last executing test programs: 1m14.777227223s ago: executing program 4 (id=5607): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) mkdir(0x0, 0x100) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1000000}, {{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"/20, @ANYRES32=0x1, @ANYBLOB="00ff07000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 1m13.928915527s ago: executing program 4 (id=5616): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='cpu&\t\t') r2 = perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x2, 0x35, 0x1, 0x7, 0x0, 0x5, 0x800, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x0, 0x9}, 0x28, 0x8, 0x80, 0x9, 0x10, 0x7, 0x0, 0x0, 0x9, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x10, &(0x7f0000000040)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum]}, {0x0, [0x0, 0x0, 0x2e, 0x61]}}, &(0x7f0000000380)=""/187, 0x2a, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000880), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r7, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 1m11.413341309s ago: executing program 4 (id=5628): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x7ab046, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f00000003c0)=ANY=[], 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000400)='FROZEN\x00', 0x7) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0], 0x0, 0x1f, &(0x7f0000000600)=[{}, {}], 0x10, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x1d, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001900)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@restrict={0x6, 0x0, 0x0, 0xb, 0x3}]}, {0x0, [0x30, 0x30, 0x5f, 0x61, 0x5f, 0x5f]}}, &(0x7f0000000900)=""/4096, 0x2c, 0x1000, 0x0, 0xfa, 0x0, @void, @value}, 0x28) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4d, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b7b, 0x2, @perf_config_ext={0x7fff, 0xaea}, 0x110104, 0x32, 0x0, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14065, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7cdd}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) socketpair$unix(0x1, 0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63239747cb7f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 1m10.953225861s ago: executing program 4 (id=5632): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) mkdir(0x0, 0x100) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1000000}, {{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"/20, @ANYRES32=0x1, @ANYBLOB="00ff07000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 1m10.101878335s ago: executing program 4 (id=5636): perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x67, 0x1, 0x8, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x80000000000, 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8a, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='mm_page_alloc\x00', r0}, 0x54) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731128000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000850000009e00000095"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xad, &(0x7f00000003c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x8, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1m8.129056084s ago: executing program 4 (id=5643): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x7ab046, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f00000003c0)=ANY=[], 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_freezer_state(r1, &(0x7f0000000140), 0x2, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r2, &(0x7f0000000400)='FROZEN\x00', 0x7) 52.957057814s ago: executing program 32 (id=5643): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x7ab046, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f00000003c0)=ANY=[], 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_freezer_state(r1, &(0x7f0000000140), 0x2, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r2, &(0x7f0000000400)='FROZEN\x00', 0x7) 6.713749759s ago: executing program 5 (id=6022): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000040000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0xbb, 0x87, &(0x7f0000000340)="137bca3b76ef0462536e0a8db22132b76f93b32382d9ec04d11ef2f056ab553e92839833d2dc989db51629184f5f7b27a27d9c8d894c80cc7296e50fce49c9ce96404bb9cbcfe18003f54c89580f60351ddbadfa76e8a3a986af05d7cfbd610f3fac3670de55ca7f9efed513f8b54f1905d954d32d26f5c78dc1bb26eb11559bf17c81fb45371d9771ba8ad05fa0fd0ce112a20c5196832614f590a375b3f1b934079cf8c3428834a941195a2802f86b35c1ec3da1f276a6b96ec8", &(0x7f0000000640)=""/135, 0x4, 0x0, 0x9e, 0x6, &(0x7f0000000780)="dd885ec858a97c721671ca46c51dad32d45086e771150e2188869e7776b1d585741f82313e47b6955f25b0f824f68f65312566cb0ac35c3a2df4e049ca6353969c78e78e0e977a71f2bda6f7bbf836513b99e71c1361810686bb999bdedb17939164a783b9016475332b9b9a853094f8c23dc876a8461b0bb58ba1601eb19512b8c7fe3c9ca3e339104f71b1a47c715fc4aa6dd22d175927bcf28e5d0cff", &(0x7f0000000280)="b43539ae958b", 0x0, 0x0, 0x8}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8e9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 6.3030831s ago: executing program 5 (id=6025): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) mkdir(0x0, 0x100) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1000000}, {{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"/20, @ANYRES32=0x1, @ANYBLOB="00ff07000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 5.392944985s ago: executing program 5 (id=6031): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x5, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fffffff, 0x3, 0x0, 0x0, 0x0, 0xfff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000780)="5d7e70487eef7d97c5c0d33aa5e4afa1718549dc21ad35f5669b8c3bbcb8d165ea609c24b55a9df18cd76ac07b38d6bea580fb2f3af321870b49b23de85a72904057e00426b7ab", 0x0, 0x0, &(0x7f0000000a40)="f521f0f1b98b354395cff5141e8f8768e94b5524b021a4fb9391f25dae2040567d763c72a0c9db1e952065cb2f22db5fc6c23c66aaa49bc7461a7705be7c241b620b313cd3a43c6737f423adf6", 0xaf, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="010000000400000003000019f1bde6d672332424", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x80, 0x7, 0x80, 0x81, 0x0, 0xff, 0xd0010, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x6, 0x8}, 0x80240, 0x4, 0x4, 0x1, 0xfffffffffffffff0, 0xffff7fff, 0x5, 0x0, 0x4465, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x1e) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 4.922436977s ago: executing program 2 (id=6036): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000040000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0xbb, 0x87, &(0x7f0000000340)="137bca3b76ef0462536e0a8db22132b76f93b32382d9ec04d11ef2f056ab553e92839833d2dc989db51629184f5f7b27a27d9c8d894c80cc7296e50fce49c9ce96404bb9cbcfe18003f54c89580f60351ddbadfa76e8a3a986af05d7cfbd610f3fac3670de55ca7f9efed513f8b54f1905d954d32d26f5c78dc1bb26eb11559bf17c81fb45371d9771ba8ad05fa0fd0ce112a20c5196832614f590a375b3f1b934079cf8c3428834a941195a2802f86b35c1ec3da1f276a6b96ec8", &(0x7f0000000640)=""/135, 0x4, 0x0, 0x9e, 0x6, &(0x7f0000000780)="dd885ec858a97c721671ca46c51dad32d45086e771150e2188869e7776b1d585741f82313e47b6955f25b0f824f68f65312566cb0ac35c3a2df4e049ca6353969c78e78e0e977a71f2bda6f7bbf836513b99e71c1361810686bb999bdedb17939164a783b9016475332b9b9a853094f8c23dc876a8461b0bb58ba1601eb19512b8c7fe3c9ca3e339104f71b1a47c715fc4aa6dd22d175927bcf28e5d0cff", &(0x7f0000000280)="b43539ae958b", 0x0, 0x0, 0x8}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8e9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 4.798690178s ago: executing program 2 (id=6037): perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x67, 0x1, 0x8, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x80000000000, 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8a, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='mm_page_alloc\x00', r0}, 0x54) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731128000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000850000009e00000095"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xad, &(0x7f00000003c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x8, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 4.798319717s ago: executing program 3 (id=6038): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff4, 0x0, @perf_bp={0x0}, 0x4008, 0x1000, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb}, 0x300, 0x0, 0xfffffffd, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x8) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) close(r0) 4.677439638s ago: executing program 1 (id=6039): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000500), 0x8) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x22, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002020000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000a2ee00007b8af8ff00000000bfa200000000000007020000f803000008000000b7040000020000008500000082000000a566c0ff0000000085000000a10000008131fcff04000000850000004300000018000000650000000000000003000000957a0200000000009500000000000000182d000000000000", @ANYRES32, @ANYBLOB="0000000004000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r6}, 0x10) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32, @ANYRESHEX=r1], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) write$cgroup_type(r7, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x2, 0x3, 0xffff8001, 0x117, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0xf, @void, @value, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @random="000000000100"}) 4.655192208s ago: executing program 3 (id=6040): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b7020000ff0d2000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000006f6400000000000045040400010000001704000001000a00b7040000ff0100006a0a00fe0000000085000000bd000000b70000000000000095000000000000009e17f199a68b06d83298a8cdc21ce784909b849d5550ad857d0454d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4eeceb9971e43405d621ffbc9ce000000d8ca56b50d0c010d631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fbaa187b81d1106000000000fd60000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7e43c5cbd80450f859ce8122a79c3e40000b59b0fc46d6cec3c0802882add4e3179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3a32efa04137d4524847d2638da3261c8162bb7c7824be6195a66d2e17e122040e1100000000928612a29fc691e4f1f7bd053abb885f39381f1759410b1059f05684261f332d606834669b49ec99320ca7712d7e79bd5bf5ed818ecc7640917f6a559a47db608fcf9f6c131b84e41c354c66838f72b9e12d36e996f316f0812ca83efb30c7f6c6d57c4a64590401eec22523dd712c680013e87f649a1ede7142ca9d5d8a8c9f9b440fe4331ad5532c74d9a31a5d737537f7a2caa30581253d14dd3e92af7dc836686365ae01bdec561c0402b67801267a8df97d2f85426a5963d4fa3e26cc05972c162f223f000000d999e80de00fcbcc02d0aed7bb8f7ba337d59c14f39dcd4aad4139ef6425a9367f1bd1467fc6b95a4df7669839771ce9d5788029901e5a79d8b9990ace8f74087f25ad50c46088000000008000"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r0, 0x2000012, 0x0, 0x0, 0x0, 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='net_prio.prioidx\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r4, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], 0x0, 0xc5, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000006c0), &(0x7f0000000800), 0x8, 0xb8, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0xf, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000003c0)='syzkaller\x00', 0xc00, 0x1000, &(0x7f0000001340)=""/4096, 0x100, 0x7, '\x00', r5, 0x25, r4, 0x8, &(0x7f00000009c0)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000a80)=[r4, r4, r3, r4, r3, r6, r3], &(0x7f0000000ac0)=[{0x1, 0x2, 0x5, 0xa}, {0x3, 0x4, 0xf, 0xa}, {0x1, 0x5, 0x7, 0xb}], 0x10, 0xdceb, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x8, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4.438484869s ago: executing program 1 (id=6041): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b1", 0x7c}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000300)="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", 0xcb3}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}], 0x5, &(0x7f0000001000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}, @ip_ttl={{0x4, 0x0, 0x2, 0x1}}], 0x38}, 0x0) recvmsg$unix(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x181) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x369}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0xfeff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffef2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)=',.,/}#\\.!\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="180200000000000000000000000000008500000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x99, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x0, 0x1000000000000008}, 0x0, 0x8, 0xc5ed, 0x8, 0x7fffffff, 0x0, 0x4, 0x0, 0x9, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000007910a800000000005500ffff000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 4.24407289s ago: executing program 3 (id=6042): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) mkdir(0x0, 0x100) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1000000}, {{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"/20, @ANYRES32=0x1, @ANYBLOB="00ff07000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 4.004601861s ago: executing program 0 (id=6043): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280)={0x0, r0}, 0x8) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1700000000000000008400000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRESHEX], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x16) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r3, 0x58, &(0x7f0000000600)}, 0x10) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) 3.780571092s ago: executing program 0 (id=6044): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) (fail_nth: 1) 3.181533345s ago: executing program 1 (id=6045): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES32=r0, @ANYBLOB="9200a1b47a3703a6214b39fc7c00dfa821a9f8edc43d46df12f578290fcca6a33cfafa475690dd5598a5edb37aadbb158ea8d99f32853bcf9d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4e, 0x5, 0x0, 0x0, 0x0, 0xee, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x14090, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0xfffffffffffffefa, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES16=r2, @ANYBLOB="00000000000000000000000000000000000000000000000000000000f322c68ecb19f2510686a73a1b9fb52dbd1a8fa36ef9ef9eaaf70ee3a0e9faafd1fb2c625116c4f1ea479f1db4f7752596acfd016b856955e5d73df647de139778c9c76469b64ba8280399a9d0ca78ef288f95fe90a742"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r5}, 0x10) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r8}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40010) 3.172586435s ago: executing program 0 (id=6046): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) 3.171599955s ago: executing program 3 (id=6047): perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x67, 0x1, 0x8, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x80000000000, 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8a, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='mm_page_alloc\x00', r0}, 0x54) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731128000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000850000009e00000095"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xad, &(0x7f00000003c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x8, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 3.161177385s ago: executing program 1 (id=6048): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000000006000000000000000000000000551500", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000040000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0xbb, 0x87, &(0x7f0000000340)="137bca3b76ef0462536e0a8db22132b76f93b32382d9ec04d11ef2f056ab553e92839833d2dc989db51629184f5f7b27a27d9c8d894c80cc7296e50fce49c9ce96404bb9cbcfe18003f54c89580f60351ddbadfa76e8a3a986af05d7cfbd610f3fac3670de55ca7f9efed513f8b54f1905d954d32d26f5c78dc1bb26eb11559bf17c81fb45371d9771ba8ad05fa0fd0ce112a20c5196832614f590a375b3f1b934079cf8c3428834a941195a2802f86b35c1ec3da1f276a6b96ec8", &(0x7f0000000640)=""/135, 0x4, 0x0, 0x9e, 0x6, &(0x7f0000000780)="dd885ec858a97c721671ca46c51dad32d45086e771150e2188869e7776b1d585741f82313e47b6955f25b0f824f68f65312566cb0ac35c3a2df4e049ca6353969c78e78e0e977a71f2bda6f7bbf836513b99e71c1361810686bb999bdedb17939164a783b9016475332b9b9a853094f8c23dc876a8461b0bb58ba1601eb19512b8c7fe3c9ca3e339104f71b1a47c715fc4aa6dd22d175927bcf28e5d0cff", &(0x7f0000000280)="b43539ae958b", 0x0, 0x0, 0x8}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8e9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 3.160352245s ago: executing program 2 (id=6049): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB='+pids -rdea +memo'], 0x14) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r7, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) sendmsg$inet(r6, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018030000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000030000008500000053000000bf0900000000000055090100000000009500000000000000b702000000000000632a", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000015000000760000e4be98000000"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x402, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x12, 0x8001}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80002}, 0x0, 0x9, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546000677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77674e802a0d42bc6099ad238af770b5ed8925161729298700000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809b5b9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed3957f813567f7a95435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac559eaf39027ceb379a902d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff7a1ef3282830689da6b53b263339863297771429d120000003341bf4abacac94500fca0493cf29b33dcc9ffffffffffffffd39f6ce0c6ff01589646efd1cf870cd7bb2366fdf870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1293b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd000c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301fb997316dbf17866fb84d4173731efe895ff2e1c55ef08235a0126e01254c44060926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a861887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7ad333545794f37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea139376f24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff070000001e48418046c216c1f895778cb25122a2a998de0842a486721737390cbf3a74cb2003016f1514216bdf57d2a40dddb51ab63e96ec84ac3571f02f647b3385b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df986741517abf11389b751f4e109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da230ed05a8fe64680b0a3f9f2dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b9100000000a55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa18854693ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab848753203b458b97ec1afb079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7db3c4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378ac2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6ca0400966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030108000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bffef97dcecc467ace456597685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c1e2af68c6f5054b078acd74b4a9c944e4505da485a3a4154387a0a88370d9ed9467b09c5888a06431df3f68abf0b366c4d5f8bea7b29c257ed756dff7a21c6b661cbdd43de65afd7f661d5c84f915c90e3d6ea012b68b787eb01d8320000000000000060176dacba0ec503a37fae6b472ec369c79ee6a420c0fd8d8d82fe136d5af6c30bfeb0a7275babfdb96a127aa9386e0671c6454245a18c1c8c49552cff5d27b547cdc34c0858c77a47a9ff86ee9fbd9ceda428716a4218821176d8067997527230fa67d26950d3e4f2750fa7c872874ad3a2d11f9f6eb08e6d7b6fa257b04d8ce36360f524e3dfd2211641f3d2637d86b80681eca50ce0eecafdd22d41fa515c15591e70ded4b70efac3cb42fb352d82e8f7573e8ed8248da356fa91a252976d3a4d8c1843a8d5bb7f5f1028453a0562a3ea93117076dd4940b7df50d78289fe66197525f6095f8662d232970bef61b03fa83027963a1a2e07cfee30c0d0b4c5877f93b3637ca21eab5afcf5d4638dfe8f9202aaad51c979049dd76d65368cbd4187d9f74257c7c4a23ac4a34eec5aa17e78c5167216f5e72138d20f8325dd5f8f96c32189c904eaef580987f1ce601a7cdc35461db9981ac42f9e24b0699bbe4e3d986e38952b0b7938eefd9e7a292bbb66367ad77045fdc18855c81c031dedd185c723238373fc698d676791d04f1ff5f0825a6619e844882f31ed190233d58ecee949e310bf2b1a51b8a33ae65a06d2b6ad386bf8dc49dd328bcd75d1843a13d68560175a18af7efc3c0f20e32f84f6aaaf000000000000000000000013a6c66bce74a8fb9092023df695da2714a7933d699d42de2bc4a85e0a0e22228290a7a7553ab93a16e42553ed86869a02df2f47d4088fac1772d3cd955c81cbf91c2ca7942942f61723b558079b82547844f92df2499c4b2c2ef2539e5daa8d8727baaa6b5755e6f83bbfca000000000000000000000509619f5f0cbc72eebc653946d3552236f0dfe485cfa71bd69f4ded6e131128c3875b785875addfcbd5931c12adbef75535e694f3a19f28f9f99fa32e8ff66e7b1ff674434fb63ba0e28aadccf77d387525c98e81476058c958eaccfa7d251d0671222dc9d06485f7f690d3d4227bd21bd7ff8338617705b7faec47c86789a488b43d0fedf1b0ee05d65c677ced1e8214b2f6cb74d7"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f00000004c0)=ANY=[], 0xfdef) 3.141666285s ago: executing program 0 (id=6050): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) sendmsg$inet(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = getpid() perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xc, 0x0, 0x6, 0x1, 0x0, 0x1, 0x22402, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xac, 0x4, @perf_bp={&(0x7f00000003c0), 0x2}, 0x820, 0x4, 0x8, 0x2, 0xc000, 0x406, 0x0, 0x0, 0xffff}, r4, 0x8, r1, 0x13) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x26, 0x800, 0x0, &(0x7f0000000040)={0x0, 0x0}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, 0x0) r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') ioctl$TUNSETNOCSUM(r6, 0xb703, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="120000000800000004000000b47c000000000000", @ANYRES32, @ANYBLOB="00000000000000d1b99d00000000ed0000f30000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0xa0001f98, 0xfe71, 0x1f00, &(0x7f0000000440)="85f17444c5a569f1e21b08c0f264", 0x0, 0xa70a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{}, 0x0, &(0x7f00000002c0)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.649905487s ago: executing program 1 (id=6052): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffff, 0xc, 0xc, 0x5, [@enum={0x3, 0x0, 0x0, 0xf, 0x4000000}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f0000002200)=""/4110, 0x29, 0x100e, 0x1, 0x0, 0x0, @void, @value}, 0x28) 2.498004348s ago: executing program 1 (id=6053): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0x630c0700, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r2}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r4, 0x0, 0x1400}, 0x18) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r5}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)={0x4, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r8}, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000080)=0x2) write$cgroup_subtree(r6, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2b, 'pids'}]}, 0xb) 2.408157858s ago: executing program 5 (id=6054): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000380)=']-}}%%\x00') r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r1, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3d) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000004000000410000007586b0060262fa", @ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02400000010000000000000000000000000000000000000011000000"], 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00), 0x741d00, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0100000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000100007e34200000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000800)={@cgroup=r0, 0x22, 0x1, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r9}, 0x18) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)=ANY=[@ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES8=r5, @ANYBLOB="0000000000000000000000009c4a73881e250000eb00000080000000000000000000"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r10, @ANYBLOB="0000000000000000b702000003000000850000008600"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xca38696a08092de4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r11}, 0x69) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0xa0001f98, 0xfe71, 0x1f00, &(0x7f0000000440)="85f17444c5a569f1e21b08c0f264", 0x0, 0xa70a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 2.356403958s ago: executing program 0 (id=6055): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280)={0x0, r0}, 0x8) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1700000000000000008400000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRESHEX], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x16) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r3, 0x58, &(0x7f0000000600)}, 0x10) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) 2.265017389s ago: executing program 2 (id=6056): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0xb1, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x65, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='pids.events\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x9, 0x101, 0xc83, 0x28, r0, 0x3, '\x00', r1, r2, 0x3, 0x1, 0x4, 0xc, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000640)={&(0x7f0000000480)="52fc3ea54c2292e235f185ee93c27bc3d6f9fd45d5ba7ab05564b7245df676f59e2459a79f6333b551948a89715c70cdd2fdd293466834d4d37f4b86b92e793cbad8ed706da1027eaea657caac5eefd7e844b3b0603da74dadd6f87bb613", &(0x7f0000000500)=""/123, &(0x7f0000000580)="9867a3fae894ce34000e86fd872985c62db798e5f42ecbef0187263b8fd18dea00b00079f003a4a883ab3b27a63a9f620db8d510fa6aa03b506dc45a09623b900cd43004ee841fa02a1cf46e31256a247d3f6e53aa11041999f3211f5505ca4e6eaa", &(0x7f0000000600)="853e63da", 0x5, r3, 0x4}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r2, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)=r2}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000780)={'veth0\x00', @remote}) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000009c0)=@o_path={&(0x7f0000000980)='./file0\x00', 0x0, 0x0, r4}, 0x18) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0xd, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xff}, [@exit, @generic={0x3, 0x2, 0x4, 0x8001, 0xe}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}]}, &(0x7f0000000840)='syzkaller\x00', 0x81, 0x99, &(0x7f0000000880)=""/153, 0x41000, 0x5b, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000940)={0x5, 0x3, 0x100, 0x7}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000a00)=[r0, r5, r3, r3, r6, r5, r3], &(0x7f0000000a40)=[{0x1, 0x4, 0x2, 0x8}, {0x0, 0x3, 0x5, 0x9}, {0x1, 0x1, 0x6, 0x3}, {0x3, 0x4, 0x7, 0x1}], 0x10, 0x7, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x86a57c44da6c1e9f, 0x4, 0x8, 0x828a, 0x2426, r3, 0x4bea, '\x00', 0x0, r2, 0x0, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d00)={&(0x7f0000000bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x7, [@restrict={0x3, 0x0, 0x0, 0xb, 0x2}, @restrict={0xe}, @var={0x6, 0x0, 0x0, 0xe, 0x3}, @func={0x8, 0x0, 0x0, 0xc, 0x3}, @float={0xa, 0x0, 0x0, 0x10, 0xc}, @union={0x9, 0x7, 0x0, 0x5, 0x1, 0x3, [{0xe, 0x0, 0x73}, {0xa, 0x0, 0xb2}, {0x6, 0x3, 0x6}, {0x9, 0x1, 0xffffffff}, {0x10, 0x1, 0xfffff3e2}, {0xa, 0x1, 0x800}, {0xb, 0x3, 0x81}]}, @union={0xe, 0x0, 0x0, 0x5, 0x1, 0x9}]}, {0x0, [0x2e, 0x30, 0x30, 0x30, 0x0]}}, &(0x7f0000000cc0)=""/16, 0xcb, 0x10, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000dc0)={{r5}, &(0x7f0000000d40), &(0x7f0000000d80)=r7}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002000)={&(0x7f0000000e00)="257eb53cdf11e7f68e4bea17cf516f1d7d933dacf5976a670dbc0e6fdc3c8e553662d43a029b9a17bd09ba386569", &(0x7f0000000e40)=""/233, &(0x7f0000000f40)="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", &(0x7f0000001f40)="ce4c20a43dd5627e7a32cef34209863aac36ae7fb40b85188cb6db82eeaa86587f08dd613872943178e300f2d9ce992567fa2ceeeb871b9230794a89956226c9e0d881d3030ff18037cf8a653cd236d90c459a7780bd460d855e811d52f7b5f277b6e5f11fcb05d63fb8381cb3f9ac0a6b94329a0bf73e4f9e0fa5fa67b3ea5539269beaaefd91801eaad59c0cd93752ff4ae810c0", 0x4, r3, 0x4}, 0x38) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002200)={r0, 0x58, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002340)={0x6, 0x8, &(0x7f0000002080)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x6}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}], &(0x7f00000020c0)='syzkaller\x00', 0x5, 0x76, &(0x7f0000002100)=""/118, 0x41100, 0x40, '\x00', r11, 0x25, r9, 0x8, &(0x7f0000002240)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002280)={0x3, 0x9, 0xd, 0xfb5}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000022c0)=[r3, r0, r8, r6, r3, r0], &(0x7f0000002300)=[{0x0, 0x5, 0xf, 0x1}, {0x2, 0x1, 0xa, 0x4}, {0x2, 0x4, 0x6, 0x7}, {0x0, 0x4, 0x2, 0x3}], 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002480)={{r6}, &(0x7f0000002400), &(0x7f0000002440)=r7}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000024c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000002500), 0x160f20c714e3f5c3, 0x0) close(r3) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@base={0x5, 0x3ff, 0xf986, 0x9, 0x42202, 0xffffffffffffffff, 0xb4, '\x00', 0x0, r2, 0x5, 0x1, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f00000025c0)={0x0, r12}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002dc0)={r2, 0xe0, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000002b00)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000002b40)=[0x0, 0x0, 0x0], &(0x7f0000002b80)=[0x0, 0x0], 0x0, 0xf, &(0x7f0000002bc0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000002c00), &(0x7f0000002c40), 0x8, 0x8e, 0x8, 0x8, &(0x7f0000002c80)}}, 0x10) sendmsg$inet(r10, &(0x7f0000002f40)={&(0x7f0000002600)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3}}, 0x10, &(0x7f0000002a80)=[{&(0x7f0000002640)="7b278fe4c85b44e892ea6ad5f787afdbd3068fcb81c089941d86994c5e09651f60e9dfc77f5e86d919b8c4661fcd99308010ebcf776cd0c89d305e387f01a9199729e9d519f57101eae83cb389065a397642e3bf66aca3a8cad6a5f5ce5b228a52c12949c7f4016e06b8a5806fd825e4e637a67c9c65a259847ce8c352b820a712068bc0eb5b088114461d72b5ea6242b04f436d1caf0b56ad3b0c728dc9a57b01a3f5637e62cd4fd2f60acc7adc24909bafec5ec592289b74d0d67450f11c99e2d3c09d3d7773496a01070993cfe7254419ddaac06cafe2744248bd4b6bebbeaa", 0xe1}, {&(0x7f0000002740)="a2eecdf78a316c796132a7d59b4ab5b876b1f1f732d9a960696261085a68b1740e823753f63e5b68eab2238c803b4fd7e897b2a0a64b8420f74486266a6ad773c2c37efb2ff3091934d50b7d3f3f7dbe36a891d386af5e39d66fa534ceadafe2fcc9ff5b4a203027f211dec003818b912fac4d35d0d531c6d1e4bbb6f3a5b6c911a8cade580674772df6547f1a5646327be835c0d44b84b91473a1b3aeabc050e68399173db69e9feaabd739a9cbdefc99464fc291cbc57a1c43cc5a9cd7ac2cb0b66a", 0xc3}, {&(0x7f0000002840)="41dbad5ee242b8ba08d88dba3386161bcf12d7efc344570445c9d7ca9d0caaef61e79335ccaba2ec6b0a98cb3fe2a31b163f658d240872d0e089aeeab083e670f19b116db78b9a55875d76cf0990f6a717d6cafb789e318d90e27a76d58bd3276a88a1df30fb7f8faaeae2", 0x6b}, {&(0x7f00000028c0)="c9bb6d82a3d4ecb69a6a840d811230e9d3e6d821e60b10bc6c8267e529f0de4ab263400d56635a93f3e03c64945bc33bd61836247a4c95bd87a3f801d1d526fe7b003d3ce6e9f259e7926654ed7494e0203baa294d81bf8fbc8371388a9a3de865f252d3809216b568f91ec69101c14e7898b2a386aea421c39a7b37bdb64c36479cef1ea093c56e6293a0f7f10a473aaacd7f4f80767d439d7f9612d8545e349b20600f36cfe93404e104cfcd8e29393fbb9c3eeafcd4a97cfd80e22e7a23228893b3b49fb4dcdeb22ead5665a14c5328c08ecc2ac8d0d458b63efc38b9405ebff3e27f64b6e8", 0xe7}, {&(0x7f00000029c0)="b905c0441edc86017492b3ee8b134e1eec5675a212495caa9cba7abd7912cf3f2ce76156b542e8d0c500518af930cf7815447931f4a42b1ca4238dd1c9ba219d450ad3f7e7697b1fdda23ffd38f5dda999b3168653f6158078a086db55f0253918078309281c3cd66828ee09767395366a4eeb9f143b2ba45ca16dd3a729f994f634fb09956cdb6e0b87a88c1056f4e6", 0x90}], 0x5, &(0x7f0000002e00)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@rr={0x7, 0x2b, 0x4a, [@empty, @loopback, @loopback, @loopback, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x2a}, @multicast2, @local, @loopback]}, @timestamp_addr={0x44, 0x1c, 0xd6, 0x1, 0xe, [{@rand_addr=0x64010102, 0x10001}, {@multicast1, 0xffffffff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}, @cipso={0x86, 0x3e, 0xffffffffffffffff, [{0x0, 0x10, "b563dd1fee3baa10f6236cac04e2"}, {0x0, 0x11, "ce8fde46f8a073386946c0f3ca34f7"}, {0x7, 0x12, "1894e8c32012afbd39bd912fef46691b"}, {0x1, 0x5, "585dff"}]}, @ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0xc, 0xe, 0x1, 0x3, [{@empty, 0x2}]}, @noop, @ssrr={0x89, 0xb, 0xb8, [@rand_addr=0x64010102, @local]}, @end]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @rand_addr=0x64010101, @broadcast}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xa9e6}}], 0x120}, 0x4004000) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002fc0)=@base={0x16, 0x8, 0x5, 0x3, 0x1040, r3, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) 2.218179829s ago: executing program 3 (id=6057): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b1", 0x7c}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000300)="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", 0xcb3}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}], 0x5, &(0x7f0000001000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}, @ip_ttl={{0x4, 0x0, 0x2, 0x1}}], 0x38}, 0x0) recvmsg$unix(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x181) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x369}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0xfeff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffef2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)=',.,/}#\\.!\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="180200000000000000000000000000008500000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x99, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x0, 0x1000000000000008}, 0x0, 0x8, 0xc5ed, 0x8, 0x7fffffff, 0x0, 0x4, 0x0, 0x9, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000007910a800000000005500ffff000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 2.216191379s ago: executing program 0 (id=6067): perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x67, 0x1, 0x8, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x80000000000, 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8a, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='mm_page_alloc\x00', r0}, 0x54) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731128000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000850000009e00000095"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xad, &(0x7f00000003c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x8, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2.14937028s ago: executing program 2 (id=6058): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xff90, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) 341.360968ms ago: executing program 2 (id=6059): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) mkdir(0x0, 0x100) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1000000}, {{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"/20, @ANYRES32=0x1, @ANYBLOB="00ff07000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 341.227328ms ago: executing program 5 (id=6060): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @random="000000000100"}) 272.840879ms ago: executing program 5 (id=6061): perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x67, 0x1, 0x8, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x80000000000, 0x6}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8a, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='mm_page_alloc\x00', r0}, 0x54) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731128000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000850000009e00000095"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xad, &(0x7f00000003c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x8, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 3 (id=6062): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="180200003f00ffff0000000000004000850000002c0000001800000004000000000000000700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x1400, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x4, 0x4, 0x6, 0x4, 0x0, 0x9ca, 0x24006, 0x7, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xe, 0x0, @perf_bp={&(0x7f0000000140)}, 0x100002, 0x7, 0x8, 0x5, 0xffff, 0xddb, 0xf, 0x0, 0x1, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) kernel console output (not intermixed with test programs): 9][T10781] device veth1_macvtap left promiscuous mode [ 478.115821][T10786] device veth1_macvtap entered promiscuous mode [ 478.144458][T10786] device macsec0 entered promiscuous mode [ 478.248940][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 480.901280][T10859] device macsec0 entered promiscuous mode [ 490.122088][T11076] device pim6reg1 entered promiscuous mode [ 490.193641][T11084] FAULT_INJECTION: forcing a failure. [ 490.193641][T11084] name failslab, interval 1, probability 0, space 0, times 0 [ 490.246192][T11084] CPU: 1 PID: 11084 Comm: syz.0.3549 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 490.255921][T11084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 490.265906][T11084] Call Trace: [ 490.269018][T11084] [ 490.271797][T11084] dump_stack_lvl+0x151/0x1b7 [ 490.276314][T11084] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 490.281610][T11084] dump_stack+0x15/0x1e [ 490.285598][T11084] should_fail_ex+0x3d0/0x520 [ 490.290113][T11084] ? skb_clone+0x1f8/0x380 [ 490.294361][T11084] __should_failslab+0xaf/0xf0 [ 490.298964][T11084] should_failslab+0x9/0x20 [ 490.303302][T11084] kmem_cache_alloc+0x3b/0x2c0 [ 490.307902][T11084] ? __kernel_text_address+0xd/0x40 [ 490.312938][T11084] skb_clone+0x1f8/0x380 [ 490.317022][T11084] bpf_clone_redirect+0xa5/0x3c0 [ 490.321801][T11084] bpf_prog_b36a1f39e2fdd4f4+0x56/0x5b [ 490.327085][T11084] ? module_enable_x+0x150/0x170 [ 490.331859][T11084] ? __stack_depot_save+0x36/0x480 [ 490.336812][T11084] ? kasan_set_track+0x60/0x70 [ 490.341406][T11084] ? kasan_set_track+0x4b/0x70 [ 490.346003][T11084] ? kasan_save_alloc_info+0x1f/0x30 [ 490.351125][T11084] ? __kasan_slab_alloc+0x6c/0x80 [ 490.355985][T11084] ? slab_post_alloc_hook+0x53/0x2c0 [ 490.361108][T11084] ? kmem_cache_alloc+0x175/0x2c0 [ 490.365965][T11084] ? build_skb+0x2c/0x220 [ 490.370133][T11084] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 490.375515][T11084] ? bpf_prog_test_run+0x3b0/0x630 [ 490.380461][T11084] ? __sys_bpf+0x59f/0x7f0 [ 490.384716][T11084] ? __x64_sys_bpf+0x7c/0x90 [ 490.389144][T11084] ? x64_sys_call+0x87f/0x9a0 [ 490.393655][T11084] ? do_syscall_64+0x3b/0xb0 [ 490.398083][T11084] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 490.403985][T11084] ? ktime_get+0x12f/0x160 [ 490.408239][T11084] bpf_test_run+0x4ab/0xa40 [ 490.412674][T11084] ? convert___skb_to_skb+0x670/0x670 [ 490.417869][T11084] ? eth_type_trans+0x342/0x710 [ 490.422558][T11084] ? eth_get_headlen+0x240/0x240 [ 490.427331][T11084] ? convert___skb_to_skb+0x44/0x670 [ 490.432451][T11084] ? build_skb+0xde/0x220 [ 490.436617][T11084] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 490.441831][T11084] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 490.447552][T11084] ? __kasan_check_write+0x14/0x20 [ 490.452499][T11084] ? fput+0x15b/0x1b0 [ 490.456316][T11084] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 490.462047][T11084] bpf_prog_test_run+0x3b0/0x630 [ 490.466822][T11084] ? bpf_prog_query+0x260/0x260 [ 490.471508][T11084] ? selinux_bpf+0xd2/0x100 [ 490.475849][T11084] ? security_bpf+0x82/0xb0 [ 490.480189][T11084] __sys_bpf+0x59f/0x7f0 [ 490.484273][T11084] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 490.489485][T11084] ? __ia32_sys_read+0x90/0x90 [ 490.494075][T11084] ? debug_smp_processor_id+0x17/0x20 [ 490.499284][T11084] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 490.505190][T11084] __x64_sys_bpf+0x7c/0x90 [ 490.509435][T11084] x64_sys_call+0x87f/0x9a0 [ 490.513787][T11084] do_syscall_64+0x3b/0xb0 [ 490.518030][T11084] ? clear_bhb_loop+0x55/0xb0 [ 490.522545][T11084] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 490.528283][T11084] RIP: 0033:0x7fc35117e719 [ 490.532524][T11084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 490.551976][T11084] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 490.560212][T11084] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 490.568025][T11084] RDX: 0000000000000050 RSI: 0000000020000640 RDI: 000000000000000a [ 490.575836][T11084] RBP: 00007fc351ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 490.583646][T11084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 490.592411][T11084] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 490.600232][T11084] [ 490.685789][T11095] device veth1_macvtap left promiscuous mode [ 490.756773][T11095] device macsec0 left promiscuous mode [ 490.981719][T11106] device veth1_macvtap entered promiscuous mode [ 491.081297][T11106] device macsec0 entered promiscuous mode [ 491.423992][T11124] device pim6reg1 entered promiscuous mode [ 493.026570][T11167] device veth1_macvtap left promiscuous mode [ 493.325590][T11167] device veth1_macvtap entered promiscuous mode [ 493.333068][T11167] device macsec0 entered promiscuous mode [ 493.348287][ T2174] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 494.585987][T11222] syzkaller0: mtu greater than device maximum [ 494.888670][T11232] device veth1_macvtap left promiscuous mode [ 494.894486][T11232] device macsec0 left promiscuous mode [ 495.257629][T11246] device veth1_macvtap entered promiscuous mode [ 495.345676][T11246] device macsec0 entered promiscuous mode [ 495.789384][T11265] FAULT_INJECTION: forcing a failure. [ 495.789384][T11265] name failslab, interval 1, probability 0, space 0, times 0 [ 495.886854][T11265] CPU: 0 PID: 11265 Comm: syz.0.3610 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 495.896578][T11265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 495.906474][T11265] Call Trace: [ 495.909594][T11265] [ 495.912373][T11265] dump_stack_lvl+0x151/0x1b7 [ 495.916890][T11265] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 495.922182][T11265] dump_stack+0x15/0x1e [ 495.926172][T11265] should_fail_ex+0x3d0/0x520 [ 495.930794][T11265] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 495.936347][T11265] __should_failslab+0xaf/0xf0 [ 495.940946][T11265] should_failslab+0x9/0x20 [ 495.945287][T11265] __kmem_cache_alloc_node+0x3d/0x250 [ 495.950494][T11265] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 495.956048][T11265] kmalloc_trace+0x2a/0xa0 [ 495.960304][T11265] selinux_sk_alloc_security+0x7d/0x1a0 [ 495.965685][T11265] security_sk_alloc+0x72/0xb0 [ 495.970373][T11265] sk_prot_alloc+0x114/0x330 [ 495.974802][T11265] sk_alloc+0x38/0x440 [ 495.978700][T11265] ? bpf_test_init+0x169/0x190 [ 495.983310][T11265] bpf_prog_test_run_skb+0x384/0x13a0 [ 495.988518][T11265] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 495.994238][T11265] ? __kasan_check_write+0x14/0x20 [ 495.999188][T11265] ? fput+0x15b/0x1b0 [ 496.003001][T11265] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 496.008730][T11265] bpf_prog_test_run+0x3b0/0x630 [ 496.013509][T11265] ? bpf_prog_query+0x260/0x260 [ 496.018193][T11265] ? selinux_bpf+0xd2/0x100 [ 496.022532][T11265] ? security_bpf+0x82/0xb0 [ 496.026876][T11265] __sys_bpf+0x59f/0x7f0 [ 496.030953][T11265] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 496.036162][T11265] ? __ia32_sys_read+0x90/0x90 [ 496.040870][T11265] ? debug_smp_processor_id+0x17/0x20 [ 496.046071][T11265] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 496.051977][T11265] __x64_sys_bpf+0x7c/0x90 [ 496.056227][T11265] x64_sys_call+0x87f/0x9a0 [ 496.060568][T11265] do_syscall_64+0x3b/0xb0 [ 496.064819][T11265] ? clear_bhb_loop+0x55/0xb0 [ 496.069333][T11265] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 496.075060][T11265] RIP: 0033:0x7fc35117e719 [ 496.079322][T11265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 496.098758][T11265] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 496.107001][T11265] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 496.114812][T11265] RDX: 000000000000001e RSI: 0000000020000080 RDI: 000000000000000a [ 496.122621][T11265] RBP: 00007fc351ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 496.130434][T11265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 496.138248][T11265] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 496.146066][T11265] [ 496.395376][T11278] device pim6reg1 entered promiscuous mode [ 497.128134][T11291] device veth1_macvtap left promiscuous mode [ 497.184804][T11291] device macsec0 left promiscuous mode [ 497.317239][T11302] device veth1_macvtap left promiscuous mode [ 497.356883][T11302] device macsec0 left promiscuous mode [ 497.525713][T11308] device veth1_macvtap entered promiscuous mode [ 497.536412][T11308] device macsec0 entered promiscuous mode [ 498.028998][ T28] audit: type=1400 audit(1731553161.978:155): avc: denied { create } for pid=11338 comm="syz.3.3635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 498.676771][T11358] device veth1_macvtap left promiscuous mode [ 498.734835][T11364] FAULT_INJECTION: forcing a failure. [ 498.734835][T11364] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 498.759737][T11358] device macsec0 left promiscuous mode [ 498.786224][T11364] CPU: 0 PID: 11364 Comm: syz.4.3642 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 498.795946][T11364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 498.805842][T11364] Call Trace: [ 498.808962][T11364] [ 498.811738][T11364] dump_stack_lvl+0x151/0x1b7 [ 498.816254][T11364] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 498.821550][T11364] ? kvmalloc_node+0x26c/0x640 [ 498.826150][T11364] dump_stack+0x15/0x1e [ 498.830141][T11364] should_fail_ex+0x3d0/0x520 [ 498.834655][T11364] should_fail+0xb/0x10 [ 498.838655][T11364] should_fail_usercopy+0x1a/0x20 [ 498.843507][T11364] _copy_from_user+0x1e/0xc0 [ 498.847936][T11364] btf_new_fd+0x31a/0x7c0 [ 498.852103][T11364] bpf_btf_load+0x6f/0x90 [ 498.856268][T11364] __sys_bpf+0x586/0x7f0 [ 498.860342][T11364] ? clockevents_program_event+0x22f/0x300 [ 498.865986][T11364] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 498.871209][T11364] ? __sched_clock_gtod_offset+0x100/0x100 [ 498.876832][T11364] ? debug_smp_processor_id+0x17/0x20 [ 498.882041][T11364] __x64_sys_bpf+0x7c/0x90 [ 498.886292][T11364] x64_sys_call+0x87f/0x9a0 [ 498.890630][T11364] do_syscall_64+0x3b/0xb0 [ 498.894884][T11364] ? clear_bhb_loop+0x55/0xb0 [ 498.899403][T11364] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 498.905127][T11364] RIP: 0033:0x7f09ea17e719 [ 498.909380][T11364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 498.928825][T11364] RSP: 002b:00007f09eaf96038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 498.937068][T11364] RAX: ffffffffffffffda RBX: 00007f09ea335f80 RCX: 00007f09ea17e719 [ 498.944876][T11364] RDX: 0000000000000028 RSI: 00000000200004c0 RDI: 0000000000000012 [ 498.952688][T11364] RBP: 00007f09eaf96090 R08: 0000000000000000 R09: 0000000000000000 [ 498.960498][T11364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 498.968310][T11364] R13: 0000000000000000 R14: 00007f09ea335f80 R15: 00007ffd277ea028 [ 498.976128][T11364] [ 499.181288][ T28] audit: type=1400 audit(1731553163.128:156): avc: denied { append } for pid=11368 comm="syz.1.3643" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 499.208856][T11358] device veth1_macvtap entered promiscuous mode [ 499.334887][T11358] device macsec0 entered promiscuous mode [ 502.155025][T11423] device wg2 left promiscuous mode [ 503.561865][T11466] device macsec0 left promiscuous mode [ 503.849624][T11469] device macsec0 entered promiscuous mode [ 505.685857][T11493] device veth1_macvtap left promiscuous mode [ 505.723759][T11493] device macsec0 left promiscuous mode [ 512.552648][T11609] device veth1_macvtap left promiscuous mode [ 514.373538][T11634] device macsec0 left promiscuous mode [ 514.847574][T11644] tun0: tun_chr_ioctl cmd 1074025677 [ 514.916037][T11644] tun0: linktype set to 778 [ 521.913222][T11781] syz.1.3772[11781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.913323][T11781] syz.1.3772[11781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.249939][T11781] syz.1.3772[11781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.344208][T11781] syz.1.3772[11781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 525.060060][T11889] syz.0.3809[11889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 525.134425][T11889] syz.0.3809[11889] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.219468][T11931] syz.1.3823[11931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.334691][T11931] syz.1.3823[11931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.307789][T11981] syz.3.3839[11981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.381047][T11981] syz.3.3839[11981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.958887][T11999] device veth0_vlan left promiscuous mode [ 529.071568][T11999] device veth0_vlan entered promiscuous mode [ 529.526491][ T2174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 529.550429][ T2174] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 529.561000][ T2174] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 531.408391][T12050] device sit0 entered promiscuous mode [ 532.207051][T12056] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 532.214852][T12056] device syzkaller0 entered promiscuous mode [ 532.231163][T12057] device macsec0 left promiscuous mode [ 538.381964][T12196] device sit0 entered promiscuous mode [ 541.142059][T12259] device sit0 entered promiscuous mode [ 542.810038][T12286] device syzkaller0 entered promiscuous mode [ 544.544222][T12334] device sit0 entered promiscuous mode [ 544.573345][T12339] FAULT_INJECTION: forcing a failure. [ 544.573345][T12339] name failslab, interval 1, probability 0, space 0, times 0 [ 544.949259][T12339] CPU: 0 PID: 12339 Comm: syz.2.3954 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 544.958983][T12339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 544.968880][T12339] Call Trace: [ 544.972001][T12339] [ 544.974778][T12339] dump_stack_lvl+0x151/0x1b7 [ 544.979291][T12339] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 544.984584][T12339] ? __kasan_check_write+0x14/0x20 [ 544.989533][T12339] dump_stack+0x15/0x1e [ 544.993522][T12339] should_fail_ex+0x3d0/0x520 [ 544.998037][T12339] ? kernfs_fop_write_iter+0x151/0x410 [ 545.003335][T12339] __should_failslab+0xaf/0xf0 [ 545.007933][T12339] should_failslab+0x9/0x20 [ 545.012278][T12339] __kmem_cache_alloc_node+0x3d/0x250 [ 545.017481][T12339] ? kernfs_fop_write_iter+0x151/0x410 [ 545.022777][T12339] __kmalloc+0xa3/0x1e0 [ 545.026766][T12339] kernfs_fop_write_iter+0x151/0x410 [ 545.031888][T12339] vfs_write+0xaf6/0xed0 [ 545.035966][T12339] ? __kasan_slab_free+0x11/0x20 [ 545.040745][T12339] ? file_end_write+0x1c0/0x1c0 [ 545.045428][T12339] ? mutex_lock+0xb1/0x1e0 [ 545.049761][T12339] ? bit_wait_io_timeout+0x120/0x120 [ 545.054806][T12339] ? __fdget_pos+0x2e2/0x390 [ 545.059227][T12339] ? ksys_write+0x77/0x2c0 [ 545.063483][T12339] ksys_write+0x199/0x2c0 [ 545.067646][T12339] ? __this_cpu_preempt_check+0x13/0x20 [ 545.073027][T12339] ? __ia32_sys_read+0x90/0x90 [ 545.077628][T12339] ? debug_smp_processor_id+0x17/0x20 [ 545.082833][T12339] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 545.088739][T12339] __x64_sys_write+0x7b/0x90 [ 545.093168][T12339] x64_sys_call+0x2f/0x9a0 [ 545.097415][T12339] do_syscall_64+0x3b/0xb0 [ 545.101668][T12339] ? clear_bhb_loop+0x55/0xb0 [ 545.106182][T12339] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 545.111907][T12339] RIP: 0033:0x7f8d4237e719 [ 545.116164][T12339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 545.135602][T12339] RSP: 002b:00007f8d430c4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 545.143847][T12339] RAX: ffffffffffffffda RBX: 00007f8d42536058 RCX: 00007f8d4237e719 [ 545.151658][T12339] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000c [ 545.159471][T12339] RBP: 00007f8d430c4090 R08: 0000000000000000 R09: 0000000000000000 [ 545.167286][T12339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 545.175095][T12339] R13: 0000000000000000 R14: 00007f8d42536058 R15: 00007ffd2fc76c88 [ 545.182913][T12339] [ 557.830539][T12594] FAULT_INJECTION: forcing a failure. [ 557.830539][T12594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 558.028028][T12594] CPU: 0 PID: 12594 Comm: syz.1.4042 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 558.037754][T12594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 558.047646][T12594] Call Trace: [ 558.050766][T12594] [ 558.053544][T12594] dump_stack_lvl+0x151/0x1b7 [ 558.058065][T12594] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 558.063354][T12594] dump_stack+0x15/0x1e [ 558.067348][T12594] should_fail_ex+0x3d0/0x520 [ 558.071863][T12594] should_fail+0xb/0x10 [ 558.075862][T12594] should_fail_usercopy+0x1a/0x20 [ 558.080711][T12594] _copy_from_user+0x1e/0xc0 [ 558.085140][T12594] get_user_ifreq+0xd5/0x230 [ 558.089567][T12594] sock_do_ioctl+0x1a7/0x450 [ 558.093991][T12594] ? has_cap_mac_admin+0x3c0/0x3c0 [ 558.098938][T12594] ? sock_show_fdinfo+0xa0/0xa0 [ 558.103630][T12594] ? selinux_file_ioctl+0x3cc/0x540 [ 558.108682][T12594] sock_ioctl+0x455/0x740 [ 558.112837][T12594] ? sock_poll+0x400/0x400 [ 558.117080][T12594] ? __fget_files+0x2cb/0x330 [ 558.121596][T12594] ? security_file_ioctl+0x84/0xb0 [ 558.126541][T12594] ? sock_poll+0x400/0x400 [ 558.130797][T12594] __se_sys_ioctl+0x114/0x190 [ 558.135307][T12594] __x64_sys_ioctl+0x7b/0x90 [ 558.139732][T12594] x64_sys_call+0x98/0x9a0 [ 558.143987][T12594] do_syscall_64+0x3b/0xb0 [ 558.148237][T12594] ? clear_bhb_loop+0x55/0xb0 [ 558.152755][T12594] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 558.158481][T12594] RIP: 0033:0x7fcec0f7e719 [ 558.162731][T12594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.182279][T12594] RSP: 002b:00007fcec1da3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 558.190524][T12594] RAX: ffffffffffffffda RBX: 00007fcec1135f80 RCX: 00007fcec0f7e719 [ 558.198342][T12594] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 558.206143][T12594] RBP: 00007fcec1da3090 R08: 0000000000000000 R09: 0000000000000000 [ 558.213958][T12594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.221771][T12594] R13: 0000000000000000 R14: 00007fcec1135f80 R15: 00007ffdc08a2038 [ 558.229587][T12594] [ 559.436070][T12629] device syzkaller0 entered promiscuous mode [ 559.559872][T12623] device veth0_vlan left promiscuous mode [ 559.587201][T12623] device veth0_vlan entered promiscuous mode [ 559.731871][ T2174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 559.776985][ T2174] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 559.879987][ T2174] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 563.430844][T12727] device pim6reg1 entered promiscuous mode [ 563.828907][T12737] device sit0 left promiscuous mode [ 563.920543][T12737] device sit0 entered promiscuous mode [ 565.108299][T12783] device pim6reg1 entered promiscuous mode [ 565.738708][T12793] device sit0 entered promiscuous mode [ 565.874731][T12801] FAULT_INJECTION: forcing a failure. [ 565.874731][T12801] name failslab, interval 1, probability 0, space 0, times 0 [ 565.947164][T12801] CPU: 1 PID: 12801 Comm: syz.3.4116 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 565.956884][T12801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 565.966783][T12801] Call Trace: [ 565.969902][T12801] [ 565.972683][T12801] dump_stack_lvl+0x151/0x1b7 [ 565.977194][T12801] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 565.982489][T12801] ? from_kuid+0x18d/0x6f0 [ 565.986744][T12801] ? make_kuid+0x700/0x700 [ 565.991080][T12801] dump_stack+0x15/0x1e [ 565.995073][T12801] should_fail_ex+0x3d0/0x520 [ 565.999588][T12801] ? mas_dup_build+0x340/0x17f0 [ 566.004273][T12801] __should_failslab+0xaf/0xf0 [ 566.008873][T12801] should_failslab+0x9/0x20 [ 566.013213][T12801] kmem_cache_alloc+0x3b/0x2c0 [ 566.017813][T12801] ? bpf_trace_run3+0x2e0/0x2e0 [ 566.022499][T12801] mas_dup_build+0x340/0x17f0 [ 566.027020][T12801] __mt_dup+0x240/0x300 [ 566.031004][T12801] ? mtree_erase+0x2c0/0x2c0 [ 566.035438][T12801] copy_mm+0x7b6/0x1bc0 [ 566.039431][T12801] ? kasan_save_alloc_info+0x1f/0x30 [ 566.044550][T12801] ? copy_signal+0x650/0x650 [ 566.048969][T12801] ? _raw_spin_lock+0xa4/0x1b0 [ 566.053574][T12801] ? __init_rwsem+0x130/0x240 [ 566.058087][T12801] ? copy_signal+0x503/0x650 [ 566.062514][T12801] copy_process+0x12b6/0x3530 [ 566.067027][T12801] ? __kasan_check_write+0x14/0x20 [ 566.071973][T12801] ? proc_fail_nth_write+0x20b/0x290 [ 566.077095][T12801] ? idle_dummy+0x10/0x10 [ 566.081262][T12801] ? vfs_write+0x952/0xed0 [ 566.085508][T12801] ? __kasan_slab_free+0x11/0x20 [ 566.090287][T12801] kernel_clone+0x229/0x890 [ 566.094628][T12801] ? __kasan_check_write+0x14/0x20 [ 566.099573][T12801] ? mutex_unlock+0xb2/0x260 [ 566.104005][T12801] ? create_io_thread+0x180/0x180 [ 566.108869][T12801] __x64_sys_clone+0x231/0x280 [ 566.113462][T12801] ? __do_sys_vfork+0x110/0x110 [ 566.118148][T12801] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 566.124047][T12801] ? exit_to_user_mode_prepare+0x39/0xa0 [ 566.129514][T12801] x64_sys_call+0x1b0/0x9a0 [ 566.133854][T12801] do_syscall_64+0x3b/0xb0 [ 566.138108][T12801] ? clear_bhb_loop+0x55/0xb0 [ 566.142624][T12801] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 566.148349][T12801] RIP: 0033:0x7f08fe17e719 [ 566.152605][T12801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.172055][T12801] RSP: 002b:00007f08fef6bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 566.180291][T12801] RAX: ffffffffffffffda RBX: 00007f08fe335f80 RCX: 00007f08fe17e719 [ 566.188103][T12801] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022023400 [ 566.195914][T12801] RBP: 00007f08fef6c090 R08: 0000000000000000 R09: 0000000000000000 [ 566.203722][T12801] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 566.211533][T12801] R13: 0000000000000000 R14: 00007f08fe335f80 R15: 00007ffe9f9e1038 [ 566.219440][T12801] [ 568.292727][T12851] device sit0 left promiscuous mode [ 568.655763][T12868] FAULT_INJECTION: forcing a failure. [ 568.655763][T12868] name failslab, interval 1, probability 0, space 0, times 0 [ 568.825257][T12868] CPU: 1 PID: 12868 Comm: syz.1.4137 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 568.834982][T12868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 568.844871][T12868] Call Trace: [ 568.847999][T12868] [ 568.848744][T12856] device sit0 entered promiscuous mode [ 568.850777][T12868] dump_stack_lvl+0x151/0x1b7 [ 568.850804][T12868] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 568.850825][T12868] dump_stack+0x15/0x1e [ 568.850841][T12868] should_fail_ex+0x3d0/0x520 [ 568.850863][T12868] ? getname_flags+0xba/0x520 [ 568.850878][T12868] __should_failslab+0xaf/0xf0 [ 568.850895][T12868] should_failslab+0x9/0x20 [ 568.850914][T12868] kmem_cache_alloc+0x3b/0x2c0 [ 568.850932][T12868] getname_flags+0xba/0x520 [ 568.850948][T12868] getname+0x19/0x20 [ 568.850962][T12868] do_sys_openat2+0xe0/0x870 [ 568.850983][T12868] ? do_sys_open+0x220/0x220 [ 568.851002][T12868] ? kvm_sched_clock_read+0x18/0x40 [ 568.851019][T12868] ? sched_clock+0x9/0x10 [ 568.851039][T12868] ? sched_clock_cpu+0x71/0x2b0 [ 568.851057][T12868] __x64_sys_openat+0x243/0x290 [ 568.851077][T12868] ? __ia32_sys_open+0x270/0x270 [ 568.851097][T12868] ? debug_smp_processor_id+0x17/0x20 [ 568.851115][T12868] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 568.851135][T12868] x64_sys_call+0x6bf/0x9a0 [ 568.851152][T12868] do_syscall_64+0x3b/0xb0 [ 568.851168][T12868] ? clear_bhb_loop+0x55/0xb0 [ 568.851187][T12868] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 568.851205][T12868] RIP: 0033:0x7fcec0f7d0b0 [ 568.851220][T12868] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 19 8f 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 6c 8f 02 00 8b 44 [ 568.851234][T12868] RSP: 002b:00007fcec1da2f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 568.851253][T12868] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcec0f7d0b0 [ 568.851266][T12868] RDX: 0000000000000000 RSI: 00007fcec1da2fa0 RDI: 00000000ffffff9c [ 568.851277][T12868] RBP: 00007fcec1da2fa0 R08: 0000000000000000 R09: 0000000000000000 [ 568.851287][T12868] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 568.851298][T12868] R13: 0000000000000000 R14: 00007fcec1135f80 R15: 00007ffdc08a2038 [ 568.851314][T12868] [ 584.467660][T13201] device pim6reg1 entered promiscuous mode [ 585.810066][T13241] bridge0: port 3(dummy0) entered blocking state [ 585.846460][T13241] bridge0: port 3(dummy0) entered disabled state [ 585.854334][T13241] device dummy0 entered promiscuous mode [ 585.896996][T13241] bridge0: port 3(dummy0) entered blocking state [ 585.903340][T13241] bridge0: port 3(dummy0) entered forwarding state [ 586.164937][T13246] device dummy0 left promiscuous mode [ 586.170323][T13246] bridge0: port 3(dummy0) entered disabled state [ 590.196472][T13357] device pim6reg1 entered promiscuous mode [ 595.690293][T13481] syz.3.4340[13481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 595.690420][T13481] syz.3.4340[13481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.718413][T13576] FAULT_INJECTION: forcing a failure. [ 599.718413][T13576] name failslab, interval 1, probability 0, space 0, times 0 [ 600.029215][T13576] CPU: 0 PID: 13576 Comm: syz.4.4370 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 600.038942][T13576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 600.048836][T13576] Call Trace: [ 600.051961][T13576] [ 600.054739][T13576] dump_stack_lvl+0x151/0x1b7 [ 600.059252][T13576] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 600.064549][T13576] dump_stack+0x15/0x1e [ 600.068536][T13576] should_fail_ex+0x3d0/0x520 [ 600.073056][T13576] ? security_prepare_creds+0x4d/0x140 [ 600.078348][T13576] __should_failslab+0xaf/0xf0 [ 600.082948][T13576] should_failslab+0x9/0x20 [ 600.087288][T13576] __kmem_cache_alloc_node+0x3d/0x250 [ 600.092496][T13576] ? security_prepare_creds+0x4d/0x140 [ 600.097975][T13576] __kmalloc+0xa3/0x1e0 [ 600.101969][T13576] ? prepare_creds+0x2f/0x6a0 [ 600.106481][T13576] security_prepare_creds+0x4d/0x140 [ 600.111613][T13576] prepare_creds+0x472/0x6a0 [ 600.116045][T13576] copy_creds+0xf0/0x630 [ 600.120109][T13576] copy_process+0x855/0x3530 [ 600.124535][T13576] ? __kasan_check_write+0x14/0x20 [ 600.129479][T13576] ? proc_fail_nth_write+0x20b/0x290 [ 600.134604][T13576] ? proc_fail_nth_read+0x210/0x210 [ 600.139634][T13576] ? fsnotify_perm+0x6a/0x5b0 [ 600.144150][T13576] ? idle_dummy+0x10/0x10 [ 600.148313][T13576] ? vfs_write+0x952/0xed0 [ 600.152570][T13576] ? __kasan_slab_free+0x11/0x20 [ 600.157342][T13576] kernel_clone+0x229/0x890 [ 600.161681][T13576] ? __kasan_check_write+0x14/0x20 [ 600.166628][T13576] ? mutex_unlock+0xb2/0x260 [ 600.171057][T13576] ? create_io_thread+0x180/0x180 [ 600.175916][T13576] __x64_sys_clone+0x231/0x280 [ 600.180513][T13576] ? __do_sys_vfork+0x110/0x110 [ 600.185207][T13576] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 600.191115][T13576] ? exit_to_user_mode_prepare+0x39/0xa0 [ 600.196576][T13576] x64_sys_call+0x1b0/0x9a0 [ 600.200911][T13576] do_syscall_64+0x3b/0xb0 [ 600.205164][T13576] ? clear_bhb_loop+0x55/0xb0 [ 600.209676][T13576] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 600.215405][T13576] RIP: 0033:0x7f09ea17e719 [ 600.219661][T13576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 600.239104][T13576] RSP: 002b:00007f09eaf95fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 600.247341][T13576] RAX: ffffffffffffffda RBX: 00007f09ea335f80 RCX: 00007f09ea17e719 [ 600.255152][T13576] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040089000 [ 600.262977][T13576] RBP: 00007f09eaf96090 R08: 0000000000000000 R09: 0000000000000000 [ 600.270773][T13576] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 600.278832][T13576] R13: 0000000000000001 R14: 00007f09ea335f80 R15: 00007ffd277ea028 [ 600.286657][T13576] [ 601.763872][T13633] device wg2 entered promiscuous mode [ 602.203397][T13652] syz.1.4399[13652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 602.203467][T13652] syz.1.4399[13652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 602.717236][ T28] audit: type=1400 audit(1731553266.658:157): avc: denied { create } for pid=13663 comm="syz.0.4402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 605.230424][ T28] audit: type=1400 audit(1731553269.168:158): avc: denied { append } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 605.344315][ T28] audit: type=1400 audit(1731553269.168:159): avc: denied { open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 605.432951][ T28] audit: type=1400 audit(1731553269.168:160): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 606.018161][T13727] FAULT_INJECTION: forcing a failure. [ 606.018161][T13727] name failslab, interval 1, probability 0, space 0, times 0 [ 606.208203][T13727] CPU: 0 PID: 13727 Comm: syz.4.4423 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 606.217937][T13727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 606.227830][T13727] Call Trace: [ 606.230952][T13727] [ 606.233726][T13727] dump_stack_lvl+0x151/0x1b7 [ 606.238242][T13727] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 606.243715][T13727] dump_stack+0x15/0x1e [ 606.247703][T13727] should_fail_ex+0x3d0/0x520 [ 606.252215][T13727] ? security_inode_alloc+0x29/0x120 [ 606.257334][T13727] __should_failslab+0xaf/0xf0 [ 606.261935][T13727] should_failslab+0x9/0x20 [ 606.266275][T13727] kmem_cache_alloc+0x3b/0x2c0 [ 606.270878][T13727] security_inode_alloc+0x29/0x120 [ 606.275824][T13727] inode_init_always+0x720/0x970 [ 606.280596][T13727] ? sockfs_init_fs_context+0xb0/0xb0 [ 606.285806][T13727] new_inode_pseudo+0x98/0x1d0 [ 606.290406][T13727] __sock_create+0x135/0x760 [ 606.294833][T13727] __sys_socketpair+0x29f/0x6e0 [ 606.299517][T13727] ? __ia32_sys_socket+0x90/0x90 [ 606.304292][T13727] ? debug_smp_processor_id+0x17/0x20 [ 606.309499][T13727] __x64_sys_socketpair+0x9b/0xb0 [ 606.314359][T13727] x64_sys_call+0x19b/0x9a0 [ 606.318698][T13727] do_syscall_64+0x3b/0xb0 [ 606.322949][T13727] ? clear_bhb_loop+0x55/0xb0 [ 606.327464][T13727] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 606.333196][T13727] RIP: 0033:0x7f09ea17e719 [ 606.337446][T13727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 606.356891][T13727] RSP: 002b:00007f09eaf96038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 606.365136][T13727] RAX: ffffffffffffffda RBX: 00007f09ea335f80 RCX: 00007f09ea17e719 [ 606.373033][T13727] RDX: 0000000000000040 RSI: 0000000000000003 RDI: 000000000000000a [ 606.380841][T13727] RBP: 00007f09eaf96090 R08: 0000000000000000 R09: 0000000000000000 [ 606.388654][T13727] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000001 [ 606.396466][T13727] R13: 0000000000000000 R14: 00007f09ea335f80 R15: 00007ffd277ea028 [ 606.404281][T13727] [ 606.897877][T13727] socket: no more sockets [ 607.319173][T13769] FAULT_INJECTION: forcing a failure. [ 607.319173][T13769] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 607.345074][T13769] CPU: 0 PID: 13769 Comm: syz.0.4439 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 607.354798][T13769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 607.364695][T13769] Call Trace: [ 607.367812][T13769] [ 607.370592][T13769] dump_stack_lvl+0x151/0x1b7 [ 607.375105][T13769] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 607.380396][T13769] ? vfs_write+0x952/0xed0 [ 607.384648][T13769] ? __kasan_slab_free+0x11/0x20 [ 607.389423][T13769] dump_stack+0x15/0x1e [ 607.393413][T13769] should_fail_ex+0x3d0/0x520 [ 607.397930][T13769] should_fail+0xb/0x10 [ 607.401925][T13769] should_fail_usercopy+0x1a/0x20 [ 607.406783][T13769] _copy_from_user+0x1e/0xc0 [ 607.411205][T13769] __sys_bpf+0x23b/0x7f0 [ 607.415286][T13769] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 607.420513][T13769] ? __ia32_sys_read+0x90/0x90 [ 607.425094][T13769] ? debug_smp_processor_id+0x17/0x20 [ 607.430300][T13769] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 607.436201][T13769] __x64_sys_bpf+0x7c/0x90 [ 607.440456][T13769] x64_sys_call+0x87f/0x9a0 [ 607.444796][T13769] do_syscall_64+0x3b/0xb0 [ 607.449051][T13769] ? clear_bhb_loop+0x55/0xb0 [ 607.453559][T13769] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 607.459290][T13769] RIP: 0033:0x7fc35117e719 [ 607.463546][T13769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 607.482990][T13769] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 607.491232][T13769] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 607.499042][T13769] RDX: 0000000000000094 RSI: 0000000020000b00 RDI: 0000000000000005 [ 607.506851][T13769] RBP: 00007fc351ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 607.514672][T13769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 607.522478][T13769] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 607.530291][T13769] [ 609.739826][T13839] FAULT_INJECTION: forcing a failure. [ 609.739826][T13839] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 609.926486][T13839] CPU: 0 PID: 13839 Comm: syz.4.4462 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 609.936215][T13839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 609.946116][T13839] Call Trace: [ 609.949232][T13839] [ 609.952016][T13839] dump_stack_lvl+0x151/0x1b7 [ 609.956528][T13839] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 609.961820][T13839] dump_stack+0x15/0x1e [ 609.965809][T13839] should_fail_ex+0x3d0/0x520 [ 609.970325][T13839] should_fail+0xb/0x10 [ 609.974403][T13839] should_fail_usercopy+0x1a/0x20 [ 609.979263][T13839] _copy_from_user+0x1e/0xc0 [ 609.983692][T13839] kstrtouint_from_user+0xc2/0x180 [ 609.988730][T13839] ? kstrtol_from_user+0x180/0x180 [ 609.993682][T13839] ? __kasan_check_read+0x11/0x20 [ 609.998539][T13839] proc_fail_nth_write+0xa6/0x290 [ 610.003402][T13839] ? selinux_file_permission+0x2bb/0x560 [ 610.008866][T13839] ? proc_fail_nth_read+0x210/0x210 [ 610.013904][T13839] ? fsnotify_perm+0x6a/0x5b0 [ 610.018415][T13839] ? security_file_permission+0x86/0xb0 [ 610.023793][T13839] ? proc_fail_nth_read+0x210/0x210 [ 610.028830][T13839] vfs_write+0x41d/0xed0 [ 610.032906][T13839] ? __kasan_check_read+0x11/0x20 [ 610.037771][T13839] ? file_end_write+0x1c0/0x1c0 [ 610.042455][T13839] ? mutex_lock+0xb1/0x1e0 [ 610.046712][T13839] ? bit_wait_io_timeout+0x120/0x120 [ 610.051831][T13839] ? __fdget_pos+0x2e2/0x390 [ 610.056254][T13839] ? ksys_write+0x77/0x2c0 [ 610.060509][T13839] ksys_write+0x199/0x2c0 [ 610.064676][T13839] ? __ia32_sys_read+0x90/0x90 [ 610.069284][T13839] ? debug_smp_processor_id+0x17/0x20 [ 610.074493][T13839] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 610.080382][T13839] __x64_sys_write+0x7b/0x90 [ 610.084812][T13839] x64_sys_call+0x2f/0x9a0 [ 610.089061][T13839] do_syscall_64+0x3b/0xb0 [ 610.093314][T13839] ? clear_bhb_loop+0x55/0xb0 [ 610.097836][T13839] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 610.103556][T13839] RIP: 0033:0x7f09ea17d1ff [ 610.107812][T13839] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 610.127286][T13839] RSP: 002b:00007f09eaf75030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 610.135587][T13839] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f09ea17d1ff [ 610.143397][T13839] RDX: 0000000000000001 RSI: 00007f09eaf750a0 RDI: 0000000000000003 [ 610.151206][T13839] RBP: 00007f09eaf75090 R08: 0000000000000000 R09: 0000000000000000 [ 610.159019][T13839] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 610.166832][T13839] R13: 0000000000000000 R14: 00007f09ea336058 R15: 00007ffd277ea028 [ 610.174649][T13839] [ 611.385282][T13871] device veth0_vlan left promiscuous mode [ 611.437025][T13871] device veth0_vlan entered promiscuous mode [ 612.844461][T13921] FAULT_INJECTION: forcing a failure. [ 612.844461][T13921] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 613.069541][T13921] CPU: 1 PID: 13921 Comm: syz.3.4490 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 613.079268][T13921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 613.089160][T13921] Call Trace: [ 613.092284][T13921] [ 613.095164][T13921] dump_stack_lvl+0x151/0x1b7 [ 613.099671][T13921] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 613.104966][T13921] ? vfs_write+0x952/0xed0 [ 613.109217][T13921] ? __kasan_slab_free+0x11/0x20 [ 613.114009][T13921] dump_stack+0x15/0x1e [ 613.117989][T13921] should_fail_ex+0x3d0/0x520 [ 613.122498][T13921] should_fail+0xb/0x10 [ 613.126490][T13921] should_fail_usercopy+0x1a/0x20 [ 613.131349][T13921] _copy_from_user+0x1e/0xc0 [ 613.135775][T13921] __sys_bpf+0x23b/0x7f0 [ 613.139860][T13921] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 613.145240][T13921] ? __ia32_sys_read+0x90/0x90 [ 613.149830][T13921] ? debug_smp_processor_id+0x17/0x20 [ 613.155040][T13921] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 613.160941][T13921] __x64_sys_bpf+0x7c/0x90 [ 613.165192][T13921] x64_sys_call+0x87f/0x9a0 [ 613.169530][T13921] do_syscall_64+0x3b/0xb0 [ 613.173783][T13921] ? clear_bhb_loop+0x55/0xb0 [ 613.178298][T13921] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 613.184028][T13921] RIP: 0033:0x7f08fe17e719 [ 613.188278][T13921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 613.207720][T13921] RSP: 002b:00007f08fef6c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 613.215963][T13921] RAX: ffffffffffffffda RBX: 00007f08fe335f80 RCX: 00007f08fe17e719 [ 613.223775][T13921] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 613.231589][T13921] RBP: 00007f08fef6c090 R08: 0000000000000000 R09: 0000000000000000 [ 613.239398][T13921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 613.247218][T13921] R13: 0000000000000000 R14: 00007f08fe335f80 R15: 00007ffe9f9e1038 [ 613.255028][T13921] [ 613.357807][T13917] device syzkaller0 entered promiscuous mode [ 615.165111][T13963] FAULT_INJECTION: forcing a failure. [ 615.165111][T13963] name failslab, interval 1, probability 0, space 0, times 0 [ 615.240459][T13963] CPU: 0 PID: 13963 Comm: syz.3.4503 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 615.250183][T13963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 615.260076][T13963] Call Trace: [ 615.263195][T13963] [ 615.265981][T13963] dump_stack_lvl+0x151/0x1b7 [ 615.270493][T13963] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 615.275788][T13963] ? kstrtoull+0x1cd/0x2e0 [ 615.280050][T13963] ? _parse_integer+0x40/0x40 [ 615.284552][T13963] dump_stack+0x15/0x1e [ 615.288554][T13963] should_fail_ex+0x3d0/0x520 [ 615.293057][T13963] ? bpf_test_init+0xf1/0x190 [ 615.297571][T13963] __should_failslab+0xaf/0xf0 [ 615.302167][T13963] should_failslab+0x9/0x20 [ 615.306510][T13963] __kmem_cache_alloc_node+0x3d/0x250 [ 615.311726][T13963] ? bpf_test_init+0xf1/0x190 [ 615.316231][T13963] __kmalloc+0xa3/0x1e0 [ 615.320225][T13963] bpf_test_init+0xf1/0x190 [ 615.324562][T13963] bpf_prog_test_run_skb+0x297/0x13a0 [ 615.329777][T13963] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 615.335495][T13963] ? __kasan_check_write+0x14/0x20 [ 615.340446][T13963] ? fput+0x15b/0x1b0 [ 615.344264][T13963] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 615.349993][T13963] bpf_prog_test_run+0x3b0/0x630 [ 615.354768][T13963] ? bpf_prog_query+0x260/0x260 [ 615.359453][T13963] ? selinux_bpf+0xd2/0x100 [ 615.363799][T13963] ? security_bpf+0x82/0xb0 [ 615.368130][T13963] __sys_bpf+0x59f/0x7f0 [ 615.372213][T13963] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 615.377430][T13963] ? __ia32_sys_read+0x90/0x90 [ 615.382018][T13963] ? debug_smp_processor_id+0x17/0x20 [ 615.387224][T13963] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 615.393127][T13963] __x64_sys_bpf+0x7c/0x90 [ 615.397382][T13963] x64_sys_call+0x87f/0x9a0 [ 615.401719][T13963] do_syscall_64+0x3b/0xb0 [ 615.405972][T13963] ? clear_bhb_loop+0x55/0xb0 [ 615.410488][T13963] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 615.416217][T13963] RIP: 0033:0x7f08fe17e719 [ 615.420471][T13963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 615.439909][T13963] RSP: 002b:00007f08fef6c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 615.448153][T13963] RAX: ffffffffffffffda RBX: 00007f08fe335f80 RCX: 00007f08fe17e719 [ 615.455966][T13963] RDX: 0000000000000048 RSI: 0000000020000040 RDI: 000000000000000a [ 615.463777][T13963] RBP: 00007f08fef6c090 R08: 0000000000000000 R09: 0000000000000000 [ 615.471587][T13963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 615.479399][T13963] R13: 0000000000000000 R14: 00007f08fe335f80 R15: 00007ffe9f9e1038 [ 615.487218][T13963] [ 615.753313][T13973] FAULT_INJECTION: forcing a failure. [ 615.753313][T13973] name failslab, interval 1, probability 0, space 0, times 0 [ 615.765762][T13973] CPU: 1 PID: 13973 Comm: syz.0.4509 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 615.775442][T13973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 615.785336][T13973] Call Trace: [ 615.788461][T13973] [ 615.791235][T13973] dump_stack_lvl+0x151/0x1b7 [ 615.795757][T13973] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 615.801044][T13973] ? tipc_sub_subscribe+0x138/0x7e0 [ 615.806084][T13973] ? kasan_set_track+0x60/0x70 [ 615.810676][T13973] ? kasan_set_track+0x4b/0x70 [ 615.815280][T13973] ? kasan_save_alloc_info+0x1f/0x30 [ 615.822572][T13973] ? __kasan_kmalloc+0x9c/0xb0 [ 615.827169][T13973] dump_stack+0x15/0x1e [ 615.831161][T13973] should_fail_ex+0x3d0/0x520 [ 615.835673][T13973] ? tipc_nametbl_subscribe+0x399/0x14c0 [ 615.841314][T13973] __should_failslab+0xaf/0xf0 [ 615.845919][T13973] should_failslab+0x9/0x20 [ 615.850255][T13973] __kmem_cache_alloc_node+0x3d/0x250 [ 615.855467][T13973] ? tipc_nametbl_subscribe+0x399/0x14c0 [ 615.860932][T13973] kmalloc_trace+0x2a/0xa0 [ 615.865186][T13973] tipc_nametbl_subscribe+0x399/0x14c0 [ 615.870483][T13973] ? tipc_nametbl_withdraw+0x390/0x390 [ 615.875776][T13973] ? kasan_save_alloc_info+0x1f/0x30 [ 615.881937][T13973] ? tipc_sub_subscribe+0x25f/0x7e0 [ 615.886973][T13973] tipc_sub_subscribe+0x435/0x7e0 [ 615.891923][T13973] tipc_conn_rcv_sub+0x1b6/0x3e0 [ 615.896697][T13973] tipc_topsrv_kern_subscr+0x2cd/0x490 [ 615.901988][T13973] ? conn_put+0x310/0x310 [ 615.906153][T13973] ? kasan_save_alloc_info+0x1f/0x30 [ 615.911275][T13973] ? __kasan_kmalloc+0x9c/0xb0 [ 615.915876][T13973] tipc_group_create+0x420/0x660 [ 615.920647][T13973] tipc_sk_join+0x22f/0x8a0 [ 615.924989][T13973] ? __tipc_sendstream+0x1310/0x1310 [ 615.930106][T13973] ? __kasan_check_write+0x14/0x20 [ 615.935053][T13973] tipc_setsockopt+0x794/0xb80 [ 615.939668][T13973] ? tipc_shutdown+0x410/0x410 [ 615.944358][T13973] ? security_socket_setsockopt+0x82/0xb0 [ 615.949908][T13973] ? tipc_shutdown+0x410/0x410 [ 615.954769][T13973] __sys_setsockopt+0x4dc/0x8b0 [ 615.959461][T13973] ? __ia32_sys_recv+0xb0/0xb0 [ 615.964059][T13973] __x64_sys_setsockopt+0xbf/0xd0 [ 615.968916][T13973] x64_sys_call+0x1a2/0x9a0 [ 615.973257][T13973] do_syscall_64+0x3b/0xb0 [ 615.977509][T13973] ? clear_bhb_loop+0x55/0xb0 [ 615.982051][T13973] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 615.987753][T13973] RIP: 0033:0x7fc35117e719 [ 615.992004][T13973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 616.011452][T13973] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 616.019692][T13973] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 616.027724][T13973] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000007 [ 616.035529][T13973] RBP: 00007fc351ecd090 R08: 00000000000004bd R09: 0000000000000000 [ 616.043341][T13973] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000001 [ 616.051154][T13973] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 616.058975][T13973] [ 616.061884][T13973] tipc: Service creation failed, no memory [ 616.067492][T13973] tipc: Failed to subscribe for {4294967295,0,4294967295} [ 617.236070][ T28] audit: type=1400 audit(1731553281.178:161): avc: denied { create } for pid=13999 comm="syz.4.4518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 619.786518][T14057] device syzkaller0 entered promiscuous mode [ 623.476521][T14157] FAULT_INJECTION: forcing a failure. [ 623.476521][T14157] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 623.673372][T14157] CPU: 1 PID: 14157 Comm: syz.4.4570 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 623.683098][T14157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 623.692992][T14157] Call Trace: [ 623.696119][T14157] [ 623.698894][T14157] dump_stack_lvl+0x151/0x1b7 [ 623.703409][T14157] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 623.708702][T14157] ? migrate_enable+0x1cb/0x2b0 [ 623.713463][T14157] dump_stack+0x15/0x1e [ 623.717510][T14157] should_fail_ex+0x3d0/0x520 [ 623.721983][T14157] should_fail+0xb/0x10 [ 623.725972][T14157] should_fail_usercopy+0x1a/0x20 [ 623.730837][T14157] _copy_from_user+0x1e/0xc0 [ 623.735264][T14157] generic_map_update_batch+0x54c/0x8c0 [ 623.740645][T14157] ? generic_map_delete_batch+0x5c0/0x5c0 [ 623.746196][T14157] ? generic_map_delete_batch+0x5c0/0x5c0 [ 623.751751][T14157] bpf_map_do_batch+0x4cc/0x630 [ 623.756438][T14157] __sys_bpf+0x66b/0x7f0 [ 623.760516][T14157] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 623.765725][T14157] ? __ia32_sys_read+0x90/0x90 [ 623.770324][T14157] ? debug_smp_processor_id+0x17/0x20 [ 623.775531][T14157] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 623.781432][T14157] __x64_sys_bpf+0x7c/0x90 [ 623.785685][T14157] x64_sys_call+0x87f/0x9a0 [ 623.790026][T14157] do_syscall_64+0x3b/0xb0 [ 623.794277][T14157] ? clear_bhb_loop+0x55/0xb0 [ 623.798791][T14157] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 623.804521][T14157] RIP: 0033:0x7f09ea17e719 [ 623.808773][T14157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 623.828217][T14157] RSP: 002b:00007f09eaf96038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 623.836462][T14157] RAX: ffffffffffffffda RBX: 00007f09ea335f80 RCX: 00007f09ea17e719 [ 623.844277][T14157] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 623.852085][T14157] RBP: 00007f09eaf96090 R08: 0000000000000000 R09: 0000000000000000 [ 623.859892][T14157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 623.867703][T14157] R13: 0000000000000000 R14: 00007f09ea335f80 R15: 00007ffd277ea028 [ 623.875521][T14157] [ 623.988082][T14163] device veth0_vlan left promiscuous mode [ 624.076915][T14163] device veth0_vlan entered promiscuous mode [ 624.388465][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 624.417189][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 624.456681][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 625.443501][T14163] device sit0 left promiscuous mode [ 626.581437][T14214] device pim6reg1 entered promiscuous mode [ 626.619779][T14214] FAULT_INJECTION: forcing a failure. [ 626.619779][T14214] name failslab, interval 1, probability 0, space 0, times 0 [ 626.632259][T14214] CPU: 0 PID: 14214 Comm: syz.3.4588 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 626.641912][T14214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 626.651810][T14214] Call Trace: [ 626.654958][T14214] [ 626.657714][T14214] dump_stack_lvl+0x151/0x1b7 [ 626.662223][T14214] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 626.667518][T14214] ? ip6_route_info_create+0xa56/0x14c0 [ 626.672896][T14214] ? ip6_route_add+0x27/0x130 [ 626.677412][T14214] ? addrconf_add_dev+0x419/0x5f0 [ 626.682273][T14214] ? addrconf_notify+0x976/0xe10 [ 626.687048][T14214] dump_stack+0x15/0x1e [ 626.691037][T14214] should_fail_ex+0x3d0/0x520 [ 626.695555][T14214] ? __alloc_skb+0xcc/0x2d0 [ 626.699889][T14214] __should_failslab+0xaf/0xf0 [ 626.704491][T14214] should_failslab+0x9/0x20 [ 626.708830][T14214] kmem_cache_alloc_node+0x3e/0x2d0 [ 626.713868][T14214] __alloc_skb+0xcc/0x2d0 [ 626.718034][T14214] inet6_rt_notify+0x2db/0x560 [ 626.722632][T14214] ? rt6_nh_dump_exceptions+0x650/0x650 [ 626.728015][T14214] fib6_add+0x23ac/0x3df0 [ 626.732180][T14214] ? skb_gro_incr_csum_unnecessary+0x330/0x330 [ 626.738166][T14214] ? ipv6_addr_prefix+0x42/0x180 [ 626.742939][T14214] ? fib6_update_sernum_stub+0x1a0/0x1a0 [ 626.748411][T14214] ? __kasan_check_write+0x14/0x20 [ 626.753353][T14214] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 626.758215][T14214] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 626.763253][T14214] ip6_route_add+0x8a/0x130 [ 626.767591][T14214] addrconf_add_dev+0x419/0x5f0 [ 626.772277][T14214] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 626.777489][T14214] ? __kasan_check_read+0x11/0x20 [ 626.782345][T14214] addrconf_init_auto_addrs+0xadc/0x1050 [ 626.787815][T14214] ? addrconf_dad_run+0x610/0x610 [ 626.792671][T14214] ? __local_bh_enable_ip+0x58/0x80 [ 626.797707][T14214] ? _raw_write_unlock_bh+0x32/0x50 [ 626.802742][T14214] ? addrconf_permanent_addr+0xb40/0xba0 [ 626.808210][T14214] ? __kasan_check_write+0x14/0x20 [ 626.813159][T14214] ? addrconf_notify+0xe10/0xe10 [ 626.817930][T14214] ? igmpv3_del_delrec+0x740/0x740 [ 626.822875][T14214] ? __local_bh_enable_ip+0x58/0x80 [ 626.827918][T14214] ? __kasan_check_write+0x14/0x20 [ 626.832858][T14214] ? mutex_unlock+0xb2/0x260 [ 626.837285][T14214] ? tun_device_event+0x3ef/0xf80 [ 626.842143][T14214] ? __mutex_lock_slowpath+0x10/0x10 [ 626.847267][T14214] ? macsec_notify+0x101/0x4c0 [ 626.851872][T14214] ? addrconf_link_ready+0xfb/0x1e0 [ 626.856921][T14214] addrconf_notify+0x976/0xe10 [ 626.861504][T14214] raw_notifier_call_chain+0x8c/0xf0 [ 626.866623][T14214] __dev_notify_flags+0x304/0x610 [ 626.871482][T14214] ? __dev_change_flags+0x6e0/0x6e0 [ 626.876513][T14214] ? __dev_change_flags+0x569/0x6e0 [ 626.881550][T14214] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 626.888145][T14214] ? dev_get_flags+0x1e0/0x1e0 [ 626.892744][T14214] ? __request_module+0x3fa/0x8d0 [ 626.897607][T14214] dev_change_flags+0xf0/0x1a0 [ 626.902205][T14214] dev_ifsioc+0x177/0x1150 [ 626.906461][T14214] ? dev_ioctl+0xe60/0xe60 [ 626.910712][T14214] ? __mutex_lock_slowpath+0xe/0x10 [ 626.915749][T14214] ? mutex_lock+0x130/0x1e0 [ 626.920084][T14214] ? bit_wait_io_timeout+0x120/0x120 [ 626.925205][T14214] ? security_capable+0x87/0xb0 [ 626.929899][T14214] dev_ioctl+0x543/0xe60 [ 626.933978][T14214] sock_do_ioctl+0x26b/0x450 [ 626.938398][T14214] ? has_cap_mac_admin+0x3c0/0x3c0 [ 626.943345][T14214] ? sock_show_fdinfo+0xa0/0xa0 [ 626.948035][T14214] ? from_kuid+0x18d/0x6f0 [ 626.952288][T14214] ? selinux_file_ioctl+0x3cc/0x540 [ 626.957321][T14214] sock_ioctl+0x455/0x740 [ 626.961488][T14214] ? sock_poll+0x400/0x400 [ 626.965824][T14214] ? __fget_files+0x2cb/0x330 [ 626.970341][T14214] ? security_file_ioctl+0x84/0xb0 [ 626.975287][T14214] ? sock_poll+0x400/0x400 [ 626.979537][T14214] __se_sys_ioctl+0x114/0x190 [ 626.984052][T14214] __x64_sys_ioctl+0x7b/0x90 [ 626.988478][T14214] x64_sys_call+0x98/0x9a0 [ 626.992731][T14214] do_syscall_64+0x3b/0xb0 [ 626.996982][T14214] ? clear_bhb_loop+0x55/0xb0 [ 627.001498][T14214] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 627.007225][T14214] RIP: 0033:0x7f08fe17e719 [ 627.011476][T14214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 627.030928][T14214] RSP: 002b:00007f08fef4b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 627.039170][T14214] RAX: ffffffffffffffda RBX: 00007f08fe336058 RCX: 00007f08fe17e719 [ 627.046980][T14214] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 627.054789][T14214] RBP: 00007f08fef4b090 R08: 0000000000000000 R09: 0000000000000000 [ 627.062599][T14214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 627.070656][T14214] R13: 0000000000000000 R14: 00007f08fe336058 R15: 00007ffe9f9e1038 [ 627.078467][T14214] [ 628.188391][T14235] device sit0 left promiscuous mode [ 628.732004][T14237] device syzkaller0 entered promiscuous mode [ 628.778568][T14254] FAULT_INJECTION: forcing a failure. [ 628.778568][T14254] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 628.792275][T14254] CPU: 1 PID: 14254 Comm: syz.3.4599 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 628.801992][T14254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 628.811878][T14254] Call Trace: [ 628.815002][T14254] [ 628.817779][T14254] dump_stack_lvl+0x151/0x1b7 [ 628.822293][T14254] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 628.827586][T14254] ? kasan_set_track+0x60/0x70 [ 628.832188][T14254] dump_stack+0x15/0x1e [ 628.836176][T14254] should_fail_ex+0x3d0/0x520 [ 628.840697][T14254] should_fail_alloc_page+0x68/0x90 [ 628.845730][T14254] prepare_alloc_pages+0x14e/0x6f0 [ 628.850676][T14254] ? __alloc_pages_bulk+0xda0/0xda0 [ 628.855710][T14254] __alloc_pages+0x162/0x610 [ 628.860134][T14254] ? prep_new_page+0x110/0x110 [ 628.864766][T14254] __folio_alloc+0x15/0x40 [ 628.868990][T14254] shmem_alloc_and_acct_folio+0x78c/0xa50 [ 628.874541][T14254] ? mem_cgroup_swap_full+0x1a0/0x1a0 [ 628.879753][T14254] ? shmem_replace_folio+0x6a0/0x6a0 [ 628.884882][T14254] ? xas_load+0x39d/0x3b0 [ 628.889039][T14254] ? __filemap_get_folio+0xaa1/0xae0 [ 628.894160][T14254] ? page_cache_prev_miss+0x410/0x410 [ 628.899366][T14254] ? down_read_trylock+0x319/0x7d0 [ 628.904316][T14254] shmem_get_folio_gfp+0x12d4/0x24b0 [ 628.909570][T14254] ? shmem_get_folio+0xa0/0xa0 [ 628.914160][T14254] ? fault_in_iov_iter_readable+0x49/0x290 [ 628.919801][T14254] ? fault_in_readable+0x172/0x2d0 [ 628.924751][T14254] ? fault_in_readable+0x17c/0x2d0 [ 628.929698][T14254] shmem_write_begin+0x164/0x3a0 [ 628.934467][T14254] ? __kasan_check_write+0x14/0x20 [ 628.939418][T14254] ? shmem_writepage+0xe00/0xe00 [ 628.944195][T14254] generic_perform_write+0x2f9/0x5c0 [ 628.949314][T14254] ? generic_file_direct_write+0x6b0/0x6b0 [ 628.954955][T14254] ? __file_remove_privs+0x640/0x640 [ 628.960075][T14254] ? generic_write_checks+0x15c/0x1c0 [ 628.965285][T14254] __generic_file_write_iter+0x174/0x3a0 [ 628.970921][T14254] generic_file_write_iter+0xb1/0x310 [ 628.976118][T14254] vfs_write+0xaf6/0xed0 [ 628.980197][T14254] ? __kasan_slab_free+0x11/0x20 [ 628.984974][T14254] ? file_end_write+0x1c0/0x1c0 [ 628.989659][T14254] ? mutex_lock+0xb1/0x1e0 [ 628.993912][T14254] ? bit_wait_io_timeout+0x120/0x120 [ 628.999036][T14254] ? __fdget_pos+0x2e2/0x390 [ 629.003458][T14254] ? ksys_write+0x77/0x2c0 [ 629.007713][T14254] ksys_write+0x199/0x2c0 [ 629.011875][T14254] ? __this_cpu_preempt_check+0x13/0x20 [ 629.017260][T14254] ? __ia32_sys_read+0x90/0x90 [ 629.021858][T14254] ? debug_smp_processor_id+0x17/0x20 [ 629.027065][T14254] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 629.032965][T14254] __x64_sys_write+0x7b/0x90 [ 629.037394][T14254] x64_sys_call+0x2f/0x9a0 [ 629.041646][T14254] do_syscall_64+0x3b/0xb0 [ 629.045897][T14254] ? clear_bhb_loop+0x55/0xb0 [ 629.050414][T14254] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 629.056142][T14254] RIP: 0033:0x7f08fe17e719 [ 629.060396][T14254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 629.079838][T14254] RSP: 002b:00007f08fef6c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 629.088082][T14254] RAX: ffffffffffffffda RBX: 00007f08fe335f80 RCX: 00007f08fe17e719 [ 629.095892][T14254] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 629.103707][T14254] RBP: 00007f08fef6c090 R08: 0000000000000000 R09: 0000000000000000 [ 629.111515][T14254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 629.119329][T14254] R13: 0000000000000000 R14: 00007f08fe335f80 R15: 00007ffe9f9e1038 [ 629.127143][T14254] [ 630.376288][T14293] FAULT_INJECTION: forcing a failure. [ 630.376288][T14293] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 630.390408][T14293] CPU: 1 PID: 14293 Comm: syz.0.4614 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 630.400120][T14293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 630.410017][T14293] Call Trace: [ 630.413136][T14293] [ 630.415913][T14293] dump_stack_lvl+0x151/0x1b7 [ 630.420427][T14293] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 630.425722][T14293] ? vfs_write+0x952/0xed0 [ 630.429976][T14293] dump_stack+0x15/0x1e [ 630.433965][T14293] should_fail_ex+0x3d0/0x520 [ 630.438490][T14293] should_fail+0xb/0x10 [ 630.442473][T14293] should_fail_usercopy+0x1a/0x20 [ 630.447336][T14293] _copy_from_user+0x1e/0xc0 [ 630.451761][T14293] __sys_bpf+0x23b/0x7f0 [ 630.455839][T14293] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 630.461047][T14293] ? __ia32_sys_read+0x90/0x90 [ 630.465648][T14293] ? debug_smp_processor_id+0x17/0x20 [ 630.470853][T14293] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 630.476755][T14293] __x64_sys_bpf+0x7c/0x90 [ 630.481009][T14293] x64_sys_call+0x87f/0x9a0 [ 630.485346][T14293] do_syscall_64+0x3b/0xb0 [ 630.489600][T14293] ? clear_bhb_loop+0x55/0xb0 [ 630.494113][T14293] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 630.499841][T14293] RIP: 0033:0x7fc35117e719 [ 630.504091][T14293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 630.523540][T14293] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 630.531778][T14293] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 630.539592][T14293] RDX: 0000000000000050 RSI: 00000000200002c0 RDI: 000000000000000a [ 630.547487][T14293] RBP: 00007fc351ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 630.555301][T14293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 630.563109][T14293] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 630.570927][T14293] [ 631.848103][T14342] FAULT_INJECTION: forcing a failure. [ 631.848103][T14342] name failslab, interval 1, probability 0, space 0, times 0 [ 631.900317][T14342] CPU: 1 PID: 14342 Comm: syz.1.4627 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 631.910038][T14342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 631.919933][T14342] Call Trace: [ 631.923056][T14342] [ 631.925834][T14342] dump_stack_lvl+0x151/0x1b7 [ 631.930356][T14342] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 631.935674][T14342] dump_stack+0x15/0x1e [ 631.939637][T14342] should_fail_ex+0x3d0/0x520 [ 631.944147][T14342] ? sk_prot_alloc+0xf9/0x330 [ 631.948663][T14342] __should_failslab+0xaf/0xf0 [ 631.953273][T14342] should_failslab+0x9/0x20 [ 631.957602][T14342] __kmem_cache_alloc_node+0x3d/0x250 [ 631.962814][T14342] ? sk_prot_alloc+0xf9/0x330 [ 631.967324][T14342] __kmalloc+0xa3/0x1e0 [ 631.971314][T14342] sk_prot_alloc+0xf9/0x330 [ 631.975655][T14342] sk_alloc+0x38/0x440 [ 631.979558][T14342] ? bpf_test_init+0x169/0x190 [ 631.984159][T14342] bpf_prog_test_run_skb+0x384/0x13a0 [ 631.989373][T14342] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 631.995094][T14342] ? __kasan_check_write+0x14/0x20 [ 632.000043][T14342] ? fput+0x15b/0x1b0 [ 632.003859][T14342] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 632.009600][T14342] bpf_prog_test_run+0x3b0/0x630 [ 632.014366][T14342] ? bpf_prog_query+0x260/0x260 [ 632.019053][T14342] ? selinux_bpf+0xd2/0x100 [ 632.023395][T14342] ? security_bpf+0x82/0xb0 [ 632.027733][T14342] __sys_bpf+0x59f/0x7f0 [ 632.031812][T14342] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 632.037018][T14342] ? bpf_trace_run1+0x240/0x240 [ 632.041704][T14342] ? __ia32_sys_read+0x90/0x90 [ 632.046307][T14342] __x64_sys_bpf+0x7c/0x90 [ 632.050555][T14342] x64_sys_call+0x87f/0x9a0 [ 632.054899][T14342] do_syscall_64+0x3b/0xb0 [ 632.059150][T14342] ? clear_bhb_loop+0x55/0xb0 [ 632.063666][T14342] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 632.069388][T14342] RIP: 0033:0x7fcec0f7e719 [ 632.073646][T14342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 632.093090][T14342] RSP: 002b:00007fcec1da3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 632.101328][T14342] RAX: ffffffffffffffda RBX: 00007fcec1135f80 RCX: 00007fcec0f7e719 [ 632.109142][T14342] RDX: 000000000000001e RSI: 0000000020000080 RDI: 000000000000000a [ 632.116952][T14342] RBP: 00007fcec1da3090 R08: 0000000000000000 R09: 0000000000000000 [ 632.124762][T14342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 632.132576][T14342] R13: 0000000000000000 R14: 00007fcec1135f80 R15: 00007ffdc08a2038 [ 632.140395][T14342] [ 632.852741][ T28] audit: type=1400 audit(1731553296.798:162): avc: denied { create } for pid=14369 comm="syz.2.4637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 633.217538][T14379] device pim6reg1 entered promiscuous mode [ 633.223555][T14379] FAULT_INJECTION: forcing a failure. [ 633.223555][T14379] name failslab, interval 1, probability 0, space 0, times 0 [ 633.319614][T14379] CPU: 0 PID: 14379 Comm: syz.0.4639 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 633.329334][T14379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 633.339230][T14379] Call Trace: [ 633.342352][T14379] [ 633.345129][T14379] dump_stack_lvl+0x151/0x1b7 [ 633.349643][T14379] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 633.354936][T14379] ? arch_stack_walk+0xf3/0x140 [ 633.359627][T14379] dump_stack+0x15/0x1e [ 633.363618][T14379] should_fail_ex+0x3d0/0x520 [ 633.368132][T14379] ? fib6_info_alloc+0x33/0xe0 [ 633.372731][T14379] __should_failslab+0xaf/0xf0 [ 633.377335][T14379] should_failslab+0x9/0x20 [ 633.381670][T14379] __kmem_cache_alloc_node+0x3d/0x250 [ 633.386875][T14379] ? __stack_depot_save+0x36/0x480 [ 633.391821][T14379] ? fib6_info_alloc+0x33/0xe0 [ 633.396423][T14379] __kmalloc+0xa3/0x1e0 [ 633.400587][T14379] fib6_info_alloc+0x33/0xe0 [ 633.405014][T14379] ip6_route_info_create+0x50b/0x14c0 [ 633.410223][T14379] ? dev_change_flags+0xf0/0x1a0 [ 633.414994][T14379] ? dev_ifsioc+0x177/0x1150 [ 633.419430][T14379] ? dev_ioctl+0x543/0xe60 [ 633.423676][T14379] ? memcpy+0x56/0x70 [ 633.427495][T14379] addrconf_f6i_alloc+0x215/0x4c0 [ 633.432369][T14379] ? ip6_route_del+0xfe0/0xfe0 [ 633.436963][T14379] ? kasan_save_alloc_info+0x1f/0x30 [ 633.442073][T14379] ? __kasan_kmalloc+0x9c/0xb0 [ 633.446675][T14379] ? kmalloc_trace+0x44/0xa0 [ 633.451104][T14379] ipv6_add_addr+0x450/0xdf0 [ 633.455528][T14379] ? ipv6_generate_stable_address+0x6e0/0x6e0 [ 633.461433][T14379] ? nlmsg_notify+0x15a/0x1c0 [ 633.465949][T14379] addrconf_add_linklocal+0x326/0x9e0 [ 633.471154][T14379] ? inet6_addr_del+0x550/0x550 [ 633.475837][T14379] ? rt6_nh_dump_exceptions+0x650/0x650 [ 633.481220][T14379] ? __kasan_check_write+0x14/0x20 [ 633.486167][T14379] ? fib6_add+0x3168/0x3df0 [ 633.490507][T14379] ? memcpy+0x56/0x70 [ 633.494324][T14379] ? ipv6_generate_eui64+0x7b3/0x1080 [ 633.499532][T14379] addrconf_addr_gen+0x57f/0xcf0 [ 633.504307][T14379] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 633.509861][T14379] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 633.514719][T14379] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 633.519759][T14379] ? __kasan_check_write+0x14/0x20 [ 633.524703][T14379] ? ip6_route_add+0x102/0x130 [ 633.529303][T14379] ? addrconf_add_dev+0x419/0x5f0 [ 633.534164][T14379] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 633.539377][T14379] ? __kasan_check_read+0x11/0x20 [ 633.544233][T14379] addrconf_init_auto_addrs+0xb96/0x1050 [ 633.549704][T14379] ? addrconf_dad_run+0x610/0x610 [ 633.554557][T14379] ? __local_bh_enable_ip+0x58/0x80 [ 633.559592][T14379] ? _raw_write_unlock_bh+0x32/0x50 [ 633.564627][T14379] ? addrconf_permanent_addr+0xb40/0xba0 [ 633.570096][T14379] ? __kasan_check_write+0x14/0x20 [ 633.575041][T14379] ? addrconf_notify+0xe10/0xe10 [ 633.579821][T14379] ? igmpv3_del_delrec+0x740/0x740 [ 633.584761][T14379] ? __local_bh_enable_ip+0x58/0x80 [ 633.589797][T14379] ? __kasan_check_write+0x14/0x20 [ 633.594744][T14379] ? mutex_unlock+0xb2/0x260 [ 633.599169][T14379] ? tun_device_event+0x3ef/0xf80 [ 633.604029][T14379] ? __mutex_lock_slowpath+0x10/0x10 [ 633.609152][T14379] ? macsec_notify+0x101/0x4c0 [ 633.613751][T14379] ? addrconf_link_ready+0xfb/0x1e0 [ 633.618788][T14379] addrconf_notify+0x976/0xe10 [ 633.623387][T14379] raw_notifier_call_chain+0x8c/0xf0 [ 633.628508][T14379] __dev_notify_flags+0x304/0x610 [ 633.633366][T14379] ? __dev_change_flags+0x6e0/0x6e0 [ 633.638400][T14379] ? __dev_change_flags+0x569/0x6e0 [ 633.643434][T14379] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 633.650031][T14379] ? dev_get_flags+0x1e0/0x1e0 [ 633.654632][T14379] ? kstrtouint+0xf6/0x180 [ 633.658887][T14379] dev_change_flags+0xf0/0x1a0 [ 633.663487][T14379] dev_ifsioc+0x177/0x1150 [ 633.667739][T14379] ? dev_ioctl+0xe60/0xe60 [ 633.671988][T14379] ? __mutex_lock_slowpath+0xe/0x10 [ 633.677023][T14379] ? mutex_lock+0x130/0x1e0 [ 633.681364][T14379] ? bit_wait_io_timeout+0x120/0x120 [ 633.686496][T14379] dev_ioctl+0x543/0xe60 [ 633.690567][T14379] sock_do_ioctl+0x26b/0x450 [ 633.694991][T14379] ? has_cap_mac_admin+0x3c0/0x3c0 [ 633.699939][T14379] ? sock_show_fdinfo+0xa0/0xa0 [ 633.704626][T14379] ? from_kuid+0x18d/0x6f0 [ 633.708877][T14379] ? selinux_file_ioctl+0x3cc/0x540 [ 633.713910][T14379] sock_ioctl+0x455/0x740 [ 633.718080][T14379] ? sock_poll+0x400/0x400 [ 633.722331][T14379] ? __fget_files+0x2cb/0x330 [ 633.726847][T14379] ? security_file_ioctl+0x84/0xb0 [ 633.731791][T14379] ? sock_poll+0x400/0x400 [ 633.736042][T14379] __se_sys_ioctl+0x114/0x190 [ 633.740560][T14379] __x64_sys_ioctl+0x7b/0x90 [ 633.744988][T14379] x64_sys_call+0x98/0x9a0 [ 633.749238][T14379] do_syscall_64+0x3b/0xb0 [ 633.753487][T14379] ? clear_bhb_loop+0x55/0xb0 [ 633.758001][T14379] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 633.763815][T14379] RIP: 0033:0x7fc35117e719 [ 633.768072][T14379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 633.787513][T14379] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 633.795755][T14379] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 633.803569][T14379] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 633.811381][T14379] RBP: 00007fc351ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 633.819190][T14379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 633.827007][T14379] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 633.834825][T14379] [ 635.368428][T14409] FAULT_INJECTION: forcing a failure. [ 635.368428][T14409] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 635.516317][T14409] CPU: 1 PID: 14409 Comm: syz.2.4649 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 635.526046][T14409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 635.535943][T14409] Call Trace: [ 635.539065][T14409] [ 635.541838][T14409] dump_stack_lvl+0x151/0x1b7 [ 635.546357][T14409] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 635.551645][T14409] ? avc_has_perm_noaudit+0x2f1/0x430 [ 635.556857][T14409] dump_stack+0x15/0x1e [ 635.560848][T14409] should_fail_ex+0x3d0/0x520 [ 635.565362][T14409] should_fail+0xb/0x10 [ 635.569352][T14409] should_fail_usercopy+0x1a/0x20 [ 635.574645][T14409] strncpy_from_user+0x24/0x2b0 [ 635.579335][T14409] bpf_prog_load+0x1fb/0x1bf0 [ 635.583853][T14409] ? map_freeze+0x3a0/0x3a0 [ 635.588223][T14409] ? __sanitizer_cov_trace_switch+0x60/0xe0 [ 635.593916][T14409] __sys_bpf+0x52c/0x7f0 [ 635.598000][T14409] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 635.603210][T14409] ? bpf_trace_run1+0x240/0x240 [ 635.607890][T14409] ? __ia32_sys_read+0x90/0x90 [ 635.612493][T14409] __x64_sys_bpf+0x7c/0x90 [ 635.616748][T14409] x64_sys_call+0x87f/0x9a0 [ 635.621082][T14409] do_syscall_64+0x3b/0xb0 [ 635.625332][T14409] ? clear_bhb_loop+0x55/0xb0 [ 635.629851][T14409] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 635.635579][T14409] RIP: 0033:0x7f8d4237e719 [ 635.639826][T14409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 635.659271][T14409] RSP: 002b:00007f8d430e5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 635.667517][T14409] RAX: ffffffffffffffda RBX: 00007f8d42535f80 RCX: 00007f8d4237e719 [ 635.675328][T14409] RDX: 0000000000000090 RSI: 0000000020000a40 RDI: 0000000000000005 [ 635.683154][T14409] RBP: 00007f8d430e5090 R08: 0000000000000000 R09: 0000000000000000 [ 635.690950][T14409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 635.698761][T14409] R13: 0000000000000000 R14: 00007f8d42535f80 R15: 00007ffd2fc76c88 [ 635.706580][T14409] [ 638.039038][T14482] device syzkaller0 entered promiscuous mode [ 649.023531][T14700] device syzkaller0 entered promiscuous mode [ 652.128470][T14761] device sit0 entered promiscuous mode [ 652.309769][T14769] FAULT_INJECTION: forcing a failure. [ 652.309769][T14769] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 652.422319][T14769] CPU: 0 PID: 14769 Comm: syz.1.4764 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 652.432038][T14769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 652.441934][T14769] Call Trace: [ 652.445057][T14769] [ 652.447842][T14769] dump_stack_lvl+0x151/0x1b7 [ 652.452349][T14769] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 652.457645][T14769] dump_stack+0x15/0x1e [ 652.461635][T14769] should_fail_ex+0x3d0/0x520 [ 652.466164][T14769] should_fail+0xb/0x10 [ 652.470138][T14769] should_fail_usercopy+0x1a/0x20 [ 652.475001][T14769] _copy_to_user+0x1e/0x90 [ 652.479257][T14769] simple_read_from_buffer+0xc7/0x150 [ 652.484462][T14769] proc_fail_nth_read+0x1a3/0x210 [ 652.489321][T14769] ? proc_fault_inject_write+0x390/0x390 [ 652.494789][T14769] ? fsnotify_perm+0x269/0x5b0 [ 652.499391][T14769] ? security_file_permission+0x86/0xb0 [ 652.504772][T14769] ? proc_fault_inject_write+0x390/0x390 [ 652.510238][T14769] vfs_read+0x26c/0xae0 [ 652.514232][T14769] ? kernel_read+0x1f0/0x1f0 [ 652.518655][T14769] ? mutex_lock+0xb1/0x1e0 [ 652.522913][T14769] ? bit_wait_io_timeout+0x120/0x120 [ 652.528038][T14769] ? __fdget_pos+0x2e2/0x390 [ 652.532454][T14769] ? ksys_read+0x77/0x2c0 [ 652.536623][T14769] ksys_read+0x199/0x2c0 [ 652.540703][T14769] ? vfs_write+0xed0/0xed0 [ 652.544958][T14769] ? debug_smp_processor_id+0x17/0x20 [ 652.550164][T14769] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 652.556066][T14769] __x64_sys_read+0x7b/0x90 [ 652.560403][T14769] x64_sys_call+0x28/0x9a0 [ 652.564660][T14769] do_syscall_64+0x3b/0xb0 [ 652.568911][T14769] ? clear_bhb_loop+0x55/0xb0 [ 652.573423][T14769] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 652.579151][T14769] RIP: 0033:0x7fcec0f7d15c [ 652.583405][T14769] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 652.602848][T14769] RSP: 002b:00007fcec1da3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 652.611091][T14769] RAX: ffffffffffffffda RBX: 00007fcec1135f80 RCX: 00007fcec0f7d15c [ 652.618905][T14769] RDX: 000000000000000f RSI: 00007fcec1da30a0 RDI: 0000000000000003 [ 652.626714][T14769] RBP: 00007fcec1da3090 R08: 0000000000000000 R09: 0000000000000000 [ 652.634526][T14769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.642336][T14769] R13: 0000000000000001 R14: 00007fcec1135f80 R15: 00007ffdc08a2038 [ 652.650154][T14769] [ 657.274112][T14880] FAULT_INJECTION: forcing a failure. [ 657.274112][T14880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 657.386827][T14880] CPU: 0 PID: 14880 Comm: syz.1.4804 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 657.396551][T14880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 657.406443][T14880] Call Trace: [ 657.409565][T14880] [ 657.412342][T14880] dump_stack_lvl+0x151/0x1b7 [ 657.416855][T14880] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 657.422148][T14880] ? vsnprintf+0x1b93/0x1c70 [ 657.426576][T14880] dump_stack+0x15/0x1e [ 657.430566][T14880] should_fail_ex+0x3d0/0x520 [ 657.435081][T14880] should_fail+0xb/0x10 [ 657.439072][T14880] should_fail_usercopy+0x1a/0x20 [ 657.443939][T14880] _copy_to_user+0x1e/0x90 [ 657.448188][T14880] bpf_verifier_vlog+0x181/0x390 [ 657.452961][T14880] __btf_verifier_log+0xd1/0x120 [ 657.457733][T14880] ? kvmalloc_node+0x221/0x640 [ 657.462332][T14880] ? btf_parse_hdr+0x2bf/0x7c0 [ 657.466933][T14880] ? btf_check_sec_info+0x4f0/0x4f0 [ 657.471968][T14880] ? kvmalloc_node+0x26c/0x640 [ 657.476570][T14880] ? memcpy+0x56/0x70 [ 657.480386][T14880] btf_parse_hdr+0x31a/0x7c0 [ 657.484819][T14880] btf_new_fd+0x39e/0x7c0 [ 657.488981][T14880] bpf_btf_load+0x6f/0x90 [ 657.493145][T14880] __sys_bpf+0x586/0x7f0 [ 657.497224][T14880] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 657.502437][T14880] ? __ia32_sys_read+0x90/0x90 [ 657.507032][T14880] ? debug_smp_processor_id+0x17/0x20 [ 657.512239][T14880] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 657.518143][T14880] __x64_sys_bpf+0x7c/0x90 [ 657.522395][T14880] x64_sys_call+0x87f/0x9a0 [ 657.526735][T14880] do_syscall_64+0x3b/0xb0 [ 657.530989][T14880] ? clear_bhb_loop+0x55/0xb0 [ 657.535503][T14880] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 657.541231][T14880] RIP: 0033:0x7fcec0f7e719 [ 657.545483][T14880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 657.564922][T14880] RSP: 002b:00007fcec1da3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 657.573168][T14880] RAX: ffffffffffffffda RBX: 00007fcec1135f80 RCX: 00007fcec0f7e719 [ 657.580980][T14880] RDX: 0000000000000028 RSI: 0000000020003800 RDI: 0000000000000012 [ 657.588791][T14880] RBP: 00007fcec1da3090 R08: 0000000000000000 R09: 0000000000000000 [ 657.596602][T14880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 657.604421][T14880] R13: 0000000000000000 R14: 00007fcec1135f80 R15: 00007ffdc08a2038 [ 657.612230][T14880] [ 657.626551][T14877] veth1_virt_wifi: mtu less than device minimum [ 657.707107][T14877] device wg2 entered promiscuous mode [ 657.803739][T14877] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 658.003374][ T28] audit: type=1400 audit(1731553321.948:163): avc: denied { rename } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 658.121234][ T28] audit: type=1400 audit(1731553321.948:164): avc: denied { unlink } for pid=85 comm="syslogd" name="messages.0" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 658.143488][ T28] audit: type=1400 audit(1731553321.948:165): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 663.116482][T15014] device sit0 left promiscuous mode [ 663.239421][T15018] device sit0 entered promiscuous mode [ 670.094116][T15191] device sit0 left promiscuous mode [ 670.341799][T15194] device sit0 entered promiscuous mode [ 671.150902][ T28] audit: type=1400 audit(1731553335.098:166): avc: denied { create } for pid=15203 comm="syz.4.4911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 672.042442][T15240] syz.4.4921[15240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 672.042513][T15240] syz.4.4921[15240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 672.223409][T15244] device sit0 left promiscuous mode [ 673.667394][T15247] device sit0 entered promiscuous mode [ 676.259544][T15287] device sit0 left promiscuous mode [ 676.497420][T15287] device sit0 entered promiscuous mode [ 678.006887][T15325] device sit0 left promiscuous mode [ 678.578348][T15329] device sit0 entered promiscuous mode [ 680.197251][T15366] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.204959][T15366] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.017102][T15419] device sit0 left promiscuous mode [ 684.196816][T15426] device sit0 entered promiscuous mode [ 689.623494][T15541] FAULT_INJECTION: forcing a failure. [ 689.623494][T15541] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 689.646618][T15541] CPU: 1 PID: 15541 Comm: syz.1.5019 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 689.656335][T15541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 689.666230][T15541] Call Trace: [ 689.669349][T15541] [ 689.672129][T15541] dump_stack_lvl+0x151/0x1b7 [ 689.676641][T15541] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 689.681938][T15541] dump_stack+0x15/0x1e [ 689.685934][T15541] should_fail_ex+0x3d0/0x520 [ 689.690443][T15541] should_fail+0xb/0x10 [ 689.694434][T15541] should_fail_usercopy+0x1a/0x20 [ 689.699296][T15541] _copy_from_user+0x1e/0xc0 [ 689.703719][T15541] __sys_bpf+0x23b/0x7f0 [ 689.707798][T15541] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 689.713014][T15541] ? fpregs_restore_userregs+0x130/0x290 [ 689.718476][T15541] __x64_sys_bpf+0x7c/0x90 [ 689.722727][T15541] x64_sys_call+0x87f/0x9a0 [ 689.727067][T15541] do_syscall_64+0x3b/0xb0 [ 689.731320][T15541] ? clear_bhb_loop+0x55/0xb0 [ 689.735835][T15541] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 689.741560][T15541] RIP: 0033:0x7fcec0f7e719 [ 689.745814][T15541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 689.765260][T15541] RSP: 002b:00007fcec1da3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 689.773504][T15541] RAX: ffffffffffffffda RBX: 00007fcec1135f80 RCX: 00007fcec0f7e719 [ 689.781312][T15541] RDX: 0000000000000048 RSI: 0000000020000100 RDI: 0000000000000000 [ 689.789122][T15541] RBP: 00007fcec1da3090 R08: 0000000000000000 R09: 0000000000000000 [ 689.796942][T15541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 689.804748][T15541] R13: 0000000000000000 R14: 00007fcec1135f80 R15: 00007ffdc08a2038 [ 689.812563][T15541] [ 693.133753][T15620] device sit0 left promiscuous mode [ 693.230220][T15620] device sit0 entered promiscuous mode [ 699.371638][T15741] device sit0 left promiscuous mode [ 699.603049][T15747] device sit0 entered promiscuous mode [ 699.822483][T15759] device sit0 left promiscuous mode [ 699.864157][T15759] device sit0 entered promiscuous mode [ 702.737044][T15804] device sit0 left promiscuous mode [ 702.842106][T15806] device sit0 entered promiscuous mode [ 707.106408][T15881] device sit0 left promiscuous mode [ 707.252416][T15882] device sit0 entered promiscuous mode [ 708.346159][T15907] device sit0 left promiscuous mode [ 708.419883][T15913] device sit0 entered promiscuous mode [ 711.071308][T15939] device sit0 left promiscuous mode [ 711.309083][T15946] device sit0 entered promiscuous mode [ 711.571919][T15949] device sit0 entered promiscuous mode [ 712.027467][T15975] device sit0 left promiscuous mode [ 712.319844][T15971] device sit0 entered promiscuous mode [ 713.826627][T16002] device sit0 left promiscuous mode [ 713.999313][T16011] device sit0 entered promiscuous mode [ 717.521308][T16105] device pim6reg1 entered promiscuous mode [ 718.432985][T16136] device sit0 left promiscuous mode [ 718.615738][T16140] device sit0 entered promiscuous mode [ 721.164094][T16197] device sit0 left promiscuous mode [ 721.274159][T16194] device sit0 entered promiscuous mode [ 721.780020][T16214] device sit0 left promiscuous mode [ 723.289761][T16251] device sit0 left promiscuous mode [ 723.428404][T16257] device sit0 entered promiscuous mode [ 723.774823][T16260] device sit0 left promiscuous mode [ 729.436613][T16394] device sit0 left promiscuous mode [ 734.114974][T16464] device vxcan1 entered promiscuous mode [ 734.344117][T16474] device sit0 left promiscuous mode [ 736.026852][T16507] FAULT_INJECTION: forcing a failure. [ 736.026852][T16507] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 736.295484][T16507] CPU: 0 PID: 16507 Comm: syz.0.5345 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 736.305211][T16507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 736.315104][T16507] Call Trace: [ 736.318228][T16507] [ 736.321004][T16507] dump_stack_lvl+0x151/0x1b7 [ 736.325519][T16507] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 736.330818][T16507] ? kvmalloc_node+0x26c/0x640 [ 736.335415][T16507] dump_stack+0x15/0x1e [ 736.339410][T16507] should_fail_ex+0x3d0/0x520 [ 736.343927][T16507] should_fail+0xb/0x10 [ 736.347916][T16507] should_fail_usercopy+0x1a/0x20 [ 736.352771][T16507] _copy_from_user+0x1e/0xc0 [ 736.357220][T16507] btf_new_fd+0x31a/0x7c0 [ 736.361367][T16507] bpf_btf_load+0x6f/0x90 [ 736.365533][T16507] __sys_bpf+0x586/0x7f0 [ 736.369613][T16507] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 736.374821][T16507] ? __ia32_sys_read+0x90/0x90 [ 736.379419][T16507] ? debug_smp_processor_id+0x17/0x20 [ 736.384627][T16507] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 736.390532][T16507] __x64_sys_bpf+0x7c/0x90 [ 736.394779][T16507] x64_sys_call+0x87f/0x9a0 [ 736.399120][T16507] do_syscall_64+0x3b/0xb0 [ 736.403373][T16507] ? clear_bhb_loop+0x55/0xb0 [ 736.407885][T16507] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 736.413612][T16507] RIP: 0033:0x7fc35117e719 [ 736.417865][T16507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 736.437308][T16507] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 736.445554][T16507] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 736.453364][T16507] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 736.461189][T16507] RBP: 00007fc351ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 736.468988][T16507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 736.476802][T16507] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 736.484617][T16507] [ 744.327758][T16643] device vxcan1 entered promiscuous mode [ 745.258492][T16676] FAULT_INJECTION: forcing a failure. [ 745.258492][T16676] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 745.489923][T16676] CPU: 0 PID: 16676 Comm: syz.0.5404 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 745.499645][T16676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 745.509540][T16676] Call Trace: [ 745.512662][T16676] [ 745.515443][T16676] dump_stack_lvl+0x151/0x1b7 [ 745.519956][T16676] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 745.525251][T16676] dump_stack+0x15/0x1e [ 745.529240][T16676] should_fail_ex+0x3d0/0x520 [ 745.533754][T16676] should_fail+0xb/0x10 [ 745.537745][T16676] should_fail_usercopy+0x1a/0x20 [ 745.542605][T16676] _copy_from_user+0x1e/0xc0 [ 745.547034][T16676] get_user_ifreq+0xd5/0x230 [ 745.551464][T16676] sock_ioctl+0x60d/0x740 [ 745.555630][T16676] ? sock_poll+0x400/0x400 [ 745.559878][T16676] ? __fget_files+0x2cb/0x330 [ 745.564395][T16676] ? security_file_ioctl+0x84/0xb0 [ 745.569340][T16676] ? sock_poll+0x400/0x400 [ 745.573593][T16676] __se_sys_ioctl+0x114/0x190 [ 745.578107][T16676] __x64_sys_ioctl+0x7b/0x90 [ 745.582542][T16676] x64_sys_call+0x98/0x9a0 [ 745.586784][T16676] do_syscall_64+0x3b/0xb0 [ 745.591034][T16676] ? clear_bhb_loop+0x55/0xb0 [ 745.595550][T16676] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 745.601279][T16676] RIP: 0033:0x7fc35117e719 [ 745.605532][T16676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 745.624974][T16676] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 745.633216][T16676] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 745.641029][T16676] RDX: 0000000020000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 745.648842][T16676] RBP: 00007fc351ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 745.656653][T16676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 745.664490][T16676] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 745.672279][T16676] [ 749.193300][T16706] device vxcan1 entered promiscuous mode [ 749.386266][T16723] device sit0 left promiscuous mode [ 751.954707][T16782] FAULT_INJECTION: forcing a failure. [ 751.954707][T16782] name failslab, interval 1, probability 0, space 0, times 0 [ 752.072365][T16782] CPU: 1 PID: 16782 Comm: syz.0.5440 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 752.082190][T16782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 752.092077][T16782] Call Trace: [ 752.095195][T16782] [ 752.097979][T16782] dump_stack_lvl+0x151/0x1b7 [ 752.102487][T16782] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 752.107779][T16782] ? __kmalloc+0xb4/0x1e0 [ 752.111946][T16782] ? qdisc_create_dflt+0x144/0x3e0 [ 752.116900][T16782] ? dev_activate+0x159/0x1130 [ 752.121495][T16782] ? __dev_open+0x3c7/0x4e0 [ 752.125834][T16782] ? dev_change_flags+0x8c/0x1a0 [ 752.130606][T16782] ? dev_ifsioc+0x177/0x1150 [ 752.135035][T16782] ? dev_ioctl+0x543/0xe60 [ 752.139369][T16782] ? sock_do_ioctl+0x26b/0x450 [ 752.143977][T16782] dump_stack+0x15/0x1e [ 752.147970][T16782] should_fail_ex+0x3d0/0x520 [ 752.152482][T16782] ? qdisc_alloc+0x7a/0x780 [ 752.156820][T16782] __should_failslab+0xaf/0xf0 [ 752.161420][T16782] should_failslab+0x9/0x20 [ 752.165759][T16782] __kmem_cache_alloc_node+0x3d/0x250 [ 752.170964][T16782] ? qdisc_alloc+0x7a/0x780 [ 752.175301][T16782] __kmalloc_node+0xa3/0x1e0 [ 752.179733][T16782] qdisc_alloc+0x7a/0x780 [ 752.183899][T16782] ? try_module_get+0x12a/0x290 [ 752.188584][T16782] qdisc_create_dflt+0x6b/0x3e0 [ 752.193272][T16782] mq_init+0x2c8/0x6b0 [ 752.197182][T16782] ? trace_net_dev_xmit_timeout+0x140/0x140 [ 752.202906][T16782] ? __kasan_check_write+0x14/0x20 [ 752.207851][T16782] ? qdisc_alloc+0x5a0/0x780 [ 752.212279][T16782] ? tun_device_event+0x3e5/0xf80 [ 752.217138][T16782] qdisc_create_dflt+0x144/0x3e0 [ 752.221910][T16782] ? _raw_spin_lock+0xa4/0x1b0 [ 752.226514][T16782] dev_activate+0x159/0x1130 [ 752.230937][T16782] ? __local_bh_enable_ip+0x58/0x80 [ 752.235971][T16782] ? _raw_spin_unlock_bh+0x50/0x60 [ 752.240921][T16782] ? dev_set_rx_mode+0x249/0x2d0 [ 752.245693][T16782] __dev_open+0x3c7/0x4e0 [ 752.249859][T16782] ? dev_open+0x260/0x260 [ 752.254024][T16782] ? _raw_spin_unlock_bh+0x50/0x60 [ 752.258974][T16782] ? dev_set_rx_mode+0x249/0x2d0 [ 752.263745][T16782] ? __kasan_check_read+0x11/0x20 [ 752.268608][T16782] __dev_change_flags+0x1db/0x6e0 [ 752.273469][T16782] ? avc_denied+0x1b0/0x1b0 [ 752.277814][T16782] ? dev_get_flags+0x1e0/0x1e0 [ 752.282407][T16782] ? kstrtouint+0xf6/0x180 [ 752.286660][T16782] dev_change_flags+0x8c/0x1a0 [ 752.291263][T16782] dev_ifsioc+0x177/0x1150 [ 752.295515][T16782] ? dev_ioctl+0xe60/0xe60 [ 752.299765][T16782] ? __kasan_check_write+0x14/0x20 [ 752.304713][T16782] ? mutex_lock+0xb1/0x1e0 [ 752.308968][T16782] ? bit_wait_io_timeout+0x120/0x120 [ 752.314089][T16782] dev_ioctl+0x543/0xe60 [ 752.318169][T16782] sock_do_ioctl+0x26b/0x450 [ 752.322590][T16782] ? has_cap_mac_admin+0x3c0/0x3c0 [ 752.327550][T16782] ? sock_show_fdinfo+0xa0/0xa0 [ 752.332229][T16782] ? selinux_file_ioctl+0x3cc/0x540 [ 752.337259][T16782] sock_ioctl+0x455/0x740 [ 752.341425][T16782] ? sock_poll+0x400/0x400 [ 752.345679][T16782] ? __fget_files+0x2cb/0x330 [ 752.350193][T16782] ? security_file_ioctl+0x84/0xb0 [ 752.355141][T16782] ? sock_poll+0x400/0x400 [ 752.359394][T16782] __se_sys_ioctl+0x114/0x190 [ 752.363906][T16782] __x64_sys_ioctl+0x7b/0x90 [ 752.368332][T16782] x64_sys_call+0x98/0x9a0 [ 752.372582][T16782] do_syscall_64+0x3b/0xb0 [ 752.376834][T16782] ? clear_bhb_loop+0x55/0xb0 [ 752.381350][T16782] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 752.387079][T16782] RIP: 0033:0x7fc35117e719 [ 752.391332][T16782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 752.410774][T16782] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 752.419019][T16782] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 752.426829][T16782] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000009 [ 752.434640][T16782] RBP: 00007fc351ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 752.442452][T16782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 752.450261][T16782] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 752.458175][T16782] [ 752.482582][T16782] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 752.492806][T16782] device syzkaller0 entered promiscuous mode [ 764.042217][T17032] FAULT_INJECTION: forcing a failure. [ 764.042217][T17032] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 764.060148][T17032] CPU: 0 PID: 17032 Comm: syz.2.5519 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 764.069870][T17032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 764.079768][T17032] Call Trace: [ 764.082890][T17032] [ 764.085663][T17032] dump_stack_lvl+0x151/0x1b7 [ 764.090179][T17032] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 764.095477][T17032] ? __kasan_check_read+0x11/0x20 [ 764.100334][T17032] dump_stack+0x15/0x1e [ 764.104329][T17032] should_fail_ex+0x3d0/0x520 [ 764.108845][T17032] should_fail+0xb/0x10 [ 764.112833][T17032] should_fail_usercopy+0x1a/0x20 [ 764.117693][T17032] _copy_from_user+0x1e/0xc0 [ 764.122118][T17032] ip_tunnel_siocdevprivate+0xa3/0x1c0 [ 764.127414][T17032] ? ip_tunnel_update+0xc40/0xc40 [ 764.132270][T17032] ? full_name_hash+0x9d/0xf0 [ 764.136786][T17032] dev_ifsioc+0xd40/0x1150 [ 764.141037][T17032] ? ioctl_has_perm+0x3f0/0x560 [ 764.145724][T17032] ? dev_ioctl+0xe60/0xe60 [ 764.149977][T17032] ? __mutex_lock_slowpath+0xe/0x10 [ 764.155012][T17032] ? mutex_lock+0x130/0x1e0 [ 764.159351][T17032] ? bit_wait_io_timeout+0x120/0x120 [ 764.164474][T17032] dev_ioctl+0x5e9/0xe60 [ 764.168551][T17032] sock_ioctl+0x665/0x740 [ 764.172716][T17032] ? sock_poll+0x400/0x400 [ 764.176968][T17032] ? __fget_files+0x2cb/0x330 [ 764.181486][T17032] ? security_file_ioctl+0x84/0xb0 [ 764.186430][T17032] ? sock_poll+0x400/0x400 [ 764.190681][T17032] __se_sys_ioctl+0x114/0x190 [ 764.195198][T17032] __x64_sys_ioctl+0x7b/0x90 [ 764.199624][T17032] x64_sys_call+0x98/0x9a0 [ 764.203874][T17032] do_syscall_64+0x3b/0xb0 [ 764.208127][T17032] ? clear_bhb_loop+0x55/0xb0 [ 764.212643][T17032] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 764.218368][T17032] RIP: 0033:0x7f8d4237e719 [ 764.222621][T17032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 764.242063][T17032] RSP: 002b:00007f8d430e5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 764.250307][T17032] RAX: ffffffffffffffda RBX: 00007f8d42535f80 RCX: 00007f8d4237e719 [ 764.258120][T17032] RDX: 0000000020000080 RSI: 00000000000089f2 RDI: 0000000000000004 [ 764.265931][T17032] RBP: 00007f8d430e5090 R08: 0000000000000000 R09: 0000000000000000 [ 764.273741][T17032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 764.281553][T17032] R13: 0000000000000000 R14: 00007f8d42535f80 R15: 00007ffd2fc76c88 [ 764.289371][T17032] [ 769.940937][T17157] device pim6reg1 entered promiscuous mode [ 776.214152][T17262] device pim6reg1 entered promiscuous mode [ 793.331888][T17623] FAULT_INJECTION: forcing a failure. [ 793.331888][T17623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 793.435924][T17623] CPU: 1 PID: 17623 Comm: syz.0.5708 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 793.445653][T17623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 793.455807][T17623] Call Trace: [ 793.458929][T17623] [ 793.461707][T17623] dump_stack_lvl+0x151/0x1b7 [ 793.466223][T17623] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 793.471524][T17623] dump_stack+0x15/0x1e [ 793.475508][T17623] should_fail_ex+0x3d0/0x520 [ 793.480025][T17623] should_fail+0xb/0x10 [ 793.484013][T17623] should_fail_usercopy+0x1a/0x20 [ 793.488872][T17623] _copy_to_user+0x1e/0x90 [ 793.493131][T17623] generic_map_lookup_batch+0x778/0xcc0 [ 793.498511][T17623] ? bpf_map_update_value+0x410/0x410 [ 793.503715][T17623] ? bpf_map_do_batch+0x99/0x630 [ 793.508489][T17623] ? bpf_map_update_value+0x410/0x410 [ 793.513706][T17623] bpf_map_do_batch+0x2e2/0x630 [ 793.518392][T17623] __sys_bpf+0x66b/0x7f0 [ 793.522461][T17623] ? clockevents_program_event+0x22f/0x300 [ 793.528106][T17623] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 793.533314][T17623] ? __sched_clock_gtod_offset+0x100/0x100 [ 793.538956][T17623] ? debug_smp_processor_id+0x17/0x20 [ 793.544163][T17623] __x64_sys_bpf+0x7c/0x90 [ 793.548412][T17623] x64_sys_call+0x87f/0x9a0 [ 793.552781][T17623] do_syscall_64+0x3b/0xb0 [ 793.557009][T17623] ? clear_bhb_loop+0x55/0xb0 [ 793.561521][T17623] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 793.567247][T17623] RIP: 0033:0x7fc35117e719 [ 793.571500][T17623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 793.590943][T17623] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 793.599184][T17623] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 793.606996][T17623] RDX: 0000000000000038 RSI: 0000000020000480 RDI: 0000000000000018 [ 793.614818][T17623] RBP: 00007fc351ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 793.622621][T17623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 793.630430][T17623] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 793.638248][T17623] [ 796.164387][T17673] FAULT_INJECTION: forcing a failure. [ 796.164387][T17673] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 796.177640][T17673] CPU: 0 PID: 17673 Comm: syz.2.5726 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 796.187350][T17673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 796.197246][T17673] Call Trace: [ 796.200375][T17673] [ 796.203148][T17673] dump_stack_lvl+0x151/0x1b7 [ 796.207664][T17673] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 796.212963][T17673] ? irqentry_exit+0x30/0x40 [ 796.217381][T17673] dump_stack+0x15/0x1e [ 796.221375][T17673] should_fail_ex+0x3d0/0x520 [ 796.225886][T17673] should_fail+0xb/0x10 [ 796.229880][T17673] should_fail_usercopy+0x1a/0x20 [ 796.234741][T17673] _copy_to_user+0x1e/0x90 [ 796.238997][T17673] generic_map_lookup_batch+0x778/0xcc0 [ 796.244376][T17673] ? bpf_map_update_value+0x410/0x410 [ 796.249584][T17673] ? __fdget+0x1b7/0x240 [ 796.253666][T17673] ? bpf_map_update_value+0x410/0x410 [ 796.258869][T17673] bpf_map_do_batch+0x2e2/0x630 [ 796.263559][T17673] __sys_bpf+0x66b/0x7f0 [ 796.267636][T17673] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 796.272845][T17673] ? __ia32_sys_read+0x90/0x90 [ 796.277446][T17673] ? debug_smp_processor_id+0x17/0x20 [ 796.282650][T17673] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 796.288555][T17673] __x64_sys_bpf+0x7c/0x90 [ 796.292809][T17673] x64_sys_call+0x87f/0x9a0 [ 796.297145][T17673] do_syscall_64+0x3b/0xb0 [ 796.301396][T17673] ? clear_bhb_loop+0x55/0xb0 [ 796.305912][T17673] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 796.311640][T17673] RIP: 0033:0x7f8d4237e719 [ 796.315890][T17673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 796.335337][T17673] RSP: 002b:00007f8d430e5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 796.343578][T17673] RAX: ffffffffffffffda RBX: 00007f8d42535f80 RCX: 00007f8d4237e719 [ 796.351388][T17673] RDX: 0000000000000038 RSI: 0000000020000480 RDI: 0000000000000018 [ 796.359204][T17673] RBP: 00007f8d430e5090 R08: 0000000000000000 R09: 0000000000000000 [ 796.367009][T17673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 796.374830][T17673] R13: 0000000000000000 R14: 00007f8d42535f80 R15: 00007ffd2fc76c88 [ 796.382643][T17673] [ 800.102088][T17742] bridge0: port 1(bridge_slave_0) entered blocking state [ 800.159281][T17742] bridge0: port 1(bridge_slave_0) entered disabled state [ 800.266064][T17742] device bridge_slave_0 entered promiscuous mode [ 800.442330][T17742] bridge0: port 2(bridge_slave_1) entered blocking state [ 800.494582][T17742] bridge0: port 2(bridge_slave_1) entered disabled state [ 800.615735][T17742] device bridge_slave_1 entered promiscuous mode [ 801.735624][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 801.756653][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 801.901775][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 801.934106][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 802.003737][T15332] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.010610][T15332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.140325][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 802.211769][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 802.283853][T15332] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.290736][T15332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.420318][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 803.284640][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 803.294791][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 803.302665][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 803.311251][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 803.337751][T17819] device veth1_macvtap left promiscuous mode [ 803.437705][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 803.466584][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 803.530386][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 803.571577][T17742] device veth0_vlan entered promiscuous mode [ 803.627584][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 803.640191][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 803.658577][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 803.705516][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 803.774503][T17742] device veth1_macvtap entered promiscuous mode [ 803.790876][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 803.799138][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 803.807376][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 803.892161][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 803.922561][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 803.944963][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 803.964738][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 805.610213][T17888] device veth0_vlan left promiscuous mode [ 805.623303][T17888] device veth0_vlan entered promiscuous mode [ 805.681761][ T2174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 805.711310][ T2174] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 805.770078][ T28] audit: type=1400 audit(1731553469.708:167): avc: denied { create } for pid=17891 comm="syz.3.5801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 805.789781][ T2174] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 806.220163][T17919] device pim6reg1 entered promiscuous mode [ 806.574975][T17919] FAULT_INJECTION: forcing a failure. [ 806.574975][T17919] name failslab, interval 1, probability 0, space 0, times 0 [ 806.687088][T17919] CPU: 0 PID: 17919 Comm: syz.2.5811 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 806.696815][T17919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 806.706709][T17919] Call Trace: [ 806.709830][T17919] [ 806.712612][T17919] dump_stack_lvl+0x151/0x1b7 [ 806.717121][T17919] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 806.722417][T17919] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 806.728242][T17919] dump_stack+0x15/0x1e [ 806.732230][T17919] should_fail_ex+0x3d0/0x520 [ 806.736742][T17919] ? __alloc_skb+0xcc/0x2d0 [ 806.741085][T17919] __should_failslab+0xaf/0xf0 [ 806.745683][T17919] should_failslab+0x9/0x20 [ 806.750022][T17919] kmem_cache_alloc_node+0x3e/0x2d0 [ 806.755059][T17919] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 806.760701][T17919] __alloc_skb+0xcc/0x2d0 [ 806.764866][T17919] ? __kasan_check_read+0x11/0x20 [ 806.769728][T17919] __ipv6_ifa_notify+0x2e1/0x11a0 [ 806.774590][T17919] ? snmp6_fill_stats+0x7c0/0x7c0 [ 806.779445][T17919] ? __kasan_check_write+0x14/0x20 [ 806.784390][T17919] ? try_to_grab_pending+0x1de/0x5d0 [ 806.789515][T17919] ? mod_delayed_work_on+0x190/0x190 [ 806.794637][T17919] ? neigh_ifdown+0x1f/0x30 [ 806.798974][T17919] ? __kasan_check_write+0x14/0x20 [ 806.803922][T17919] ? __kasan_check_write+0x14/0x20 [ 806.808867][T17919] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 806.813732][T17919] addrconf_ifdown+0xe51/0x1ab0 [ 806.818506][T17919] ? addrconf_cleanup+0x140/0x140 [ 806.823358][T17919] ? mutex_unlock+0xb2/0x260 [ 806.827786][T17919] ? __mutex_lock_slowpath+0x10/0x10 [ 806.832909][T17919] ? nf_nat_masq_schedule+0x600/0x600 [ 806.838113][T17919] ? masq_device_event+0xd0/0xd0 [ 806.842889][T17919] addrconf_notify+0x32f/0xe10 [ 806.847488][T17919] ? ip6mr_device_event+0x1e3/0x210 [ 806.852524][T17919] raw_notifier_call_chain+0x8c/0xf0 [ 806.857647][T17919] dev_close_many+0x37c/0x530 [ 806.862157][T17919] ? __dev_open+0x4e0/0x4e0 [ 806.866497][T17919] ? __kasan_check_read+0x11/0x20 [ 806.871355][T17919] unregister_netdevice_many+0x4d1/0x1730 [ 806.876912][T17919] ? add_timer+0x68/0x80 [ 806.880990][T17919] ? alloc_netdev_mqs+0xf90/0xf90 [ 806.885853][T17919] ? __queue_delayed_work+0x16d/0x1f0 [ 806.891056][T17919] ? queue_delayed_work_on+0x13f/0x180 [ 806.896351][T17919] ? linkwatch_fire_event+0x1e4/0x240 [ 806.901563][T17919] ? __kasan_check_read+0x11/0x20 [ 806.906420][T17919] unregister_netdevice_queue+0x2e6/0x350 [ 806.911977][T17919] ? list_netdevice+0x710/0x710 [ 806.916663][T17919] ? linkwatch_fire_event+0x211/0x240 [ 806.921870][T17919] __tun_detach+0xd14/0x1510 [ 806.926298][T17919] ? bit_wait_io_timeout+0x120/0x120 [ 806.931421][T17919] tun_chr_close+0x92/0x140 [ 806.935758][T17919] ? tun_chr_open+0x530/0x530 [ 806.940268][T17919] __fput+0x1e5/0x870 [ 806.944090][T17919] ____fput+0x15/0x20 [ 806.947906][T17919] task_work_run+0x24d/0x2e0 [ 806.952337][T17919] ? task_work_cancel+0x2e0/0x2e0 [ 806.957194][T17919] ? filp_close+0x105/0x150 [ 806.961540][T17919] exit_to_user_mode_loop+0x94/0xa0 [ 806.966570][T17919] exit_to_user_mode_prepare+0x5a/0xa0 [ 806.971861][T17919] syscall_exit_to_user_mode+0x26/0x130 [ 806.977242][T17919] do_syscall_64+0x47/0xb0 [ 806.981494][T17919] ? clear_bhb_loop+0x55/0xb0 [ 806.986008][T17919] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 806.991736][T17919] RIP: 0033:0x7f8d4237e719 [ 806.995990][T17919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 807.015433][T17919] RSP: 002b:00007f8d430e5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 807.023678][T17919] RAX: 0000000000000000 RBX: 00007f8d42535f80 RCX: 00007f8d4237e719 [ 807.031489][T17919] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 807.039301][T17919] RBP: 00007f8d430e5090 R08: 0000000000000000 R09: 0000000000000000 [ 807.047119][T17919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 807.054940][T17919] R13: 0000000000000000 R14: 00007f8d42535f80 R15: 00007ffd2fc76c88 [ 807.062744][T17919] [ 808.581406][T17951] device syzkaller0 entered promiscuous mode [ 815.019036][T18035] device veth0_vlan left promiscuous mode [ 815.150736][T18035] device veth0_vlan entered promiscuous mode [ 818.236737][T18084] device veth1_macvtap left promiscuous mode [ 818.266585][T18084] device macsec0 entered promiscuous mode [ 818.558423][T18089] device veth1_macvtap entered promiscuous mode [ 818.597066][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 819.571884][T18126] device pim6reg1 entered promiscuous mode [ 821.658602][T18169] device veth1_macvtap entered promiscuous mode [ 821.668018][T18169] device macsec0 entered promiscuous mode [ 821.683717][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 823.277013][T18196] device pim6reg1 entered promiscuous mode [ 823.938784][T18215] device macsec0 entered promiscuous mode [ 824.011478][T18211] device veth1_macvtap entered promiscuous mode [ 824.198741][T18222] tun0: tun_chr_ioctl cmd 1074025675 [ 824.203858][T18222] tun0: persist enabled [ 827.311462][T18272] device macsec0 entered promiscuous mode [ 827.514744][T18272] device veth1_macvtap entered promiscuous mode [ 827.999952][T18286] device pim6reg1 entered promiscuous mode [ 831.976877][T18358] device pim6reg1 entered promiscuous mode [ 833.677726][T18392] device bridge_slave_1 left promiscuous mode [ 833.757889][T18392] bridge0: port 2(bridge_slave_1) entered disabled state [ 833.940454][T18392] device bridge_slave_0 left promiscuous mode [ 833.961778][T18392] bridge0: port 1(bridge_slave_0) entered disabled state [ 834.283285][T18401] bridge0: port 1(bridge_slave_0) entered blocking state [ 834.290203][T18401] bridge0: port 1(bridge_slave_0) entered disabled state [ 834.297616][T18401] device bridge_slave_0 entered promiscuous mode [ 834.306320][T18401] bridge0: port 2(bridge_slave_1) entered blocking state [ 834.313218][T18401] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.320875][T18401] device bridge_slave_1 entered promiscuous mode [ 835.054442][T18401] bridge0: port 2(bridge_slave_1) entered blocking state [ 835.061332][T18401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 835.068431][T18401] bridge0: port 1(bridge_slave_0) entered blocking state [ 835.075191][T18401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 835.267723][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.296379][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.479508][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 835.526653][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 835.594429][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 835.666771][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 835.735917][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 835.742799][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 835.876435][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 835.974631][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 836.065170][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 836.072064][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 836.259026][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 836.267680][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 836.275510][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 836.283784][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 836.308522][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 836.317604][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 836.329190][T18401] device veth0_vlan entered promiscuous mode [ 836.336573][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 836.347838][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 836.357523][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 836.364735][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 836.374825][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 836.382904][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 836.394634][T18401] device veth1_macvtap entered promiscuous mode [ 836.404299][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 836.411783][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 836.419865][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 836.430406][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 836.438719][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 836.600068][ T315] device bridge_slave_1 left promiscuous mode [ 836.606023][ T315] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.690413][ T315] device bridge_slave_0 left promiscuous mode [ 836.736487][ T315] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.826652][ T315] device veth1_macvtap left promiscuous mode [ 836.900696][ T315] device veth0_vlan left promiscuous mode [ 837.604235][T18473] device pim6reg1 entered promiscuous mode [ 837.966694][T18479] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.017376][T18479] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.129821][T18479] device bridge_slave_0 entered promiscuous mode [ 838.361177][T18479] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.416544][T18479] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.433758][T18479] device bridge_slave_1 entered promiscuous mode [ 838.892355][T18504] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.903180][T18504] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.058382][T18509] device bridge_slave_1 left promiscuous mode [ 839.111002][T18509] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.196580][T18509] device bridge_slave_0 left promiscuous mode [ 839.243798][T18509] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.990813][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 839.998489][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 840.005975][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 840.014783][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 840.023351][T15332] bridge0: port 1(bridge_slave_0) entered blocking state [ 840.030225][T15332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 840.037788][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 840.045995][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 840.054499][T15332] bridge0: port 2(bridge_slave_1) entered blocking state [ 840.061368][T15332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 840.193850][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 840.235597][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 840.250997][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 840.259419][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 840.316063][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 840.344713][T18537] device wg2 entered promiscuous mode [ 840.354259][T18535] device wg2 left promiscuous mode [ 840.380992][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 840.397685][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 840.530321][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 840.545195][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 840.593179][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 840.635108][T15332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 840.739994][T18479] device veth0_vlan entered promiscuous mode [ 840.912084][T18479] device veth1_macvtap entered promiscuous mode [ 840.956857][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 841.046507][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 841.127375][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 841.159193][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 841.186906][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 841.248225][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 841.270062][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 841.478788][ T315] device veth1_macvtap left promiscuous mode [ 841.818196][T18566] FAULT_INJECTION: forcing a failure. [ 841.818196][T18566] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 841.845126][T18566] CPU: 1 PID: 18566 Comm: syz.5.6003 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 841.854870][T18566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 841.864751][T18566] Call Trace: [ 841.867870][T18566] [ 841.870646][T18566] dump_stack_lvl+0x151/0x1b7 [ 841.875161][T18566] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 841.880457][T18566] ? vfs_write+0x952/0xed0 [ 841.884712][T18566] ? __kasan_slab_free+0x11/0x20 [ 841.889483][T18566] dump_stack+0x15/0x1e [ 841.893477][T18566] should_fail_ex+0x3d0/0x520 [ 841.897993][T18566] should_fail+0xb/0x10 [ 841.901977][T18566] should_fail_usercopy+0x1a/0x20 [ 841.906838][T18566] _copy_from_user+0x1e/0xc0 [ 841.911270][T18566] __sys_bpf+0x23b/0x7f0 [ 841.915344][T18566] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 841.920562][T18566] ? __ia32_sys_read+0x90/0x90 [ 841.925150][T18566] ? debug_smp_processor_id+0x17/0x20 [ 841.930356][T18566] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 841.936261][T18566] __x64_sys_bpf+0x7c/0x90 [ 841.940511][T18566] x64_sys_call+0x87f/0x9a0 [ 841.944875][T18566] do_syscall_64+0x3b/0xb0 [ 841.949105][T18566] ? clear_bhb_loop+0x55/0xb0 [ 841.953621][T18566] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 841.959347][T18566] RIP: 0033:0x7f63f6b7e719 [ 841.963597][T18566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 841.983038][T18566] RSP: 002b:00007f63f79e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 841.991283][T18566] RAX: ffffffffffffffda RBX: 00007f63f6d35f80 RCX: 00007f63f6b7e719 [ 841.999094][T18566] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 842.006909][T18566] RBP: 00007f63f79e2090 R08: 0000000000000000 R09: 0000000000000000 [ 842.014722][T18566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 842.022530][T18566] R13: 0000000000000000 R14: 00007f63f6d35f80 R15: 00007ffd2781aa68 [ 842.030349][T18566] [ 842.070754][T18548] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.083047][T18548] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.205293][T18556] device bridge_slave_1 left promiscuous mode [ 842.254773][T18556] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.440467][T18556] device bridge_slave_0 left promiscuous mode [ 842.517125][T18556] bridge0: port 1(bridge_slave_0) entered disabled state [ 843.507649][T18591] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.664047][T18591] bridge0: port 1(bridge_slave_0) entered disabled state [ 843.681819][T18591] device bridge_slave_0 entered promiscuous mode [ 843.758384][T18591] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.765271][T18591] bridge0: port 2(bridge_slave_1) entered disabled state [ 843.807610][T18591] device bridge_slave_1 entered promiscuous mode [ 843.817071][T18590] device veth0_vlan left promiscuous mode [ 843.868560][T18590] device veth0_vlan entered promiscuous mode [ 844.316342][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 844.323618][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 844.339501][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 844.347965][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 844.355960][ T2102] bridge0: port 1(bridge_slave_0) entered blocking state [ 844.362824][ T2102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 844.516526][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 844.575341][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 844.616146][ T2102] bridge0: port 2(bridge_slave_1) entered blocking state [ 844.623029][ T2102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 844.783037][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 844.799945][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 844.808139][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 844.855869][T18591] device veth0_vlan entered promiscuous mode [ 844.872703][T18591] device veth1_macvtap entered promiscuous mode [ 844.889598][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 844.908519][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 844.946620][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 844.962421][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 845.046775][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 845.206635][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 845.333904][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 845.363250][ T2102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 845.987778][T18633] bridge0: port 2(bridge_slave_1) entered disabled state [ 845.999269][T18633] bridge0: port 1(bridge_slave_0) entered disabled state [ 846.247506][T18640] device bridge_slave_1 left promiscuous mode [ 846.288198][T18640] bridge0: port 2(bridge_slave_1) entered disabled state [ 846.502515][T18640] device bridge_slave_0 left promiscuous mode [ 846.641549][T18640] bridge0: port 1(bridge_slave_0) entered disabled state [ 846.841637][T18639] device veth0_vlan left promiscuous mode [ 846.878879][T18639] device veth0_vlan entered promiscuous mode [ 846.984646][ T315] device veth1_macvtap left promiscuous mode [ 848.300273][T18695] bridge0: port 2(bridge_slave_1) entered disabled state [ 848.315550][T18695] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.914997][T18709] FAULT_INJECTION: forcing a failure. [ 848.914997][T18709] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 849.056519][T18709] CPU: 0 PID: 18709 Comm: syz.0.6044 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 849.066253][T18709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 849.076147][T18709] Call Trace: [ 849.079269][T18709] [ 849.082044][T18709] dump_stack_lvl+0x151/0x1b7 [ 849.086561][T18709] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 849.091852][T18709] ? stack_trace_save+0x1c0/0x1c0 [ 849.096710][T18709] ? kernel_text_address+0xa9/0xe0 [ 849.101660][T18709] dump_stack+0x15/0x1e [ 849.105652][T18709] should_fail_ex+0x3d0/0x520 [ 849.110165][T18709] should_fail+0xb/0x10 [ 849.114159][T18709] should_fail_usercopy+0x1a/0x20 [ 849.119107][T18709] _copy_from_iter+0x18d/0xe00 [ 849.123708][T18709] ? avc_denied+0x1b0/0x1b0 [ 849.128046][T18709] ? kstrtoull+0x1cd/0x2e0 [ 849.132299][T18709] ? copyout_mc+0x80/0x80 [ 849.136465][T18709] ? __kasan_check_write+0x14/0x20 [ 849.141409][T18709] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 849.146360][T18709] ? _raw_spin_lock_irqsave+0x210/0x210 [ 849.151741][T18709] copy_page_from_iter+0x1d7/0x2b0 [ 849.156687][T18709] pipe_write+0x7c1/0x1990 [ 849.160944][T18709] ? pipe_read+0x1040/0x1040 [ 849.165365][T18709] ? selinux_file_permission+0x440/0x560 [ 849.170851][T18709] ? fsnotify_perm+0x6a/0x5b0 [ 849.175357][T18709] vfs_write+0xaf6/0xed0 [ 849.179422][T18709] ? __kasan_slab_free+0x11/0x20 [ 849.184196][T18709] ? file_end_write+0x1c0/0x1c0 [ 849.188884][T18709] ? __fget_files+0x2cb/0x330 [ 849.193395][T18709] ? __fdget_pos+0x204/0x390 [ 849.197826][T18709] ? ksys_write+0x77/0x2c0 [ 849.202074][T18709] ksys_write+0x199/0x2c0 [ 849.206251][T18709] ? __this_cpu_preempt_check+0x13/0x20 [ 849.211622][T18709] ? __ia32_sys_read+0x90/0x90 [ 849.216226][T18709] ? debug_smp_processor_id+0x17/0x20 [ 849.221427][T18709] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 849.227333][T18709] __x64_sys_write+0x7b/0x90 [ 849.231758][T18709] x64_sys_call+0x2f/0x9a0 [ 849.236011][T18709] do_syscall_64+0x3b/0xb0 [ 849.240264][T18709] ? clear_bhb_loop+0x55/0xb0 [ 849.244775][T18709] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 849.250503][T18709] RIP: 0033:0x7fc35117e719 [ 849.254757][T18709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 849.274208][T18709] RSP: 002b:00007fc351ecd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 849.282448][T18709] RAX: ffffffffffffffda RBX: 00007fc351335f80 RCX: 00007fc35117e719 [ 849.290259][T18709] RDX: 000000000000fdef RSI: 00000000200004c0 RDI: 0000000000000000 [ 849.298069][T18709] RBP: 00007fc351ecd090 R08: 0000000000000000 R09: 0000000000000000 [ 849.305879][T18709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 849.313689][T18709] R13: 0000000000000000 R14: 00007fc351335f80 R15: 00007ffdc44b83d8 [ 849.321508][T18709] [ 852.367682][T18750] device veth0_vlan left promiscuous mode [ 852.402279][T18750] device veth0_vlan entered promiscuous mode [ 852.421571][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 852.480734][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 852.541459][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 852.704176][T18769] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 852.715726][T18769] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 852.723967][T18769] CPU: 0 PID: 18769 Comm: syz.3.6062 Not tainted 6.1.112-syzkaller-00011-g8ed9a61b544c #0 [ 852.733687][T18769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 852.743583][T18769] RIP: 0010:dev_map_enqueue+0x31/0x340 [ 852.748877][T18769] Code: 56 41 55 41 54 53 48 83 ec 18 48 89 55 c0 49 89 f7 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 e6 fb dd ff 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 90 65 25 00 4c 8b 33 48 83 c3 20 [ 852.768322][T18769] RSP: 0018:ffffc90000a575f8 EFLAGS: 00010246 [ 852.774222][T18769] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000040000 [ 852.782036][T18769] RDX: ffffc9000c631000 RSI: 000000000000070c RDI: 000000000000070d [ 852.789844][T18769] RBP: ffffc90000a57638 R08: ffffffff841451d2 R09: ffffffff841450f2 [ 852.797653][T18769] R10: 0000000000000004 R11: ffff88814fd13cc0 R12: dffffc0000000000 [ 852.805467][T18769] R13: 1ffff1103edc6e15 R14: 1ffff1103edc6e15 R15: ffff888118dbc070 [ 852.813279][T18769] FS: 00007fedbed426c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 852.822045][T18769] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 852.828465][T18769] CR2: 0000555565926808 CR3: 0000000115847000 CR4: 00000000003506b0 [ 852.836281][T18769] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 852.844090][T18769] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 852.851899][T18769] Call Trace: [ 852.855028][T18769] [ 852.857808][T18769] ? __die_body+0x62/0xb0 [ 852.861971][T18769] ? die_addr+0x9f/0xd0 [ 852.865962][T18769] ? exc_general_protection+0x317/0x4c0 [ 852.871357][T18769] ? asm_exc_general_protection+0x27/0x30 [ 852.876899][T18769] ? xdp_do_redirect_frame+0x1b2/0x800 [ 852.882190][T18769] ? xdp_do_redirect_frame+0x292/0x800 [ 852.887489][T18769] ? dev_map_enqueue+0x31/0x340 [ 852.892172][T18769] ? dev_map_enqueue+0x2a/0x340 [ 852.896865][T18769] xdp_do_redirect_frame+0x2b5/0x800 [ 852.901983][T18769] bpf_test_run_xdp_live+0xc30/0x1f70 [ 852.907192][T18769] ? __kasan_check_write+0x14/0x20 [ 852.912146][T18769] ? bpf_test_run_xdp_live+0x7ae/0x1f70 [ 852.917515][T18769] ? xdp_convert_md_to_buff+0x360/0x360 [ 852.922897][T18769] ? bpf_dispatcher_change_prog+0xd86/0xf10 [ 852.928631][T18769] ? 0xffffffffa00039c0 [ 852.932730][T18769] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 852.938796][T18769] ? __kasan_check_write+0x14/0x20 [ 852.943736][T18769] ? _copy_from_user+0x90/0xc0 [ 852.948341][T18769] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 852.953553][T18769] ? dev_put+0x80/0x80 [ 852.957454][T18769] ? __kasan_check_write+0x14/0x20 [ 852.962398][T18769] ? fput+0x15b/0x1b0 [ 852.966221][T18769] ? dev_put+0x80/0x80 [ 852.970124][T18769] bpf_prog_test_run+0x3b0/0x630 [ 852.974899][T18769] ? bpf_prog_query+0x260/0x260 [ 852.979590][T18769] ? selinux_bpf+0xd2/0x100 [ 852.983932][T18769] ? security_bpf+0x82/0xb0 [ 852.988264][T18769] __sys_bpf+0x59f/0x7f0 [ 852.992348][T18769] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 852.997647][T18769] ? fpregs_restore_userregs+0x130/0x290 [ 853.003108][T18769] __x64_sys_bpf+0x7c/0x90 [ 853.007362][T18769] x64_sys_call+0x87f/0x9a0 [ 853.011698][T18769] do_syscall_64+0x3b/0xb0 [ 853.015951][T18769] ? clear_bhb_loop+0x55/0xb0 [ 853.020465][T18769] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 853.026200][T18769] RIP: 0033:0x7fedbdf7e719 [ 853.030444][T18769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 853.049892][T18769] RSP: 002b:00007fedbed42038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 853.058138][T18769] RAX: ffffffffffffffda RBX: 00007fedbe135f80 RCX: 00007fedbdf7e719 [ 853.065945][T18769] RDX: 0000000000000050 RSI: 00000000200000c0 RDI: 000000000000000a [ 853.073757][T18769] RBP: 00007fedbdff175e R08: 0000000000000000 R09: 0000000000000000 [ 853.081572][T18769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 853.089380][T18769] R13: 0000000000000000 R14: 00007fedbe135f80 R15: 00007fff27875bf8 [ 853.097203][T18769] [ 853.100057][T18769] Modules linked in: [ 853.103865][T18769] ---[ end trace 0000000000000000 ]--- [ 853.109100][T18769] RIP: 0010:dev_map_enqueue+0x31/0x340 [ 853.114379][T18769] Code: 56 41 55 41 54 53 48 83 ec 18 48 89 55 c0 49 89 f7 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 e6 fb dd ff 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 90 65 25 00 4c 8b 33 48 83 c3 20 [ 853.133931][T18769] RSP: 0018:ffffc90000a575f8 EFLAGS: 00010246 [ 853.139820][T18769] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000040000 [ 853.147637][T18769] RDX: ffffc9000c631000 RSI: 000000000000070c RDI: 000000000000070d [ 853.155436][T18769] RBP: ffffc90000a57638 R08: ffffffff841451d2 R09: ffffffff841450f2 [ 853.163254][T18769] R10: 0000000000000004 R11: ffff88814fd13cc0 R12: dffffc0000000000 [ 853.171068][T18769] R13: 1ffff1103edc6e15 R14: 1ffff1103edc6e15 R15: ffff888118dbc070 [ 853.178877][T18769] FS: 00007fedbed426c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 853.187644][T18769] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 853.194051][T18769] CR2: 0000555565926808 CR3: 0000000115847000 CR4: 00000000003506b0 [ 853.201895][T18769] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 853.209692][T18769] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 853.217506][T18769] Kernel panic - not syncing: Fatal exception in interrupt [ 853.224763][T18769] Kernel Offset: disabled [ 853.228884][T18769] Rebooting in 86400 seconds..