70 [ 943.412173][T23202] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 943.417892][T23202] RIP: 0033:0x7f124683c819 [ 943.422318][T23202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 943.442057][T23202] RSP: 002b:00007f1244eb5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 943.450723][T23202] RAX: ffffffffffffffda RBX: 00007f12469f3fa0 RCX: 00007f124683c819 [ 943.458715][T23202] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000002 [ 943.466517][T23202] RBP: 00007f1244eb5090 R08: 0000000000000000 R09: 0000000000000000 [ 943.474330][T23202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 943.482141][T23202] R13: 0000000000000000 R14: 00007f12469f3fa0 R15: 00007fff2e7237a8 [ 943.969656][T23217] device syzkaller0 entered promiscuous mode [ 944.231718][T23239] device sit0 left promiscuous mode [ 946.342720][T23331] device syzkaller0 entered promiscuous mode [ 946.353649][T18326] syzkaller0: tun_net_xmit 48 [ 946.407280][T23342] FAULT_INJECTION: forcing a failure. [ 946.407280][T23342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 946.460831][T23342] CPU: 1 PID: 23342 Comm: syz.0.7740 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 946.472815][T23342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 946.482890][T23342] Call Trace: [ 946.486029][T23342] dump_stack_lvl+0x1e2/0x24b [ 946.490788][T23342] ? panic+0x812/0x812 [ 946.494783][T23342] ? bfq_pos_tree_add_move+0x43b/0x43b [ 946.500074][T23342] ? vsnprintf+0x1b96/0x1c70 [ 946.504693][T23342] dump_stack+0x15/0x17 [ 946.508671][T23342] should_fail+0x3c6/0x510 [ 946.512930][T23342] should_fail_usercopy+0x1a/0x20 [ 946.517794][T23342] _copy_to_user+0x20/0x90 [ 946.522043][T23342] bpf_verifier_vlog+0x1ab/0x330 [ 946.526945][T23342] __btf_verifier_log+0xd1/0x120 [ 946.531698][T23342] ? is_bpf_text_address+0x172/0x190 [ 946.536829][T23342] ? btf_check_sec_info+0x4f0/0x4f0 [ 946.541851][T23342] ? put_dec_trunc8+0x21b/0x360 [ 946.546536][T23342] __btf_verifier_log_type+0x3c0/0x670 [ 946.551834][T23342] ? pointer+0xc30/0xc30 [ 946.555912][T23342] ? btf_enum_check_meta+0x3a8/0x9f0 [ 946.561029][T23342] ? btf_int_show+0x2850/0x2850 [ 946.565716][T23342] ? memcpy+0x56/0x70 [ 946.569540][T23342] ? btf_sec_info_cmp+0x5e/0x110 [ 946.574316][T23342] btf_enum_check_meta+0x91f/0x9f0 [ 946.579259][T23342] btf_check_all_metas+0x22e/0x820 [ 946.584465][T23342] btf_parse_type_sec+0x14c/0x16b0 [ 946.589455][T23342] ? __btf_verifier_log+0x120/0x120 [ 946.594452][T23342] ? sort+0x37/0x50 [ 946.598108][T23342] ? btf_check_sec_info+0x371/0x4f0 [ 946.603651][T23342] ? btf_verifier_log+0x2a0/0x2a0 [ 946.608592][T23342] ? btf_parse_hdr+0x1d5/0x770 [ 946.613202][T23342] ? btf_verifier_log_vsi+0x4d0/0x4d0 [ 946.618402][T23342] ? btf_parse_hdr+0x597/0x770 [ 946.622999][T23342] ? btf_parse_str_sec+0x1b0/0x270 [ 946.627949][T23342] btf_new_fd+0x53b/0x9c0 [ 946.632650][T23342] __se_sys_bpf+0x1aed/0x11cb0 [ 946.637285][T23342] ? __send_signal+0x8b5/0xb90 [ 946.642108][T23342] ? send_signal+0x4c1/0x5e0 [ 946.646651][T23342] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 946.652362][T23342] ? do_send_sig_info+0xfb/0x230 [ 946.657331][T23342] ? __x64_sys_bpf+0x90/0x90 [ 946.661738][T23342] ? group_send_sig_info+0x1b0/0x320 [ 946.666942][T23342] ? __x64_sys_openat+0x243/0x290 [ 946.671822][T23342] ? do_syscall_64+0x34/0x70 [ 946.676227][T23342] ? _kstrtoull+0x3a0/0x4a0 [ 946.680567][T23342] ? kstrtouint_from_user+0x20a/0x2a0 [ 946.685770][T23342] ? kstrtol_from_user+0x310/0x310 [ 946.690720][T23342] ? strncpy_from_kernel_nofault+0x169/0x1e0 [ 946.696532][T23342] ? memset+0x35/0x40 [ 946.700356][T23342] ? __fsnotify_parent+0x4b9/0x6c0 [ 946.705301][T23342] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 946.711726][T23342] ? proc_fail_nth_write+0x20b/0x290 [ 946.716842][T23342] ? proc_fail_nth_read+0x210/0x210 [ 946.721996][T23342] ? security_file_permission+0x86/0xb0 [ 946.727461][T23342] ? rw_verify_area+0x1c3/0x360 [ 946.732149][T23342] ? preempt_count_add+0x92/0x1a0 [ 946.737008][T23342] ? vfs_write+0x852/0xe70 [ 946.741260][T23342] ? putname+0xe7/0x140 [ 946.745278][T23342] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 946.750909][T23342] ? kmem_cache_free+0x1c0/0x1e0 [ 946.755756][T23342] ? kernel_write+0x3d0/0x3d0 [ 946.760271][T23342] ? __kasan_check_write+0x14/0x20 [ 946.765220][T23342] ? mutex_lock+0xa5/0x110 [ 946.770439][T23342] ? mutex_trylock+0xa0/0xa0 [ 946.774868][T23342] ? __kasan_check_write+0x14/0x20 [ 946.779986][T23342] ? fput_many+0x160/0x1b0 [ 946.784962][T23342] ? debug_smp_processor_id+0x17/0x20 [ 946.790432][T23342] __x64_sys_bpf+0x7b/0x90 [ 946.794683][T23342] do_syscall_64+0x34/0x70 [ 946.798938][T23342] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 946.804663][T23342] RIP: 0033:0x7fb90302e819 [ 946.808919][T23342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 946.828358][T23342] RSP: 002b:00007fb9016a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 946.836606][T23342] RAX: ffffffffffffffda RBX: 00007fb9031e5fa0 RCX: 00007fb90302e819 [ 946.844501][T23342] RDX: 0000000000000028 RSI: 0000000020004680 RDI: 0000000000000012 [ 946.852314][T23342] RBP: 00007fb9016a7090 R08: 0000000000000000 R09: 0000000000000000 [ 946.860127][T23342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 946.868023][T23342] R13: 0000000000000001 R14: 00007fb9031e5fa0 R15: 00007ffd65045578 [ 947.534034][T23383] tap0: tun_chr_ioctl cmd 1074025692 [ 947.762221][T23399] FAULT_INJECTION: forcing a failure. [ 947.762221][T23399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 947.851868][T23399] CPU: 1 PID: 23399 Comm: syz.0.7761 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 947.863053][T23399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 947.872941][T23399] Call Trace: [ 947.876080][T23399] dump_stack_lvl+0x1e2/0x24b [ 947.880612][T23399] ? bfq_pos_tree_add_move+0x43b/0x43b [ 947.886710][T23399] dump_stack+0x15/0x17 [ 947.890864][T23399] should_fail+0x3c6/0x510 [ 947.895597][T23399] should_fail_usercopy+0x1a/0x20 [ 947.900623][T23399] _copy_to_user+0x20/0x90 [ 947.905462][T23399] simple_read_from_buffer+0xc7/0x150 [ 947.910795][T23399] proc_fail_nth_read+0x1a3/0x210 [ 947.915760][T23399] ? proc_fault_inject_write+0x390/0x390 [ 947.921330][T23399] ? security_file_permission+0x86/0xb0 [ 947.926798][T23399] ? rw_verify_area+0x1c3/0x360 [ 947.931479][T23399] ? proc_fault_inject_write+0x390/0x390 [ 947.937034][T23399] vfs_read+0x200/0xba0 [ 947.941027][T23399] ? kernel_read+0x70/0x70 [ 947.945276][T23399] ? __kasan_check_write+0x14/0x20 [ 947.950227][T23399] ? mutex_lock+0xa5/0x110 [ 947.954482][T23399] ? mutex_trylock+0xa0/0xa0 [ 947.959064][T23399] ? __fdget_pos+0x2e7/0x3a0 [ 947.963801][T23399] ? ksys_read+0x77/0x2c0 [ 947.967963][T23399] ksys_read+0x199/0x2c0 [ 947.972037][T23399] ? vfs_write+0xe70/0xe70 [ 947.976291][T23399] ? debug_smp_processor_id+0x17/0x20 [ 947.981670][T23399] __x64_sys_read+0x7b/0x90 [ 947.986007][T23399] do_syscall_64+0x34/0x70 [ 947.990265][T23399] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 947.995990][T23399] RIP: 0033:0x7fb90302d25c [ 948.000245][T23399] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 948.019683][T23399] RSP: 002b:00007fb9016a7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 948.028020][T23399] RAX: ffffffffffffffda RBX: 00007fb9031e5fa0 RCX: 00007fb90302d25c [ 948.035825][T23399] RDX: 000000000000000f RSI: 00007fb9016a70a0 RDI: 0000000000000005 [ 948.045359][T23399] RBP: 00007fb9016a7090 R08: 0000000000000000 R09: 0000000000000000 [ 948.053099][T23399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 948.061194][T23399] R13: 0000000000000000 R14: 00007fb9031e5fa0 R15: 00007ffd65045578 [ 949.985091][T23444] device veth1_macvtap left promiscuous mode [ 950.068078][T23444] device macsec0 left promiscuous mode [ 950.176919][T23445] device veth1_macvtap entered promiscuous mode [ 950.212812][T23445] device macsec0 entered promiscuous mode [ 950.946245][T23482] syz.1.7787[23482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 950.946303][T23482] syz.1.7787[23482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 953.128402][T23541] FAULT_INJECTION: forcing a failure. [ 953.128402][T23541] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.341182][T23541] CPU: 0 PID: 23541 Comm: syz.1.7806 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 953.353030][T23541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 953.363104][T23541] Call Trace: [ 953.366264][T23541] dump_stack_lvl+0x1e2/0x24b [ 953.370754][T23541] ? bfq_pos_tree_add_move+0x43b/0x43b [ 953.376066][T23541] dump_stack+0x15/0x17 [ 953.380030][T23541] should_fail+0x3c6/0x510 [ 953.384294][T23541] should_fail_usercopy+0x1a/0x20 [ 953.389142][T23541] _copy_from_user+0x20/0xd0 [ 953.393576][T23541] memdup_user+0x5e/0xb0 [ 953.397648][T23541] __se_sys_bpf+0x4beb/0x11cb0 [ 953.402253][T23541] ? __send_signal+0x8b5/0xb90 [ 953.408639][T23541] ? send_signal+0x4c1/0x5e0 [ 953.414660][T23541] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 953.420294][T23541] ? do_send_sig_info+0xfb/0x230 [ 953.425065][T23541] ? __x64_sys_bpf+0x90/0x90 [ 953.429487][T23541] ? group_send_sig_info+0x1b0/0x320 [ 953.434807][T23541] ? __x64_sys_openat+0x243/0x290 [ 953.439635][T23541] ? do_syscall_64+0x34/0x70 [ 953.444246][T23541] ? _kstrtoull+0x3a0/0x4a0 [ 953.448599][T23541] ? kstrtouint_from_user+0x20a/0x2a0 [ 953.453797][T23541] ? kstrtol_from_user+0x310/0x310 [ 953.458828][T23541] ? bpf_do_trace_printk+0x270/0x270 [ 953.464138][T23541] ? memset+0x35/0x40 [ 953.467944][T23541] ? __fsnotify_parent+0x4b9/0x6c0 [ 953.473037][T23541] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 953.480044][T23541] ? proc_fail_nth_write+0x20b/0x290 [ 953.485385][T23541] ? proc_fail_nth_read+0x210/0x210 [ 953.490506][T23541] ? security_file_permission+0x86/0xb0 [ 953.495888][T23541] ? rw_verify_area+0x1c3/0x360 [ 953.500569][T23541] ? preempt_count_add+0x92/0x1a0 [ 953.505431][T23541] ? vfs_write+0x852/0xe70 [ 953.509681][T23541] ? putname+0xe7/0x140 [ 953.513677][T23541] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 953.519318][T23541] ? kmem_cache_free+0x1c0/0x1e0 [ 953.524093][T23541] ? kernel_write+0x3d0/0x3d0 [ 953.529142][T23541] ? __kasan_check_write+0x14/0x20 [ 953.534084][T23541] ? mutex_lock+0xa5/0x110 [ 953.538331][T23541] ? mutex_trylock+0xa0/0xa0 [ 953.542757][T23541] ? __kasan_check_write+0x14/0x20 [ 953.547712][T23541] ? fput_many+0x160/0x1b0 [ 953.551960][T23541] ? debug_smp_processor_id+0x17/0x20 [ 953.557170][T23541] __x64_sys_bpf+0x7b/0x90 [ 953.561506][T23541] do_syscall_64+0x34/0x70 [ 953.566217][T23541] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 953.572185][T23541] RIP: 0033:0x7f96931c9819 [ 953.576442][T23541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 953.595974][T23541] RSP: 002b:00007f9691842038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 953.604211][T23541] RAX: ffffffffffffffda RBX: 00007f9693380fa0 RCX: 00007f96931c9819 [ 953.612022][T23541] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000002 [ 953.619832][T23541] RBP: 00007f9691842090 R08: 0000000000000000 R09: 0000000000000000 [ 953.627654][T23541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 953.635554][T23541] R13: 0000000000000000 R14: 00007f9693380fa0 R15: 00007ffeaf8c0d48 [ 954.187487][T23572] device macsec0 left promiscuous mode [ 956.144643][T23645] device sit0 entered promiscuous mode [ 959.226205][T23810] FAULT_INJECTION: forcing a failure. [ 959.226205][T23810] name failslab, interval 1, probability 0, space 0, times 0 [ 959.243897][T23810] CPU: 0 PID: 23810 Comm: syz.8.7905 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 959.255114][T23810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 959.265004][T23810] Call Trace: [ 959.268138][T23810] dump_stack_lvl+0x1e2/0x24b [ 959.272650][T23810] ? panic+0x812/0x812 [ 959.276553][T23810] ? bfq_pos_tree_add_move+0x43b/0x43b [ 959.282686][T23810] dump_stack+0x15/0x17 [ 959.286633][T23810] should_fail+0x3c6/0x510 [ 959.290988][T23810] ? __se_sys_bpf+0x75e6/0x11cb0 [ 959.295883][T23810] __should_failslab+0xa4/0xe0 [ 959.300432][T23810] should_failslab+0x9/0x20 [ 959.304763][T23810] __kmalloc+0x60/0x330 [ 959.309021][T23810] __se_sys_bpf+0x75e6/0x11cb0 [ 959.313622][T23810] ? __send_signal+0x8b5/0xb90 [ 959.318228][T23810] ? send_signal+0x4c1/0x5e0 [ 959.323104][T23810] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 959.328845][T23810] ? do_send_sig_info+0xfb/0x230 [ 959.334223][T23810] ? __x64_sys_bpf+0x90/0x90 [ 959.338657][T23810] ? group_send_sig_info+0x1b0/0x320 [ 959.343947][T23810] ? __x64_sys_openat+0x243/0x290 [ 959.349236][T23810] ? do_syscall_64+0x34/0x70 [ 959.354077][T23810] ? _kstrtoull+0x3a0/0x4a0 [ 959.358410][T23810] ? kstrtouint_from_user+0x20a/0x2a0 [ 959.363614][T23810] ? kstrtol_from_user+0x310/0x310 [ 959.368564][T23810] ? bpf_do_trace_printk+0x270/0x270 [ 959.373684][T23810] ? memset+0x35/0x40 [ 959.377503][T23810] ? __fsnotify_parent+0x4b9/0x6c0 [ 959.382452][T23810] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 959.388881][T23810] ? proc_fail_nth_write+0x20b/0x290 [ 959.393998][T23810] ? proc_fail_nth_read+0x210/0x210 [ 959.399029][T23810] ? security_file_permission+0x86/0xb0 [ 959.405299][T23810] ? rw_verify_area+0x1c3/0x360 [ 959.412719][T23810] ? preempt_count_add+0x92/0x1a0 [ 959.417717][T23810] ? vfs_write+0x852/0xe70 [ 959.421957][T23810] ? putname+0xe7/0x140 [ 959.426018][T23810] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 959.431659][T23810] ? kmem_cache_free+0x1c0/0x1e0 [ 959.436603][T23810] ? kernel_write+0x3d0/0x3d0 [ 959.441141][T23810] ? __kasan_check_write+0x14/0x20 [ 959.446276][T23810] ? mutex_lock+0xa5/0x110 [ 959.450612][T23810] ? mutex_trylock+0xa0/0xa0 [ 959.455274][T23810] ? __kasan_check_write+0x14/0x20 [ 959.460551][T23810] ? fput_many+0x160/0x1b0 [ 959.464800][T23810] ? debug_smp_processor_id+0x17/0x20 [ 959.470008][T23810] __x64_sys_bpf+0x7b/0x90 [ 959.474526][T23810] do_syscall_64+0x34/0x70 [ 959.478781][T23810] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 959.484502][T23810] RIP: 0033:0x7fa3fb54b819 [ 959.489636][T23810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 959.509064][T23810] RSP: 002b:00007fa3f9bc4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 959.517531][T23810] RAX: ffffffffffffffda RBX: 00007fa3fb702fa0 RCX: 00007fa3fb54b819 [ 959.525287][T23810] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000002 [ 959.533098][T23810] RBP: 00007fa3f9bc4090 R08: 0000000000000000 R09: 0000000000000000 [ 959.540910][T23810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 959.548722][T23810] R13: 0000000000000000 R14: 00007fa3fb702fa0 R15: 00007ffcf910d298 [ 959.621539][T23828] FAULT_INJECTION: forcing a failure. [ 959.621539][T23828] name failslab, interval 1, probability 0, space 0, times 0 [ 959.639340][T23828] CPU: 0 PID: 23828 Comm: syz.1.7912 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 959.651389][T23828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 959.661698][T23828] Call Trace: [ 959.664955][T23828] dump_stack_lvl+0x1e2/0x24b [ 959.670519][T23828] ? bfq_pos_tree_add_move+0x43b/0x43b [ 959.676161][T23828] ? selinux_capable+0x2f1/0x430 [ 959.680986][T23828] dump_stack+0x15/0x17 [ 959.684966][T23828] should_fail+0x3c6/0x510 [ 959.689224][T23828] ? btf_new_fd+0x112/0x9c0 [ 959.693568][T23828] __should_failslab+0xa4/0xe0 [ 959.698163][T23828] should_failslab+0x9/0x20 [ 959.702499][T23828] kmem_cache_alloc_trace+0x3a/0x2e0 [ 959.707618][T23828] btf_new_fd+0x112/0x9c0 [ 959.711788][T23828] __se_sys_bpf+0x1aed/0x11cb0 [ 959.716388][T23828] ? __send_signal+0x8b5/0xb90 [ 959.722317][T23828] ? send_signal+0x4c1/0x5e0 [ 959.726739][T23828] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 959.732649][T23828] ? do_send_sig_info+0xfb/0x230 [ 959.737419][T23828] ? __x64_sys_bpf+0x90/0x90 [ 959.741979][T23828] ? group_send_sig_info+0x1b0/0x320 [ 959.747061][T23828] ? __x64_sys_openat+0x243/0x290 [ 959.751924][T23828] ? do_syscall_64+0x34/0x70 [ 959.756429][T23828] ? _kstrtoull+0x3a0/0x4a0 [ 959.760777][T23828] ? kstrtouint_from_user+0x20a/0x2a0 [ 959.765979][T23828] ? kstrtol_from_user+0x310/0x310 [ 959.771091][T23828] ? bpf_do_trace_printk+0x270/0x270 [ 959.776293][T23828] ? memset+0x35/0x40 [ 959.780290][T23828] ? __fsnotify_parent+0x4b9/0x6c0 [ 959.785248][T23828] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 959.792001][T23828] ? proc_fail_nth_write+0x20b/0x290 [ 959.797290][T23828] ? proc_fail_nth_read+0x210/0x210 [ 959.802329][T23828] ? security_file_permission+0x86/0xb0 [ 959.807706][T23828] ? rw_verify_area+0x1c3/0x360 [ 959.812397][T23828] ? preempt_count_add+0x92/0x1a0 [ 959.817253][T23828] ? vfs_write+0x852/0xe70 [ 959.821506][T23828] ? putname+0xe7/0x140 [ 959.825499][T23828] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 959.831143][T23828] ? kmem_cache_free+0x1c0/0x1e0 [ 959.835915][T23828] ? kernel_write+0x3d0/0x3d0 [ 959.840430][T23828] ? __kasan_check_write+0x14/0x20 [ 959.845519][T23828] ? mutex_lock+0xa5/0x110 [ 959.850203][T23828] ? mutex_trylock+0xa0/0xa0 [ 959.854619][T23828] ? __kasan_check_write+0x14/0x20 [ 959.859588][T23828] ? fput_many+0x160/0x1b0 [ 959.864198][T23828] ? debug_smp_processor_id+0x17/0x20 [ 959.869628][T23828] __x64_sys_bpf+0x7b/0x90 [ 959.873803][T23828] do_syscall_64+0x34/0x70 [ 959.878168][T23828] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 959.883871][T23828] RIP: 0033:0x7f96931c9819 [ 959.890096][T23828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 959.910918][T23828] RSP: 002b:00007f9691842038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 959.919763][T23828] RAX: ffffffffffffffda RBX: 00007f9693380fa0 RCX: 00007f96931c9819 [ 959.927672][T23828] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 0000000000000012 [ 959.935903][T23828] RBP: 00007f9691842090 R08: 0000000000000000 R09: 0000000000000000 [ 959.943810][T23828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 959.951610][T23828] R13: 0000000000000000 R14: 00007f9693380fa0 R15: 00007ffeaf8c0d48 [ 959.992128][T23835] FAULT_INJECTION: forcing a failure. [ 959.992128][T23835] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 960.005891][T23835] CPU: 0 PID: 23835 Comm: syz.7.7915 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 960.017054][T23835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 960.028046][T23835] Call Trace: [ 960.031744][T23835] dump_stack_lvl+0x1e2/0x24b [ 960.036731][T23835] ? bfq_pos_tree_add_move+0x43b/0x43b [ 960.042121][T23835] ? avc_has_perm+0x275/0x400 [ 960.046617][T23835] dump_stack+0x15/0x17 [ 960.050609][T23835] should_fail+0x3c6/0x510 [ 960.054865][T23835] should_fail_usercopy+0x1a/0x20 [ 960.060257][T23835] copy_page_from_iter+0x398/0x6e0 [ 960.065208][T23835] pipe_write+0x92b/0x18c0 [ 960.069468][T23835] ? pipe_read+0x1040/0x1040 [ 960.073962][T23835] ? fsnotify_perm+0x67/0x4e0 [ 960.078473][T23835] ? security_file_permission+0x7b/0xb0 [ 960.083872][T23835] ? security_file_permission+0x86/0xb0 [ 960.089233][T23835] ? iov_iter_init+0x3f/0x120 [ 960.093753][T23835] vfs_write+0xb4c/0xe70 [ 960.097913][T23835] ? putname+0xe7/0x140 [ 960.101911][T23835] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 960.107548][T23835] ? kernel_write+0x3d0/0x3d0 [ 960.112066][T23835] ? __fdget_pos+0x209/0x3a0 [ 960.116484][T23835] ? ksys_write+0x77/0x2c0 [ 960.120740][T23835] ksys_write+0x199/0x2c0 [ 960.124908][T23835] ? __ia32_sys_read+0x90/0x90 [ 960.129722][T23835] ? debug_smp_processor_id+0x17/0x20 [ 960.136966][T23835] __x64_sys_write+0x7b/0x90 [ 960.141378][T23835] do_syscall_64+0x34/0x70 [ 960.145644][T23835] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 960.151367][T23835] RIP: 0033:0x7f124683c819 [ 960.158587][T23835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 960.178127][T23835] RSP: 002b:00007f1244eb5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 960.186372][T23835] RAX: ffffffffffffffda RBX: 00007f12469f3fa0 RCX: 00007f124683c819 [ 960.194171][T23835] RDX: 000000000000fdef RSI: 0000000020000580 RDI: 0000000000000000 [ 960.202077][T23835] RBP: 00007f1244eb5090 R08: 0000000000000000 R09: 0000000000000000 [ 960.209888][T23835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 960.217693][T23835] R13: 0000000000000000 R14: 00007f12469f3fa0 R15: 00007fff2e7237a8 [ 960.527739][T23857] device syzkaller0 entered promiscuous mode