last executing test programs: 30.48819326s ago: executing program 1 (id=1686): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000e1c50000047b8af8ff00000000bfa20300f6ff000007020000f8ffffffb703000008000000b704000000000001dc0000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000000), 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x7f, 0x1, 0xff, 0x5, 0x0, 0x2, 0x40010, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x5, @perf_bp={0x0, 0x2}, 0x198, 0xffffffff, 0x4, 0x0, 0x4d, 0x1, 0x1, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f00000001c0)=ANY=[], 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r7, &(0x7f0000000240), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8e9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x20, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 27.378163722s ago: executing program 1 (id=1686): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000e1c50000047b8af8ff00000000bfa20300f6ff000007020000f8ffffffb703000008000000b704000000000001dc0000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000000), 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x7f, 0x1, 0xff, 0x5, 0x0, 0x2, 0x40010, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x5, @perf_bp={0x0, 0x2}, 0x198, 0xffffffff, 0x4, 0x0, 0x4d, 0x1, 0x1, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f00000001c0)=ANY=[], 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r7, &(0x7f0000000240), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8e9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x20, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 20.514208934s ago: executing program 1 (id=1686): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000e1c50000047b8af8ff00000000bfa20300f6ff000007020000f8ffffffb703000008000000b704000000000001dc0000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000000), 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x7f, 0x1, 0xff, 0x5, 0x0, 0x2, 0x40010, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x5, @perf_bp={0x0, 0x2}, 0x198, 0xffffffff, 0x4, 0x0, 0x4d, 0x1, 0x1, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f00000001c0)=ANY=[], 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r7, &(0x7f0000000240), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8e9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x20, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 16.609895476s ago: executing program 1 (id=1686): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000e1c50000047b8af8ff00000000bfa20300f6ff000007020000f8ffffffb703000008000000b704000000000001dc0000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000000), 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x7f, 0x1, 0xff, 0x5, 0x0, 0x2, 0x40010, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x5, @perf_bp={0x0, 0x2}, 0x198, 0xffffffff, 0x4, 0x0, 0x4d, 0x1, 0x1, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f00000001c0)=ANY=[], 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r7, &(0x7f0000000240), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8e9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x20, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 11.709534522s ago: executing program 0 (id=1911): syz_clone(0x640c2500, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200200, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000040)=0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 11.083870841s ago: executing program 1 (id=1686): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000e1c50000047b8af8ff00000000bfa20300f6ff000007020000f8ffffffb703000008000000b704000000000001dc0000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000000), 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x7f, 0x1, 0xff, 0x5, 0x0, 0x2, 0x40010, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x5, @perf_bp={0x0, 0x2}, 0x198, 0xffffffff, 0x4, 0x0, 0x4d, 0x1, 0x1, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f00000001c0)=ANY=[], 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r7, &(0x7f0000000240), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8e9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x20, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 10.094970944s ago: executing program 0 (id=1914): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @union]}}, &(0x7f0000000f40)=""/4089, 0x32, 0xff9, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa8024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x100000, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000002c0)='rxrpc_tx_fail\x00', r4, 0x0, 0x44}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800"/15], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xbe41670bbff0fe7b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 6.620869861s ago: executing program 2 (id=1935): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @union]}}, &(0x7f0000000f40)=""/4089, 0x32, 0xff9, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa8024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x100000, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000002c0)='rxrpc_tx_fail\x00', r4, 0x0, 0x44}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800"/16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xbe41670bbff0fe7b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 6.292602905s ago: executing program 4 (id=1937): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x36, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x59, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_int(r3, &(0x7f0000000040)=0xff, 0x12) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xc, 0xd, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001e000000850000000700000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x11, &(0x7f0000000300)=@raw=[@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @jmp={0x5, 0x1, 0x0, 0x1, 0x3, 0x18, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x44, '\x00', r2, 0x0, r3, 0x8, &(0x7f00000006c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x3, 0x5, 0x6, 0x1}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000900)=[r4, r1, r1, 0xffffffffffffffff, r1, r1, r0, r1], &(0x7f0000000940)=[{0x2, 0x3, 0x3, 0x5}, {0x4, 0x3, 0x9, 0x9}], 0x10, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES16=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r6}, 0x3d) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r7}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x2fd7782f}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 6.280312846s ago: executing program 3 (id=1938): perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8faf, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000002500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000006d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000003c0)='signal_generate\x00', r1}, 0x40) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000001c0), 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000400)=0x9, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="0bdbf61a9c5f77ad6b6ccbe0774daa75dee6efb16717cac2d105f66452329c9db80fa0435d0d57e519fa8ac7fd701cb55848f4a805b54e5ad42d4f97fd02e5365f2416ea122cb424eda6963b54507efcca638a711e3568b4956aacfb676ad0fb49a719b913b38f06b37a39ae867f9a847f970691da08c1032fb241829ee0d1c626b9c74e0fca81a51e1f730ebc3868ed7479721b81482ebed42dad73959ff4d5b0af8027a6f6934a35f598948793b992eabc"], 0x6) 6.205938456s ago: executing program 4 (id=1939): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x3, 0x0, 0x0, 0x21780, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x4000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x15}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000001000", 0x0, 0x2e00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.19885748s ago: executing program 4 (id=1940): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.105090031s ago: executing program 3 (id=1941): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 5.092539542s ago: executing program 3 (id=1942): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000140), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r3, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x8000000}, 0x18) 4.934421844s ago: executing program 3 (id=1943): bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xd, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYRES8=0xffffffffffffffff, @ANYRES32, @ANYRESHEX=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x16, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1dc2bac2793b0e5e7dcebebb2d18ada5bb7f130f453269c096b7c445d9009a4ea213ef80a63555b2e7bb4e42fb4bf843d6a39e8f34bda6c1a8dfb594e9017cf46087500570da512f3b3c62a4b7adf0f01c1f87123e5b95be881688cd6fb0d2390a30b2af708e642b94d4e52c85d43c67ec628c2122888a2509341d556235cb9414c31fdeea25e6f996a9cac293fd13d8b01d69501e8c883862a71cb36e0d201d8d4d552f6bcfaf8f99f89a7fa6b062078400d68684aa3b2cca0d407d1daba4d878d9db", @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lsm=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYBLOB="95745d146baa04712b080a0ca033321d8fb363a4658a6bcde31bec26570f2cec6a1944292431bcc6a353b2f6bf5b86d69dd2dcac1bbdeb4d591ceda9494e0e21a5a7d2659851b20eaf8f066ff987cda470953d5e76d76c939be098164d44ce57db698ca7bb458e9afce4adf4e36c8293fe63b71b9eec085011486864df37db7d05379735df518673f755d1d9fb58e80b7855f1954b4e692e", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18020000000000000000", @ANYRESDEC=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 4.419457791s ago: executing program 4 (id=1944): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a000000070000000300000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 4.387359981s ago: executing program 4 (id=1945): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@enum64={0xe, 0x1, 0x0, 0x13, 0x1, 0x8, [{0xe, 0xe35, 0x80000001}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x10}}]}, {0x0, [0x2e]}}, &(0x7f00000001c0)=""/253, 0x4b, 0xfd, 0x0, 0x52f, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x13, &(0x7f0000000380)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0xfffffffffffffea3, 0x0, 0x0, 0x19, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4.325163222s ago: executing program 1 (id=1686): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000e1c50000047b8af8ff00000000bfa20300f6ff000007020000f8ffffffb703000008000000b704000000000001dc0000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000000), 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000f140000000000000000000000700000000000000c3e0ff000000000095000000d3031a00c60280024147659c645771867cc5c6cab8c59334fbafed8792efbd94eb93445cb263fb0e5f80c4ce528e24f4345b0d223a5373b4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x7f, 0x1, 0xff, 0x5, 0x0, 0x2, 0x40010, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x5, @perf_bp={0x0, 0x2}, 0x198, 0xffffffff, 0x4, 0x0, 0x4d, 0x1, 0x1, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f00000001c0)=ANY=[], 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r7, &(0x7f0000000240), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8e9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x20, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 2.99540417s ago: executing program 0 (id=1946): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 2.99397643s ago: executing program 2 (id=1947): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000e000000f4ff00000040af052b56e14b61080000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f9000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1e00000001000080050000000900000000200000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000003000000050000000200000000000000000000000000000051d2d2f6194489947f5ac3e7d48e40c6fff3631802244dc9069bf4d1de7f77890f159ef8a7dc74fb128a94cc74565be16c981869d588c5340ca13c7e296fe1474f54e0fdf6eec64fed369818b235b733ae20c6cc8a820d5d8337192d1bfc202be9200f88a5d4228cd3faf2f5606a5631e423e7435fff886f0bc9782d7cf49589ece0e534351457ad104e73e3287100dddaa6e7b0daf5007e7b14fd92e73c73f4c0657c790859d6"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r6, @ANYRESDEC=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRES64=r2, @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000c000008b700e8106e4f641bce85a62867df29000020000000950000000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000d0209be000000008000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r8, 0x0, 0x1000}, 0x18) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="020004ebffff0700000001000000800000000000387ed6b3ae1e9ef28562604788c911720b87561c8cbb83dd1a488cae760223c712fc0ef8ebeafa119bd02bca6c082f6d45260e95514a7af7a538c3b200fc6cdeeaf1bd2967456dd33d0a791ac0982dbbcb6608e88b7383178d2507aa0b3d7307a37d32496d180e6d9c5467bc45e1be998f444dcbbe339b5480263df74fe62be7bce53ccc39f7985fd7e517f0ec610f496ad91eeb45e5ab1f3f62d958884068", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00b10e3f926cae88000000000000000000000004005d000000", @ANYRES32=0x0, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000f50a64d2443880fdbf071a510747bed78b8eb41793a19d978bb3c583ffac85fba8e72f918bd34860e05ed32a536a0ba075aee2becb4fd2fcb0b69cf816df6016abe58e9e3144a34382ab12e16457e8f69628a11a627cb87de1ac259a63246901e068b1bf53c4838979deae7b745c8a2446e82a3bdf81b209b31dc28d540114a59e081aad7a964d285f1ffa44a2c37bd884b7ff22f7faaef1cccc752d292c5c3988e4ae02ae68cf4238fd87e4ceb0755ddf1235887675ddae5bf4d36e7b567f2bb4e26c7281a9e2fe9da5fb205a01ed03682bde572e"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r11}, 0x0, 0x0}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=ANY=[@ANYBLOB="180800007f000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70200001c000000b7030000000000008500000005000000bca900000000000035090100000000009500000000000000b702000004000000632af8ff00000000b509000000000000c3aaf8fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffc40200000800000018220000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080100000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r13}, 0x10) 2.9931826s ago: executing program 3 (id=1948): bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) bpf$ENABLE_STATS(0x20, &(0x7f0000000040), 0x4) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x14, 0x1e, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_fd={0x18, 0x1}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, @alu={0x7, 0x1, 0xc, 0x4, 0xa, 0x100, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0xc04}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x7ff, 0xb2, &(0x7f0000000200)=""/178, 0x41000, 0x5, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x1, 0x6, 0x6}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2c, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r0, 0x0, 0x74, 0x77, &(0x7f00000003c0)="a6c0ab1f8457c12260d5f56987151a0b24f80e9e9fb95aa9dda83e8e2d63d58d9aebb3959200a427f8c1f1bbebca4af0885030013871945f77e149f30583f4ffe0cbe8156ce47dfa486c4e892fda19f46ad18c9d3c9b77b7842a74c256c428424bc49d761e20f0d7baa74c1b9c68f83da00b053c", &(0x7f0000000440)=""/119, 0x3, 0x0, 0xe9, 0xf2, &(0x7f00000004c0)="8ccf845036fc5d7c99da1c77a3de5f10264b0ae8635bc9e1b3ade1b874122bd39877414e806802ad28f946712c8d0f1daab1747bdac2ea6692946dd9b2ae89f6e6e10da746134f1c96293ed796fc2f454ce562226d2bfbf5bc809ce4834c7a2922f54596a4c1f91c5fb94c54e4ece24bf635bfb2fb7bce9015a110a373587bd381f151cbc7997833dd5408fe061170a326136e6c66da53585e78421594d5f0578d92ffdc739c786ca18cb20bae330f05a8e5869fe0d15745dc7ba5eb263a8a911899dbd3667e4986d81de1e3af9bc0e6b490f0bac12654d4acf16020e480b74033a879498aae4bf5e6", &(0x7f00000005c0)="4ca5473fa400e0be951f2da0e10b4ddc5a7ad7c7b2eee9e047f0acdd9044f25c4f8dd5b707ec976fcae003797a6bff8ef0799405484b618ca7adb22146f72842878b90d537de707a2d8ae53a375a0c0567d9a84be0cdbe028dc496dfa94768e77be501ce127a5b1618b9d87c47a9309904a8f7015f10b935252f7d5919fa3bb9e526426b02a880b50809368dd2fbcd81bbcbd2c6b088c210b5579ede2d9192db6c5bde05630d6c031ce9330cd8aa9e3a04be7ac8057099b847ba50d1c38d7a567902cb248f436bf9476df4a1954d052359d88fb823b0d600b174750f9c77f19c28ec92b6693cb0d85a95b0789283623c4559", 0x4, 0x0, 0x2}, 0x50) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='dlm_recv\x00', r0, 0x0, 0x5}, 0x18) r2 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xf, 0x40, 0x1, 0xe5, 0x0, 0x3, 0xea020, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f00000007c0), 0x2}, 0x8, 0x8, 0xa, 0x6, 0x8000, 0x9, 0x9b2f, 0x0, 0x800, 0x0, 0x8}, 0x0, 0x10, r1, 0x0) socketpair(0x21, 0x2, 0x3, &(0x7f0000000880)) bpf$ENABLE_STATS(0x20, &(0x7f00000008c0), 0x4) bpf$ENABLE_STATS(0x20, &(0x7f0000000900), 0x4) r3 = openat$cgroup_ro(r0, &(0x7f0000000940)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000980)={'rose0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) r4 = perf_event_open(&(0x7f00000009c0)={0x2, 0x80, 0x7, 0x8, 0x0, 0x9, 0x0, 0x4d, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x3, 0x4}, 0x100030, 0x10001, 0x1, 0x3, 0x6, 0x4, 0x2, 0x0, 0x42, 0x0, 0x6}, 0xffffffffffffffff, 0xc, r2, 0x9) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40)={r3}, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000c00)={r5, &(0x7f0000000a80)="d6c7d490676f14b8bba00db92b8f2c6aa061665221d551c1db07338f8ae4b72741deffbc0a6c5c0cfa22846591be3785c4aad20f46656bb68ea2fe919f2080fda2e3de3b04d671333e29a8e42bec8060e862baab5e027d3ba19356e7eb8704f8140c2045650e4dc9c2e42ccf69fb6b401172f33ecc493c2229a219867b75d4173d74266fa6518944444c71c88bf38ac062ac5c", &(0x7f0000000b40)=""/170}, 0x20) bpf$ENABLE_STATS(0x20, &(0x7f0000000c40), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000c80)=0x100) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000d00)={0x3, 0x80, 0x5a, 0xc, 0x8, 0x10, 0x0, 0x4, 0x4202, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000cc0), 0x1}, 0x1014, 0x5, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x4}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d80)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000010c0)={0x11, 0x15, &(0x7f0000000e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x5, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x5}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}]}, &(0x7f0000000ec0)='syzkaller\x00', 0x4, 0xb9, &(0x7f0000000f00)=""/185, 0x40f00, 0x39, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000fc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001000)={0x4, 0x1, 0x4, 0x52e3}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f0000001040)=[{0x2, 0x3, 0xe, 0x1}, {0x2, 0x4, 0xe, 0x6}, {0x1, 0x4, 0x9, 0x6}, {0x4, 0x5, 0xe, 0x1}, {0x4, 0x5, 0x1, 0x3}, {0x1, 0x5, 0x1, 0xe}, {0x5, 0x3, 0x10, 0x9}, {0x0, 0x4, 0xd, 0xc}], 0x10, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001180)={&(0x7f0000000dc0)='neigh_create\x00', r6, 0x0, 0x80}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000012c0)={@ifindex=0x0, 0x1d, 0x0, 0x98a, &(0x7f00000011c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000001200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001240)=[0x0, 0x0], &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_tracing={0x1a, 0x9, &(0x7f0000001340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f00000013c0)='syzkaller\x00', 0x1000, 0x42, &(0x7f0000001400)=""/66, 0x40f00, 0x42, '\x00', 0x0, 0x1a, r5, 0x8, &(0x7f0000001480)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0xd, 0x9, 0x3}, 0x10, 0x5c3b, 0xffffffffffffffff, 0x2, &(0x7f0000001500)=[r3, r5, r5], &(0x7f0000001540)=[{0x2, 0x4, 0x2, 0x7}, {0x5, 0x3, 0x0, 0x2}], 0x10, 0x6, @void, @value}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001300)={@fallback=r3, r5, 0x9, 0x10, 0xffffffffffffffff, @void, @value=r9, @void, @void, r8}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000018c0)={{r2, 0xffffffffffffffff}, &(0x7f0000001840), &(0x7f0000001880)='%ps \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x5, &(0x7f0000001640)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x17}, @exit, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000001680)='GPL\x00', 0xa, 0xcc, &(0x7f00000016c0)=""/204, 0x40f00, 0x1, '\x00', r7, 0x25, r5, 0x8, &(0x7f00000017c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000001800)={0x1, 0xc, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000001900)=[r5, r10, r3, r5, r3], &(0x7f0000001940)=[{0x4, 0x4, 0x3, 0x9}, {0x3, 0x3, 0x6, 0x1}, {0x0, 0x2, 0x5, 0x6}, {0x4, 0x4, 0x10, 0x8}, {0x0, 0x3, 0x0, 0x8}, {0x1, 0x3, 0xc, 0x10}, {0x5, 0x2, 0x1, 0x5}, {0x3, 0x2, 0xe, 0x7}], 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001bc0)={&(0x7f0000001a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbd, 0xbd, 0x9, [@typedef={0xe, 0x0, 0x0, 0x8, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x2}}, @ptr={0xa, 0x0, 0x0, 0x2, 0x4}, @datasec={0xf, 0x2, 0x0, 0xf, 0x1, [{0x5, 0x3, 0x2}, {0x2, 0x6}], '9'}, @enum64={0xb, 0x0, 0x0, 0x13, 0x1, 0xe}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xe}, {0x8, 0x1}, {0x5, 0x4}, {0xa, 0x2}]}, @volatile={0x9}, @const={0xb, 0x0, 0x0, 0xa, 0x1}, @ptr={0x0, 0x0, 0x0, 0x2, 0x5}, @ptr={0x2, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x2e, 0x61, 0x30, 0x30]}}, &(0x7f0000001b80)=""/23, 0xe1, 0x17, 0x1, 0x0, 0x10000, @value=r3}, 0x28) openat$ppp(0xffffffffffffff9c, &(0x7f0000001c00), 0x200880, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001cc0)={r3, 0x58, &(0x7f0000001c40)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r9) 2.99161312s ago: executing program 4 (id=1949): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r1 = gettid() bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@cgroup, 0xa, 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000100)={'', 0x32, 0x37}, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x18, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='ext4_allocate_blocks\x00'}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000031367000800020008000000010000", @ANYBLOB='\x00'/20, @ANYRES16=0xffffffffffffffff, @ANYBLOB], 0x50) r8 = openat$cgroup_int(r5, &(0x7f0000000840)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(r8, &(0x7f0000000440)=0xffc, 0x49) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280), 0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00$', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYBLOB='\x00\x00\x00\x00'], 0x120, 0x40000}, 0x10) socketpair(0x8, 0x6, 0xc, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000340)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB="00000000360000000000000001000000010000008ac1843a0c32d9af79ddcb6776d51bb92afae9aa0b00dae0", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0xee00, @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r10, @ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r4], 0x110, 0x4008}, 0x20000014) r11 = openat$cgroup_procs(r5, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r11, &(0x7f00000001c0)=r1, 0x12) perf_event_open$cgroup(&(0x7f0000000680)={0x5, 0x80, 0x8, 0xe, 0x35, 0x7, 0x0, 0x4, 0x80080, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x4, 0x3, 0x7779, 0x8, 0xb, 0x0, 0x7fffffff, 0x0, 0x8}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) syz_clone(0x62005000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 2.96649065s ago: executing program 0 (id=1950): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r1}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) socketpair(0x22, 0x80000, 0x9, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095000000000000002f81c461b3fea834ceb0e17d9838c2830ca7ce46e581a192326a3698c79205e02f1561b0a3c595448e9f7024b45fb2006c9917fe2a42fcd2ce278009682dc8f7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r4}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x60, 0x3, 0x9, 0x5, 0x0, 0x1, 0x51000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0x7fffffffffffffff, 0x5, 0x0, 0x0, 0x557, 0xe, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 2.94186293s ago: executing program 3 (id=1951): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="1e000300008c71ef28ff4b"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000008000000000000000000008500000041000000850000002a00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000280), 0x6e, &(0x7f0000000300)=[{&(0x7f0000000440)=""/175, 0xaf}, {&(0x7f0000000540)=""/164, 0xa4}], 0x2, &(0x7f0000000340)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) 2.695555914s ago: executing program 2 (id=1952): perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8faf, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000002500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000006d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000003c0)='signal_generate\x00', r1}, 0x40) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000001c0), 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000400)=0x9, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="0bdbf61a9c5f77ad6b6ccbe0774daa75dee6efb16717cac2d105f66452329c9db80fa0435d0d57e519fa8ac7fd701cb55848f4a805b54e5ad42d4f97fd02e5365f2416ea122cb424eda6963b54507efcca638a711e3568b4956aacfb676ad0fb49a719b913b38f06b37a39ae867f9a847f970691da08c1032fb241829ee0d1c626b9c74e0fca81a51e1f730ebc3868ed7479721b81482ebed42dad73959ff4d5b0af8027a6f6934a35f598948793b992eabc"], 0x6) 527.501323ms ago: executing program 2 (id=1953): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000140), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r3, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x8000000}, 0x18) 504.349103ms ago: executing program 0 (id=1954): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYBLOB="0000000000000000b708000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES8=r0, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc%j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r0, 0x58, &(0x7f0000000280)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000d00)=ANY=[@ANYBLOB="18020000000000000000000000008000850000006100000085000000d000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0x28, 0x0, &(0x7f0000000240)="243c42e8680d85ffff03762f86dd", 0x0, 0x2200, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 456.634314ms ago: executing program 2 (id=1955): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a000000070000000300000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc786b409ac930c90ff90f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d858952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09e3187a10d905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367638cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a2d4f12e8e717eaaa2a6d14fee0c15f36c203dbc7c06128bec84231d43e152ef19ce027436fb4ebb9fce431b913f4817597a6f53d1626f9d1cb7b36fb18ac19547a8b20ede70c81a75686cea85dcd34408128da7cab045541bc6b9a0a79f63f2e7646356e04b977c9f47467537015240b974184be9c54b7c628ae4d97ebdb06070344468994afbaac71e5ffac2c61d9af66f9de2760a38e968a781528531c1c936a02065be48f1eee77be878873206d65bd0b1241fab9139abd7f40febe81fed3684e6b59273da01f1743c6a5df300ec59c65e8174fc2d95a62ca7b937289ad14107333007eab833a5849eb19f18ae41743dfb949377e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 6.81284ms ago: executing program 2 (id=1956): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r1, 0x8982, 0x20000500) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x6, 0x600, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000070000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000028008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="150a0000000000006111800000000000180000000000000000000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000540)={r3, &(0x7f0000000280)="e6a32c244ac1285251b7bd6858f3eebb8feb22e12ac4d0c6bbeb6addc4d563ba09683ac03f5f128c38155a39939452c0ad6708a10757e8853ee029725d4075cdd7ca470d9531fec9c287", &(0x7f00000004c0)=""/94, 0x4}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x2, 0x1, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r6}, 0x18) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r7}, 0xfffffffffffffda7) ioctl$SIOCSIFHWADDR(r5, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000010c0)) 0s ago: executing program 0 (id=1957): socketpair(0x1e, 0x80000, 0x7, &(0x7f0000000000)) bpf$ENABLE_STATS(0x20, &(0x7f0000000040), 0x4) kernel console output (not intermixed with test programs): 218.255123][ T3208] ? __cfi_sock_ioctl+0x10/0x10 [ 218.260079][ T3208] ? security_file_ioctl+0x95/0xc0 [ 218.265210][ T3208] ? __cfi_sock_ioctl+0x10/0x10 [ 218.270079][ T3208] __se_sys_ioctl+0x12f/0x1b0 [ 218.274783][ T3208] __x64_sys_ioctl+0x7b/0x90 [ 218.279405][ T3208] x64_sys_call+0x58b/0x9a0 [ 218.283924][ T3208] do_syscall_64+0x4c/0xa0 [ 218.288362][ T3208] ? clear_bhb_loop+0x15/0x70 [ 218.293058][ T3208] ? clear_bhb_loop+0x15/0x70 [ 218.297752][ T3208] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 218.303676][ T3208] RIP: 0033:0x7fb13418e969 [ 218.308099][ T3208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.327729][ T3208] RSP: 002b:00007fb134f99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 218.336165][ T3208] RAX: ffffffffffffffda RBX: 00007fb1343b5fa0 RCX: 00007fb13418e969 [ 218.344158][ T3208] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 218.352146][ T3208] RBP: 00007fb134f99090 R08: 0000000000000000 R09: 0000000000000000 [ 218.360141][ T3208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.368134][ T3208] R13: 0000000000000000 R14: 00007fb1343b5fa0 R15: 00007fff08cd78c8 [ 218.376222][ T3208] [ 220.653138][ T3236] tap0: tun_chr_ioctl cmd 2148553947 [ 222.028066][ T3296] FAULT_INJECTION: forcing a failure. [ 222.028066][ T3296] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 222.062324][ T3296] CPU: 0 PID: 3296 Comm: syz.0.1021 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 222.072186][ T3296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 222.082257][ T3296] Call Trace: [ 222.085556][ T3296] [ 222.088494][ T3296] __dump_stack+0x21/0x24 [ 222.092850][ T3296] dump_stack_lvl+0xee/0x150 [ 222.097457][ T3296] ? __cfi_dump_stack_lvl+0x8/0x8 [ 222.102510][ T3296] dump_stack+0x15/0x24 [ 222.106682][ T3296] should_fail_ex+0x3d4/0x520 [ 222.111379][ T3296] should_fail+0xb/0x10 [ 222.115549][ T3296] should_fail_usercopy+0x1a/0x20 [ 222.120590][ T3296] copyin+0x20/0xa0 [ 222.124413][ T3296] _copy_from_iter+0x3e2/0xfd0 [ 222.129189][ T3296] ? tipc_buf_acquire+0x2b/0xe0 [ 222.134057][ T3296] ? __cfi__copy_from_iter+0x10/0x10 [ 222.139356][ T3296] ? __kasan_check_write+0x14/0x20 [ 222.144491][ T3296] ? check_stack_object+0x81/0x140 [ 222.149630][ T3296] ? __check_object_size+0x45a/0x600 [ 222.154934][ T3296] tipc_msg_build+0x8ab/0xfd0 [ 222.159637][ T3296] __tipc_sendmsg+0x19dd/0x2680 [ 222.164516][ T3296] ? rht_lock+0x120/0x120 [ 222.168877][ T3296] ? __cfi_woken_wake_function+0x10/0x10 [ 222.174533][ T3296] ? avc_has_perm+0x158/0x240 [ 222.179230][ T3296] ? __kasan_check_write+0x14/0x20 [ 222.184364][ T3296] ? _raw_spin_lock_bh+0x8e/0xe0 [ 222.189411][ T3296] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 222.194978][ T3296] ? kernel_text_address+0xa0/0xd0 [ 222.200116][ T3296] ? __local_bh_enable_ip+0x58/0x80 [ 222.205328][ T3296] ? lock_sock_nested+0x1ec/0x280 [ 222.210457][ T3296] ? __cfi_lock_sock_nested+0x10/0x10 [ 222.215855][ T3296] ? stack_trace_save+0x98/0xe0 [ 222.220730][ T3296] ? __stack_depot_save+0x36/0x480 [ 222.225869][ T3296] tipc_sendmsg+0x55/0x70 [ 222.230227][ T3296] ? __cfi_tipc_sendmsg+0x10/0x10 [ 222.235283][ T3296] ____sys_sendmsg+0x5a9/0x990 [ 222.240080][ T3296] ? __sys_sendmsg_sock+0x40/0x40 [ 222.245127][ T3296] ? import_iovec+0x7c/0xb0 [ 222.249646][ T3296] ___sys_sendmsg+0x21c/0x290 [ 222.254343][ T3296] ? __sys_sendmsg+0x270/0x270 [ 222.259174][ T3296] ? __kasan_check_write+0x14/0x20 [ 222.264306][ T3296] ? proc_fail_nth_write+0x17a/0x1f0 [ 222.269618][ T3296] ? vfs_write+0x9d6/0xca0 [ 222.274057][ T3296] ? __fdget+0x19c/0x220 [ 222.278324][ T3296] __x64_sys_sendmsg+0x1f0/0x2c0 [ 222.283290][ T3296] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 222.288773][ T3296] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 222.294860][ T3296] x64_sys_call+0x171/0x9a0 [ 222.299389][ T3296] do_syscall_64+0x4c/0xa0 [ 222.303834][ T3296] ? clear_bhb_loop+0x15/0x70 [ 222.308519][ T3296] ? clear_bhb_loop+0x15/0x70 [ 222.313379][ T3296] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 222.319293][ T3296] RIP: 0033:0x7fccb6d8e969 [ 222.323723][ T3296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 222.343344][ T3296] RSP: 002b:00007fccb7b73038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 222.351781][ T3296] RAX: ffffffffffffffda RBX: 00007fccb6fb5fa0 RCX: 00007fccb6d8e969 [ 222.359770][ T3296] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 222.367757][ T3296] RBP: 00007fccb7b73090 R08: 0000000000000000 R09: 0000000000000000 [ 222.375828][ T3296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 222.383814][ T3296] R13: 0000000000000000 R14: 00007fccb6fb5fa0 R15: 00007ffc0c57ea98 [ 222.391806][ T3296] [ 222.911526][ T3307] device syzkaller0 entered promiscuous mode [ 223.187550][ T3313] bridge0: port 4(veth0) entered blocking state [ 223.193975][ T3313] bridge0: port 4(veth0) entered disabled state [ 223.200803][ T3313] device veth0 entered promiscuous mode [ 224.501607][ T3353] device pim6reg1 entered promiscuous mode [ 225.308657][ T28] audit: type=1400 audit(1746667961.064:141): avc: denied { create } for pid=3381 comm="syz.4.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 226.099790][ T28] audit: type=1400 audit(1746667961.854:142): avc: denied { create } for pid=3419 comm="syz.3.1066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 228.370159][ T3497] FAULT_INJECTION: forcing a failure. [ 228.370159][ T3497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 228.390134][ T3497] CPU: 1 PID: 3497 Comm: syz.3.1094 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 228.400001][ T3497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 228.410073][ T3497] Call Trace: [ 228.413365][ T3497] [ 228.416300][ T3497] __dump_stack+0x21/0x24 [ 228.420644][ T3497] dump_stack_lvl+0xee/0x150 [ 228.425240][ T3497] ? __cfi_dump_stack_lvl+0x8/0x8 [ 228.430271][ T3497] dump_stack+0x15/0x24 [ 228.434436][ T3497] should_fail_ex+0x3d4/0x520 [ 228.439121][ T3497] should_fail+0xb/0x10 [ 228.443270][ T3497] should_fail_usercopy+0x1a/0x20 [ 228.448305][ T3497] _copy_from_user+0x1e/0xc0 [ 228.452895][ T3497] __sys_bpf+0x277/0x780 [ 228.457143][ T3497] ? bpf_link_show_fdinfo+0x320/0x320 [ 228.462526][ T3497] ? __cfi_ksys_write+0x10/0x10 [ 228.467378][ T3497] ? debug_smp_processor_id+0x17/0x20 [ 228.472749][ T3497] __x64_sys_bpf+0x7c/0x90 [ 228.477199][ T3497] x64_sys_call+0x488/0x9a0 [ 228.481699][ T3497] do_syscall_64+0x4c/0xa0 [ 228.486114][ T3497] ? clear_bhb_loop+0x15/0x70 [ 228.490786][ T3497] ? clear_bhb_loop+0x15/0x70 [ 228.495459][ T3497] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 228.501363][ T3497] RIP: 0033:0x7fb13418e969 [ 228.505775][ T3497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.525462][ T3497] RSP: 002b:00007fb134f99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 228.533867][ T3497] RAX: ffffffffffffffda RBX: 00007fb1343b5fa0 RCX: 00007fb13418e969 [ 228.541856][ T3497] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 228.549833][ T3497] RBP: 00007fb134f99090 R08: 0000000000000000 R09: 0000000000000000 [ 228.557802][ T3497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 228.565766][ T3497] R13: 0000000000000000 R14: 00007fb1343b5fa0 R15: 00007fff08cd78c8 [ 228.573750][ T3497] [ 233.509597][ T3588] FAULT_INJECTION: forcing a failure. [ 233.509597][ T3588] name failslab, interval 1, probability 0, space 0, times 0 [ 233.554246][ T3588] CPU: 1 PID: 3588 Comm: syz.0.1126 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 233.564108][ T3588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 233.574187][ T3588] Call Trace: [ 233.577480][ T3588] [ 233.580421][ T3588] __dump_stack+0x21/0x24 [ 233.584783][ T3588] dump_stack_lvl+0xee/0x150 [ 233.589395][ T3588] ? __cfi_dump_stack_lvl+0x8/0x8 [ 233.594438][ T3588] ? __cfi___switch_to+0x10/0x10 [ 233.599399][ T3588] dump_stack+0x15/0x24 [ 233.603660][ T3588] should_fail_ex+0x3d4/0x520 [ 233.608373][ T3588] __should_failslab+0xac/0xf0 [ 233.613156][ T3588] ? bpf_test_init+0xce/0x160 [ 233.617852][ T3588] should_failslab+0x9/0x20 [ 233.622381][ T3588] __kmem_cache_alloc_node+0x3d/0x2c0 [ 233.627776][ T3588] ? bpf_test_init+0xce/0x160 [ 233.632473][ T3588] __kmalloc+0xa1/0x1e0 [ 233.636653][ T3588] bpf_test_init+0xce/0x160 [ 233.641175][ T3588] bpf_prog_test_run_xdp+0x359/0xe50 [ 233.646484][ T3588] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 233.652315][ T3588] ? __kasan_check_write+0x14/0x20 [ 233.657458][ T3588] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 233.663294][ T3588] bpf_prog_test_run+0x3e3/0x630 [ 233.668263][ T3588] ? bpf_prog_query+0x270/0x270 [ 233.673140][ T3588] ? selinux_bpf+0xce/0xf0 [ 233.677583][ T3588] ? security_bpf+0x93/0xb0 [ 233.682102][ T3588] __sys_bpf+0x56d/0x780 [ 233.686374][ T3588] ? bpf_link_show_fdinfo+0x320/0x320 [ 233.691788][ T3588] ? fpregs_restore_userregs+0x128/0x260 [ 233.697442][ T3588] __x64_sys_bpf+0x7c/0x90 [ 233.701882][ T3588] x64_sys_call+0x488/0x9a0 [ 233.706405][ T3588] do_syscall_64+0x4c/0xa0 [ 233.710846][ T3588] ? clear_bhb_loop+0x15/0x70 [ 233.715538][ T3588] ? clear_bhb_loop+0x15/0x70 [ 233.720245][ T3588] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 233.726170][ T3588] RIP: 0033:0x7fccb6d8e969 [ 233.730598][ T3588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 233.750224][ T3588] RSP: 002b:00007fccb7b73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 233.758649][ T3588] RAX: ffffffffffffffda RBX: 00007fccb6fb5fa0 RCX: 00007fccb6d8e969 [ 233.766625][ T3588] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 233.774591][ T3588] RBP: 00007fccb7b73090 R08: 0000000000000000 R09: 0000000000000000 [ 233.782559][ T3588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 233.790525][ T3588] R13: 0000000000000000 R14: 00007fccb6fb5fa0 R15: 00007ffc0c57ea98 [ 233.798501][ T3588] [ 240.083022][ T3711] device pim6reg1 entered promiscuous mode [ 240.881007][ T3734] device wg2 entered promiscuous mode [ 241.120984][ T28] audit: type=1400 audit(1746667976.874:143): avc: denied { create } for pid=3743 comm="syz.2.1178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 243.618998][ T28] audit: type=1400 audit(1746667979.374:144): avc: denied { create } for pid=3762 comm="syz.2.1185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 243.848482][ T3768] device sit0 entered promiscuous mode [ 244.085236][ T3772] GPL: port 1(erspan0) entered blocking state [ 244.109933][ T3772] GPL: port 1(erspan0) entered disabled state [ 244.124296][ T3772] device erspan0 entered promiscuous mode [ 244.141163][ T3778] GPL: port 1(erspan0) entered blocking state [ 244.147296][ T3778] GPL: port 1(erspan0) entered forwarding state [ 245.958984][ T3817] device syzkaller0 entered promiscuous mode [ 247.372259][ T3830] GPL: port 1(erspan0) entered blocking state [ 247.380215][ T3830] GPL: port 1(erspan0) entered disabled state [ 247.386957][ T3830] device erspan0 entered promiscuous mode [ 247.401856][ T3830] GPL: port 1(erspan0) entered blocking state [ 247.408126][ T3830] GPL: port 1(erspan0) entered forwarding state [ 249.487247][ T3872] device syzkaller0 entered promiscuous mode [ 251.343311][ T28] audit: type=1400 audit(1746667987.094:145): avc: denied { read } for pid=3908 comm="syz.1.1228" dev="nsfs" ino=4026532571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 252.407842][ T28] audit: type=1400 audit(1746667987.124:146): avc: denied { open } for pid=3908 comm="syz.1.1228" path="net:[4026532571]" dev="nsfs" ino=4026532571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 253.253617][ T3898] device bridge_slave_1 left promiscuous mode [ 253.268177][ T3898] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.291884][ T3898] device bridge_slave_0 left promiscuous mode [ 253.301545][ T3898] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.898509][ T28] audit: type=1400 audit(1746667989.644:147): avc: denied { create } for pid=3931 comm="syz.2.1235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 253.935906][ T3928] device sit0 left promiscuous mode [ 254.121383][ T3939] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 254.128694][ T3939] syzkaller0: owner set to 768 [ 254.517079][ T3934] syzkaller0: tun_chr_ioctl cmd 35108 [ 255.301981][ T3971] FAULT_INJECTION: forcing a failure. [ 255.301981][ T3971] name failslab, interval 1, probability 0, space 0, times 0 [ 255.315271][ T3971] CPU: 0 PID: 3971 Comm: syz.2.1250 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 255.325190][ T3971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 255.335248][ T3971] Call Trace: [ 255.338528][ T3971] [ 255.341451][ T3971] __dump_stack+0x21/0x24 [ 255.345782][ T3971] dump_stack_lvl+0xee/0x150 [ 255.350379][ T3971] ? __cfi_dump_stack_lvl+0x8/0x8 [ 255.355417][ T3971] ? x64_sys_call+0x58b/0x9a0 [ 255.360089][ T3971] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 255.366167][ T3971] dump_stack+0x15/0x24 [ 255.370326][ T3971] should_fail_ex+0x3d4/0x520 [ 255.374996][ T3971] __should_failslab+0xac/0xf0 [ 255.379750][ T3971] ? __hw_addr_add_ex+0x1f7/0x770 [ 255.384773][ T3971] should_failslab+0x9/0x20 [ 255.389274][ T3971] __kmem_cache_alloc_node+0x3d/0x2c0 [ 255.394645][ T3971] ? __hw_addr_add_ex+0x1f7/0x770 [ 255.399677][ T3971] kmalloc_trace+0x29/0xb0 [ 255.404107][ T3971] __hw_addr_add_ex+0x1f7/0x770 [ 255.408959][ T3971] ? kvmalloc_node+0x294/0x480 [ 255.413721][ T3971] dev_addr_init+0x138/0x210 [ 255.418332][ T3971] ? __kasan_check_write+0x14/0x20 [ 255.423456][ T3971] ? __cfi_dev_addr_init+0x10/0x10 [ 255.428660][ T3971] alloc_netdev_mqs+0x296/0xf90 [ 255.433507][ T3971] ? __cfi_selinux_capable+0x10/0x10 [ 255.438791][ T3971] ? __cfi_vti6_dev_setup+0x10/0x10 [ 255.443999][ T3971] vti6_locate+0x588/0x6d0 [ 255.448417][ T3971] ? vti6_link_config+0x550/0x550 [ 255.453445][ T3971] ? memcpy+0x56/0x70 [ 255.457525][ T3971] vti6_siocdevprivate+0x6d7/0xd20 [ 255.462673][ T3971] ? __cfi_vti6_siocdevprivate+0x10/0x10 [ 255.468310][ T3971] ? __mutex_lock+0x47a/0x16d0 [ 255.473090][ T3971] ? full_name_hash+0xba/0xf0 [ 255.477803][ T3971] dev_ifsioc+0xbc4/0xed0 [ 255.482137][ T3971] ? ioctl_has_perm+0x391/0x4c0 [ 255.487069][ T3971] ? dev_ioctl+0xd10/0xd10 [ 255.491481][ T3971] ? __mutex_lock_slowpath+0xe/0x10 [ 255.496679][ T3971] ? mutex_lock+0xf8/0x1a0 [ 255.501095][ T3971] ? __cfi_mutex_lock+0x10/0x10 [ 255.505960][ T3971] ? dev_get_by_name_rcu+0xe5/0x130 [ 255.511180][ T3971] dev_ioctl+0x5f3/0xd10 [ 255.515420][ T3971] sock_ioctl+0x675/0x6e0 [ 255.519755][ T3971] ? __cfi_sock_ioctl+0x10/0x10 [ 255.524602][ T3971] ? security_file_ioctl+0x95/0xc0 [ 255.529725][ T3971] ? __cfi_sock_ioctl+0x10/0x10 [ 255.534579][ T3971] __se_sys_ioctl+0x12f/0x1b0 [ 255.539263][ T3971] __x64_sys_ioctl+0x7b/0x90 [ 255.543895][ T3971] x64_sys_call+0x58b/0x9a0 [ 255.548414][ T3971] do_syscall_64+0x4c/0xa0 [ 255.552832][ T3971] ? clear_bhb_loop+0x15/0x70 [ 255.557515][ T3971] ? clear_bhb_loop+0x15/0x70 [ 255.562203][ T3971] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 255.568105][ T3971] RIP: 0033:0x7f06d798e969 [ 255.572520][ T3971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 255.592122][ T3971] RSP: 002b:00007f06d8858038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 255.600562][ T3971] RAX: ffffffffffffffda RBX: 00007f06d7bb5fa0 RCX: 00007f06d798e969 [ 255.608536][ T3971] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000009 [ 255.616516][ T3971] RBP: 00007f06d8858090 R08: 0000000000000000 R09: 0000000000000000 [ 255.624494][ T3971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 255.632498][ T3971] R13: 0000000000000000 R14: 00007f06d7bb5fa0 R15: 00007ffd5ec01de8 [ 255.640512][ T3971] [ 256.114363][ T3981] device syzkaller0 entered promiscuous mode [ 256.868538][ T4001] device syzkaller0 entered promiscuous mode [ 257.607782][ T4029] FAULT_INJECTION: forcing a failure. [ 257.607782][ T4029] name failslab, interval 1, probability 0, space 0, times 0 [ 257.620582][ T4029] CPU: 0 PID: 4029 Comm: syz.4.1269 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 257.630418][ T4029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 257.640591][ T4029] Call Trace: [ 257.643892][ T4029] [ 257.646838][ T4029] __dump_stack+0x21/0x24 [ 257.651236][ T4029] dump_stack_lvl+0xee/0x150 [ 257.655883][ T4029] ? __cfi_dump_stack_lvl+0x8/0x8 [ 257.660941][ T4029] ? skb_release_data+0x1d2/0x890 [ 257.666095][ T4029] ? skb_ensure_writable+0x2f8/0x470 [ 257.671434][ T4029] dump_stack+0x15/0x24 [ 257.675637][ T4029] should_fail_ex+0x3d4/0x520 [ 257.680351][ T4029] ? skb_clone+0x1f5/0x380 [ 257.684792][ T4029] __should_failslab+0xac/0xf0 [ 257.689572][ T4029] should_failslab+0x9/0x20 [ 257.694097][ T4029] kmem_cache_alloc+0x3b/0x330 [ 257.698884][ T4029] skb_clone+0x1f5/0x380 [ 257.703155][ T4029] bpf_clone_redirect+0xa7/0x3c0 [ 257.708120][ T4029] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 257.713598][ T4029] ? free_swap_slot+0x30/0x300 [ 257.718394][ T4029] ? __build_skb+0x2d/0x410 [ 257.722922][ T4029] ? build_skb+0x24/0x200 [ 257.727278][ T4029] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 257.732849][ T4029] ? bpf_prog_test_run+0x3e3/0x630 [ 257.737996][ T4029] ? __sys_bpf+0x56d/0x780 [ 257.742445][ T4029] ? __x64_sys_bpf+0x7c/0x90 [ 257.747064][ T4029] ? x64_sys_call+0x488/0x9a0 [ 257.751758][ T4029] ? do_syscall_64+0x4c/0xa0 [ 257.756409][ T4029] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 257.762522][ T4029] ? __kasan_check_read+0x11/0x20 [ 257.767577][ T4029] ? kvm_sched_clock_read+0x18/0x40 [ 257.772808][ T4029] ? sched_clock+0x9/0x10 [ 257.777169][ T4029] bpf_test_run+0x4e5/0x740 [ 257.781710][ T4029] ? kasan_save_alloc_info+0x25/0x30 [ 257.787024][ T4029] ? __kasan_slab_alloc+0x72/0x80 [ 257.792083][ T4029] ? convert___skb_to_skb+0x5b0/0x5b0 [ 257.797479][ T4029] ? __cfi_eth_type_trans+0x10/0x10 [ 257.802700][ T4029] ? __kasan_check_write+0x14/0x20 [ 257.807866][ T4029] ? convert___skb_to_skb+0x40/0x5b0 [ 257.813185][ T4029] bpf_prog_test_run_skb+0xaec/0x1290 [ 257.818595][ T4029] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 257.824432][ T4029] bpf_prog_test_run+0x3e3/0x630 [ 257.829406][ T4029] ? slab_free_freelist_hook+0xc2/0x190 [ 257.834988][ T4029] ? bpf_prog_query+0x270/0x270 [ 257.839881][ T4029] ? selinux_bpf+0xce/0xf0 [ 257.844334][ T4029] ? security_bpf+0x93/0xb0 [ 257.848868][ T4029] __sys_bpf+0x56d/0x780 [ 257.853146][ T4029] ? bpf_link_show_fdinfo+0x320/0x320 [ 257.858561][ T4029] ? __cfi_ksys_write+0x10/0x10 [ 257.863445][ T4029] ? debug_smp_processor_id+0x17/0x20 [ 257.868843][ T4029] __x64_sys_bpf+0x7c/0x90 [ 257.873290][ T4029] x64_sys_call+0x488/0x9a0 [ 257.877839][ T4029] do_syscall_64+0x4c/0xa0 [ 257.882283][ T4029] ? clear_bhb_loop+0x15/0x70 [ 257.886985][ T4029] ? clear_bhb_loop+0x15/0x70 [ 257.891683][ T4029] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 257.897605][ T4029] RIP: 0033:0x7f422c58e969 [ 257.902036][ T4029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.921665][ T4029] RSP: 002b:00007f422d475038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 257.930100][ T4029] RAX: ffffffffffffffda RBX: 00007f422c7b5fa0 RCX: 00007f422c58e969 [ 257.938175][ T4029] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 257.946234][ T4029] RBP: 00007f422d475090 R08: 0000000000000000 R09: 0000000000000000 [ 257.954205][ T4029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 257.962181][ T4029] R13: 0000000000000000 R14: 00007f422c7b5fa0 R15: 00007ffce4308fc8 [ 257.970158][ T4029] [ 258.275246][ T4036] device syzkaller0 entered promiscuous mode [ 258.377353][ T4045] device wg2 left promiscuous mode [ 258.439310][ T4049] device wg2 entered promiscuous mode [ 259.089235][ T4060] FAULT_INJECTION: forcing a failure. [ 259.089235][ T4060] name failslab, interval 1, probability 0, space 0, times 0 [ 259.102000][ T4060] CPU: 0 PID: 4060 Comm: syz.3.1279 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 259.111832][ T4060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 259.121911][ T4060] Call Trace: [ 259.125206][ T4060] [ 259.128149][ T4060] __dump_stack+0x21/0x24 [ 259.132509][ T4060] dump_stack_lvl+0xee/0x150 [ 259.137125][ T4060] ? __cfi_dump_stack_lvl+0x8/0x8 [ 259.142174][ T4060] ? bpf_prog_6893982b85ceadf7+0x56/0x5b [ 259.147831][ T4060] ? bpf_test_run+0x2e2/0x740 [ 259.152526][ T4060] ? bpf_prog_test_run_skb+0xaec/0x1290 [ 259.158177][ T4060] ? __sys_bpf+0x56d/0x780 [ 259.162620][ T4060] ? __x64_sys_bpf+0x7c/0x90 [ 259.167233][ T4060] ? x64_sys_call+0x488/0x9a0 [ 259.171926][ T4060] ? do_syscall_64+0x4c/0xa0 [ 259.176545][ T4060] dump_stack+0x15/0x24 [ 259.180757][ T4060] should_fail_ex+0x3d4/0x520 [ 259.185461][ T4060] ? dst_alloc+0x16a/0x1e0 [ 259.189916][ T4060] __should_failslab+0xac/0xf0 [ 259.194709][ T4060] should_failslab+0x9/0x20 [ 259.199247][ T4060] kmem_cache_alloc+0x3b/0x330 [ 259.204038][ T4060] dst_alloc+0x16a/0x1e0 [ 259.208450][ T4060] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 259.214558][ T4060] ip_route_output_key_hash+0x131/0x1e0 [ 259.220144][ T4060] ? __cfi_ip_route_output_key_hash+0x10/0x10 [ 259.226244][ T4060] ? 0xffffffffa0000954 [ 259.230425][ T4060] vti6_tnl_xmit+0xd9c/0x1980 [ 259.235142][ T4060] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 259.241322][ T4060] ? skb_network_protocol+0x505/0x750 [ 259.246719][ T4060] ? __cfi_vti6_tnl_xmit+0x10/0x10 [ 259.252485][ T4060] dev_hard_start_xmit+0x20b/0x750 [ 259.257627][ T4060] __dev_queue_xmit+0x18d9/0x3420 [ 259.262685][ T4060] ? __dev_queue_xmit+0x250/0x3420 [ 259.267817][ T4060] ? __cfi___dev_queue_xmit+0x10/0x10 [ 259.273212][ T4060] ? __kasan_check_write+0x14/0x20 [ 259.278352][ T4060] ? skb_release_data+0x1d2/0x890 [ 259.283409][ T4060] ? skb_ensure_writable+0x2f8/0x470 [ 259.288718][ T4060] ? __kasan_check_write+0x14/0x20 [ 259.293860][ T4060] ? pskb_expand_head+0xc4a/0x1210 [ 259.299001][ T4060] __bpf_redirect+0x8db/0x1130 [ 259.303883][ T4060] bpf_clone_redirect+0x26a/0x3c0 [ 259.308932][ T4060] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 259.314423][ T4060] ? free_swap_slot+0x30/0x300 [ 259.319230][ T4060] ? __build_skb+0x2d/0x410 [ 259.323765][ T4060] ? build_skb+0x24/0x200 [ 259.328119][ T4060] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 259.333690][ T4060] ? bpf_prog_test_run+0x3e3/0x630 [ 259.338841][ T4060] ? __sys_bpf+0x56d/0x780 [ 259.343300][ T4060] ? __x64_sys_bpf+0x7c/0x90 [ 259.347917][ T4060] ? x64_sys_call+0x488/0x9a0 [ 259.352622][ T4060] ? do_syscall_64+0x4c/0xa0 [ 259.357242][ T4060] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 259.363353][ T4060] ? __kasan_check_read+0x11/0x20 [ 259.368413][ T4060] ? bpf_test_timer_continue+0x147/0x4a0 [ 259.374074][ T4060] bpf_test_run+0x2e2/0x740 [ 259.378595][ T4060] ? kasan_save_alloc_info+0x25/0x30 [ 259.383906][ T4060] ? __kasan_slab_alloc+0x72/0x80 [ 259.388955][ T4060] ? __build_skb+0x2d/0x410 [ 259.393479][ T4060] ? convert___skb_to_skb+0x5b0/0x5b0 [ 259.398962][ T4060] ? __cfi_eth_type_trans+0x10/0x10 [ 259.404178][ T4060] ? __kasan_check_write+0x14/0x20 [ 259.409319][ T4060] ? convert___skb_to_skb+0x40/0x5b0 [ 259.414630][ T4060] bpf_prog_test_run_skb+0xaec/0x1290 [ 259.420025][ T4060] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 259.425855][ T4060] bpf_prog_test_run+0x3e3/0x630 [ 259.430841][ T4060] ? slab_free_freelist_hook+0x5b/0x190 [ 259.436412][ T4060] ? bpf_prog_query+0x270/0x270 [ 259.441301][ T4060] ? selinux_bpf+0xce/0xf0 [ 259.445842][ T4060] ? security_bpf+0x93/0xb0 [ 259.450365][ T4060] __sys_bpf+0x56d/0x780 [ 259.454642][ T4060] ? bpf_link_show_fdinfo+0x320/0x320 [ 259.460045][ T4060] ? __cfi_ksys_write+0x10/0x10 [ 259.464918][ T4060] ? debug_smp_processor_id+0x17/0x20 [ 259.470302][ T4060] __x64_sys_bpf+0x7c/0x90 [ 259.474731][ T4060] x64_sys_call+0x488/0x9a0 [ 259.479237][ T4060] do_syscall_64+0x4c/0xa0 [ 259.483663][ T4060] ? clear_bhb_loop+0x15/0x70 [ 259.488338][ T4060] ? clear_bhb_loop+0x15/0x70 [ 259.493031][ T4060] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 259.498984][ T4060] RIP: 0033:0x7fb13418e969 [ 259.503410][ T4060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.523015][ T4060] RSP: 002b:00007fb134f99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 259.531436][ T4060] RAX: ffffffffffffffda RBX: 00007fb1343b5fa0 RCX: 00007fb13418e969 [ 259.539418][ T4060] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 259.547398][ T4060] RBP: 00007fb134f99090 R08: 0000000000000000 R09: 0000000000000000 [ 259.555387][ T4060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 259.563375][ T4060] R13: 0000000000000000 R14: 00007fb1343b5fa0 R15: 00007fff08cd78c8 [ 259.571361][ T4060] [ 260.586242][ T4093] device wg2 left promiscuous mode [ 260.677239][ T4094] device wg2 entered promiscuous mode [ 264.294863][ T4131] device wg2 left promiscuous mode [ 265.428871][ T4162] device veth0_vlan left promiscuous mode [ 265.441404][ T4162] device veth0_vlan entered promiscuous mode [ 265.635781][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.644507][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.652286][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.629731][ T4179] device syzkaller0 entered promiscuous mode [ 268.189668][ T4191] device wg2 left promiscuous mode [ 268.381563][ T4194] device wg2 entered promiscuous mode [ 269.681536][ T4236] device syzkaller0 entered promiscuous mode [ 272.536860][ T4302] device syzkaller0 entered promiscuous mode [ 275.820470][ T4387] device veth1_macvtap left promiscuous mode [ 275.827021][ T4387] device macsec0 entered promiscuous mode [ 275.989249][ T4395] device wg2 entered promiscuous mode [ 276.120738][ T4404] bond_slave_1: mtu less than device minimum [ 278.472456][ T4424] FAULT_INJECTION: forcing a failure. [ 278.472456][ T4424] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.497589][ T4424] CPU: 1 PID: 4424 Comm: syz.4.1398 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 278.507467][ T4424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 278.517639][ T4424] Call Trace: [ 278.520959][ T4424] [ 278.523917][ T4424] __dump_stack+0x21/0x24 [ 278.528287][ T4424] dump_stack_lvl+0xee/0x150 [ 278.532933][ T4424] ? __cfi_dump_stack_lvl+0x8/0x8 [ 278.537994][ T4424] dump_stack+0x15/0x24 [ 278.542180][ T4424] should_fail_ex+0x3d4/0x520 [ 278.546884][ T4424] should_fail+0xb/0x10 [ 278.551055][ T4424] should_fail_usercopy+0x1a/0x20 [ 278.556101][ T4424] _copy_from_user+0x1e/0xc0 [ 278.560711][ T4424] sock_do_ioctl+0x186/0x310 [ 278.565327][ T4424] ? sock_show_fdinfo+0xb0/0xb0 [ 278.570199][ T4424] ? selinux_file_ioctl+0x377/0x480 [ 278.575449][ T4424] ? __cfi_bpf_perf_event_read+0x10/0x10 [ 278.581132][ T4424] sock_ioctl+0x4d8/0x6e0 [ 278.585486][ T4424] ? __cfi_sock_ioctl+0x10/0x10 [ 278.590448][ T4424] ? __fget_files+0x2d5/0x330 [ 278.595166][ T4424] ? security_file_ioctl+0x95/0xc0 [ 278.600315][ T4424] ? __cfi_sock_ioctl+0x10/0x10 [ 278.605192][ T4424] __se_sys_ioctl+0x12f/0x1b0 [ 278.609906][ T4424] __x64_sys_ioctl+0x7b/0x90 [ 278.614537][ T4424] x64_sys_call+0x58b/0x9a0 [ 278.619070][ T4424] do_syscall_64+0x4c/0xa0 [ 278.623520][ T4424] ? clear_bhb_loop+0x15/0x70 [ 278.628225][ T4424] ? clear_bhb_loop+0x15/0x70 [ 278.632963][ T4424] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 278.638896][ T4424] RIP: 0033:0x7f422c58e969 [ 278.643336][ T4424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.663064][ T4424] RSP: 002b:00007f422d475038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 278.671608][ T4424] RAX: ffffffffffffffda RBX: 00007f422c7b5fa0 RCX: 00007f422c58e969 [ 278.679617][ T4424] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 278.687620][ T4424] RBP: 00007f422d475090 R08: 0000000000000000 R09: 0000000000000000 [ 278.695627][ T4424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.703648][ T4424] R13: 0000000000000000 R14: 00007f422c7b5fa0 R15: 00007ffce4308fc8 [ 278.711666][ T4424] [ 278.782192][ T4429] device pim6reg1 entered promiscuous mode [ 282.571741][ T4458] device veth0_vlan left promiscuous mode [ 282.593821][ T4458] device veth0_vlan entered promiscuous mode [ 282.646774][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.657548][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.669139][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 282.730813][ T4470] device syzkaller0 entered promiscuous mode [ 285.747813][ T4541] device syzkaller0 entered promiscuous mode [ 285.828113][ T4545] device syzkaller0 entered promiscuous mode [ 286.268110][ T4569] FAULT_INJECTION: forcing a failure. [ 286.268110][ T4569] name failslab, interval 1, probability 0, space 0, times 0 [ 286.280906][ T4569] CPU: 0 PID: 4569 Comm: syz.4.1445 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 286.290732][ T4569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 286.300801][ T4569] Call Trace: [ 286.304074][ T4569] [ 286.306994][ T4569] __dump_stack+0x21/0x24 [ 286.311341][ T4569] dump_stack_lvl+0xee/0x150 [ 286.315940][ T4569] ? __cfi_dump_stack_lvl+0x8/0x8 [ 286.320962][ T4569] dump_stack+0x15/0x24 [ 286.325113][ T4569] should_fail_ex+0x3d4/0x520 [ 286.329811][ T4569] ? __alloc_file+0x28/0x2a0 [ 286.334394][ T4569] __should_failslab+0xac/0xf0 [ 286.339155][ T4569] should_failslab+0x9/0x20 [ 286.343661][ T4569] kmem_cache_alloc+0x3b/0x330 [ 286.348415][ T4569] ? __cfi__raw_spin_lock+0x10/0x10 [ 286.353615][ T4569] __alloc_file+0x28/0x2a0 [ 286.358041][ T4569] alloc_empty_file+0x97/0x180 [ 286.362797][ T4569] alloc_file+0x59/0x640 [ 286.367028][ T4569] alloc_file_pseudo+0x17a/0x1f0 [ 286.371956][ T4569] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 286.377405][ T4569] anon_inode_getfd+0xd6/0x1d0 [ 286.382160][ T4569] bpf_enable_stats+0xe0/0x140 [ 286.386913][ T4569] __sys_bpf+0x5a3/0x780 [ 286.391167][ T4569] ? bpf_link_show_fdinfo+0x320/0x320 [ 286.396548][ T4569] ? __cfi_ksys_write+0x10/0x10 [ 286.401399][ T4569] ? debug_smp_processor_id+0x17/0x20 [ 286.406859][ T4569] __x64_sys_bpf+0x7c/0x90 [ 286.411281][ T4569] x64_sys_call+0x488/0x9a0 [ 286.415786][ T4569] do_syscall_64+0x4c/0xa0 [ 286.420195][ T4569] ? clear_bhb_loop+0x15/0x70 [ 286.424861][ T4569] ? clear_bhb_loop+0x15/0x70 [ 286.429523][ T4569] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 286.435413][ T4569] RIP: 0033:0x7f422c58e969 [ 286.439820][ T4569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.459420][ T4569] RSP: 002b:00007f422d475038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 286.467827][ T4569] RAX: ffffffffffffffda RBX: 00007f422c7b5fa0 RCX: 00007f422c58e969 [ 286.475881][ T4569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000020 [ 286.483845][ T4569] RBP: 00007f422d475090 R08: 0000000000000000 R09: 0000000000000000 [ 286.491814][ T4569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.499781][ T4569] R13: 0000000000000000 R14: 00007f422c7b5fa0 R15: 00007ffce4308fc8 [ 286.507752][ T4569] [ 286.739696][ T4578] device sit0 entered promiscuous mode [ 286.875463][ T4586] device veth1_macvtap left promiscuous mode [ 287.232150][ T4596] device wg2 left promiscuous mode [ 287.385107][ T28] audit: type=1400 audit(1746668023.134:148): avc: denied { ioctl } for pid=4595 comm="syz.2.1454" path="socket:[31531]" dev="sockfs" ino=31531 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 288.482345][ T4617] device syzkaller0 entered promiscuous mode [ 288.598448][ T4627] device sit0 left promiscuous mode [ 288.612720][ T4627] device sit0 entered promiscuous mode [ 289.187106][ T28] audit: type=1400 audit(1746668024.934:149): avc: denied { create } for pid=4648 comm="syz.2.1471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 289.998724][ T4682] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 290.109842][ T4682] device syzkaller0 entered promiscuous mode [ 291.861752][ T4738] device veth0_vlan left promiscuous mode [ 291.876415][ T4738] device veth0_vlan entered promiscuous mode [ 291.971931][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.996304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 292.036145][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.037487][ T4767] FAULT_INJECTION: forcing a failure. [ 293.037487][ T4767] name failslab, interval 1, probability 0, space 0, times 0 [ 293.050179][ T4767] CPU: 1 PID: 4767 Comm: syz.3.1509 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 293.060111][ T4767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 293.070181][ T4767] Call Trace: [ 293.073462][ T4767] [ 293.076386][ T4767] __dump_stack+0x21/0x24 [ 293.080718][ T4767] dump_stack_lvl+0xee/0x150 [ 293.085306][ T4767] ? __cfi_dump_stack_lvl+0x8/0x8 [ 293.090333][ T4767] ? fib6_table_lookup+0x873/0x9a0 [ 293.095439][ T4767] dump_stack+0x15/0x24 [ 293.099595][ T4767] should_fail_ex+0x3d4/0x520 [ 293.104268][ T4767] ? dst_alloc+0x16a/0x1e0 [ 293.108683][ T4767] __should_failslab+0xac/0xf0 [ 293.113443][ T4767] should_failslab+0x9/0x20 [ 293.117947][ T4767] kmem_cache_alloc+0x3b/0x330 [ 293.122711][ T4767] ? fib6_select_path+0xfd/0x880 [ 293.127661][ T4767] ? __cfi_ip6_dst_gc+0x10/0x10 [ 293.132515][ T4767] dst_alloc+0x16a/0x1e0 [ 293.136771][ T4767] ip6_pol_route+0x9ae/0x1110 [ 293.141461][ T4767] ? __kernel_text_address+0xd/0x30 [ 293.146684][ T4767] ? ip6_pol_route+0x477/0x1110 [ 293.151537][ T4767] ? arch_stack_walk+0x118/0x150 [ 293.156490][ T4767] ? __cfi_ip6_pol_route+0x10/0x10 [ 293.161620][ T4767] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 293.167094][ T4767] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 293.172986][ T4767] ? __stack_depot_save+0x36/0x480 [ 293.178101][ T4767] ip6_pol_route_output+0x51/0x80 [ 293.183121][ T4767] fib6_rule_lookup+0x311/0x580 [ 293.187974][ T4767] ? __cfi_ip6_pol_route_output+0x10/0x10 [ 293.193690][ T4767] ? __cfi_fib6_rule_lookup+0x10/0x10 [ 293.199066][ T4767] ? flow_hash_from_keys+0x4ca/0x810 [ 293.204351][ T4767] ? __cfi_flow_hash_from_keys+0x10/0x10 [ 293.209982][ T4767] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 293.216145][ T4767] ip6_route_output_flags_noref+0x283/0x340 [ 293.222038][ T4767] ip6_route_output_flags+0x3c/0x200 [ 293.227323][ T4767] ip6_dst_lookup_tail+0x194/0x1460 [ 293.232526][ T4767] ? ip6_pol_route+0xd2c/0x1110 [ 293.237377][ T4767] ? __cfi_ip6_pol_route+0x10/0x10 [ 293.242517][ T4767] ? ip6_dst_lookup+0x60/0x60 [ 293.247200][ T4767] ? stack_trace_save+0x98/0xe0 [ 293.252079][ T4767] ? ip6_pol_route_output+0x51/0x80 [ 293.257280][ T4767] ? fib6_rule_lookup+0x357/0x580 [ 293.262306][ T4767] ? __cfi_ip6_pol_route_output+0x10/0x10 [ 293.268026][ T4767] ip6_dst_lookup+0x53/0x60 [ 293.272535][ T4767] icmpv6_route_lookup+0xc2/0x4a0 [ 293.277555][ T4767] ? icmpv6_xrlim_allow+0x470/0x470 [ 293.282755][ T4767] ? __kasan_check_read+0x11/0x20 [ 293.287780][ T4767] ? icmpv6_xrlim_allow+0x1c3/0x470 [ 293.292974][ T4767] ? __kasan_check_write+0x14/0x20 [ 293.298090][ T4767] ? dst_release+0x54/0x190 [ 293.302604][ T4767] icmp6_send+0xd73/0x1580 [ 293.307015][ T4767] ? icmp6_send+0x8bc/0x1580 [ 293.311606][ T4767] ? __cfi_icmp6_send+0x10/0x10 [ 293.316450][ T4767] ? dst_init+0xc0/0x3d0 [ 293.320694][ T4767] ? dst_alloc+0x191/0x1e0 [ 293.325111][ T4767] ? ip_route_input_rcu+0x13a0/0x2580 [ 293.330494][ T4767] ? ip_route_output_flow+0x12e/0x2e0 [ 293.335866][ T4767] ? ip_tunnel_xmit+0xa4b/0x2700 [ 293.340797][ T4767] ? ipgre_xmit+0x80b/0xb90 [ 293.345300][ T4767] ? dev_hard_start_xmit+0x20b/0x750 [ 293.350586][ T4767] ? __dev_queue_xmit+0x18d9/0x3420 [ 293.355791][ T4767] ? memset+0x35/0x40 [ 293.359773][ T4767] ? xfrm_lookup_with_ifid+0xa02/0x21c0 [ 293.365315][ T4767] icmpv6_ndo_send+0x13f/0x4c0 [ 293.370084][ T4767] ? __cfi_icmpv6_ndo_send+0x10/0x10 [ 293.375425][ T4767] ? ip_route_output_flow+0x1dd/0x2e0 [ 293.380807][ T4767] ? __cfi_ip_route_output_flow+0x10/0x10 [ 293.386531][ T4767] tnl_update_pmtu+0x828/0xc10 [ 293.391306][ T4767] ip_tunnel_xmit+0x133d/0x2700 [ 293.396156][ T4767] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 293.401346][ T4767] ? unwind_get_return_address+0x4d/0x90 [ 293.406973][ T4767] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 293.413126][ T4767] ? gre_build_header+0x25d/0x9b0 [ 293.418157][ T4767] ipgre_xmit+0x80b/0xb90 [ 293.422493][ T4767] dev_hard_start_xmit+0x20b/0x750 [ 293.427616][ T4767] __dev_queue_xmit+0x18d9/0x3420 [ 293.432657][ T4767] ? __dev_queue_xmit+0x250/0x3420 [ 293.437793][ T4767] ? __cfi___dev_queue_xmit+0x10/0x10 [ 293.443258][ T4767] ? __kasan_check_write+0x14/0x20 [ 293.448373][ T4767] ? skb_release_data+0x1d2/0x890 [ 293.453400][ T4767] ? skb_ensure_writable+0x2f8/0x470 [ 293.458687][ T4767] ? __kasan_check_write+0x14/0x20 [ 293.463805][ T4767] ? pskb_expand_head+0xc4a/0x1210 [ 293.468925][ T4767] __bpf_redirect+0x8db/0x1130 [ 293.473782][ T4767] bpf_clone_redirect+0x26a/0x3c0 [ 293.478808][ T4767] bpf_prog_e2f29814702bf05a+0x56/0x5e [ 293.484260][ T4767] ? free_swap_slot+0x30/0x300 [ 293.489027][ T4767] ? __build_skb+0x2d/0x410 [ 293.493531][ T4767] ? build_skb+0x24/0x200 [ 293.497857][ T4767] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 293.503423][ T4767] ? bpf_prog_test_run+0x3e3/0x630 [ 293.508537][ T4767] ? __sys_bpf+0x56d/0x780 [ 293.512957][ T4767] ? __x64_sys_bpf+0x7c/0x90 [ 293.517545][ T4767] ? x64_sys_call+0x488/0x9a0 [ 293.522220][ T4767] ? do_syscall_64+0x4c/0xa0 [ 293.526810][ T4767] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 293.532890][ T4767] ? ktime_get+0x141/0x170 [ 293.537311][ T4767] bpf_test_run+0x2e2/0x740 [ 293.541904][ T4767] ? irqentry_exit+0x37/0x40 [ 293.546492][ T4767] ? sysvec_call_function_single+0x61/0xc0 [ 293.552299][ T4767] ? convert___skb_to_skb+0x5b0/0x5b0 [ 293.557691][ T4767] ? __cfi_eth_type_trans+0x10/0x10 [ 293.562894][ T4767] ? __kasan_check_write+0x14/0x20 [ 293.568015][ T4767] ? convert___skb_to_skb+0x40/0x5b0 [ 293.573307][ T4767] bpf_prog_test_run_skb+0xaec/0x1290 [ 293.578686][ T4767] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 293.584488][ T4767] bpf_prog_test_run+0x3e3/0x630 [ 293.589429][ T4767] ? slab_free_freelist_hook+0xc2/0x190 [ 293.594975][ T4767] ? bpf_prog_query+0x270/0x270 [ 293.599827][ T4767] ? selinux_bpf+0xce/0xf0 [ 293.604247][ T4767] ? security_bpf+0x93/0xb0 [ 293.608755][ T4767] __sys_bpf+0x56d/0x780 [ 293.613002][ T4767] ? bpf_link_show_fdinfo+0x320/0x320 [ 293.618402][ T4767] ? __cfi_ksys_write+0x10/0x10 [ 293.623256][ T4767] ? debug_smp_processor_id+0x17/0x20 [ 293.628625][ T4767] __x64_sys_bpf+0x7c/0x90 [ 293.633041][ T4767] x64_sys_call+0x488/0x9a0 [ 293.637542][ T4767] do_syscall_64+0x4c/0xa0 [ 293.641955][ T4767] ? clear_bhb_loop+0x15/0x70 [ 293.646626][ T4767] ? clear_bhb_loop+0x15/0x70 [ 293.651298][ T4767] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 293.657287][ T4767] RIP: 0033:0x7fb13418e969 [ 293.661692][ T4767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.681294][ T4767] RSP: 002b:00007fb134f99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 293.689706][ T4767] RAX: ffffffffffffffda RBX: 00007fb1343b5fa0 RCX: 00007fb13418e969 [ 293.697678][ T4767] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 293.705647][ T4767] RBP: 00007fb134f99090 R08: 0000000000000000 R09: 0000000000000000 [ 293.713615][ T4767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 293.721583][ T4767] R13: 0000000000000000 R14: 00007fb1343b5fa0 R15: 00007fff08cd78c8 [ 293.729559][ T4767] [ 294.583775][ T4800] FAULT_INJECTION: forcing a failure. [ 294.583775][ T4800] name failslab, interval 1, probability 0, space 0, times 0 [ 294.596558][ T4800] CPU: 1 PID: 4800 Comm: syz.1.1520 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 294.606390][ T4800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 294.616558][ T4800] Call Trace: [ 294.619863][ T4800] [ 294.622806][ T4800] __dump_stack+0x21/0x24 [ 294.627157][ T4800] dump_stack_lvl+0xee/0x150 [ 294.631802][ T4800] ? __cfi_dump_stack_lvl+0x8/0x8 [ 294.636844][ T4800] ? kasan_set_track+0x60/0x70 [ 294.641625][ T4800] ? kasan_save_alloc_info+0x25/0x30 [ 294.647029][ T4800] ? __kasan_slab_alloc+0x72/0x80 [ 294.652075][ T4800] ? slab_post_alloc_hook+0x4f/0x2d0 [ 294.657386][ T4800] ? kmem_cache_alloc+0x16e/0x330 [ 294.662426][ T4800] dump_stack+0x15/0x24 [ 294.666600][ T4800] should_fail_ex+0x3d4/0x520 [ 294.671298][ T4800] __should_failslab+0xac/0xf0 [ 294.676166][ T4800] ? ref_tracker_alloc+0x139/0x430 [ 294.681302][ T4800] should_failslab+0x9/0x20 [ 294.685832][ T4800] __kmem_cache_alloc_node+0x3d/0x2c0 [ 294.691227][ T4800] ? ref_tracker_alloc+0x139/0x430 [ 294.696388][ T4800] kmalloc_trace+0x29/0xb0 [ 294.700824][ T4800] ref_tracker_alloc+0x139/0x430 [ 294.705910][ T4800] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 294.711398][ T4800] ? slab_post_alloc_hook+0x6d/0x2d0 [ 294.716701][ T4800] ? dst_alloc+0x16a/0x1e0 [ 294.721140][ T4800] dst_init+0xc4/0x3d0 [ 294.725227][ T4800] ? __cfi_ip6_dst_gc+0x10/0x10 [ 294.730099][ T4800] dst_alloc+0x191/0x1e0 [ 294.734372][ T4800] ip6_pol_route+0x9ae/0x1110 [ 294.739069][ T4800] ? ip6_pol_route+0x477/0x1110 [ 294.743965][ T4800] ? __cfi_ip6_pol_route+0x10/0x10 [ 294.749111][ T4800] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 294.754594][ T4800] ? stack_trace_save+0x98/0xe0 [ 294.759464][ T4800] ip6_pol_route_output+0x51/0x80 [ 294.764501][ T4800] fib6_rule_lookup+0x311/0x580 [ 294.769384][ T4800] ? __cfi_ip6_pol_route_output+0x10/0x10 [ 294.775120][ T4800] ? __cfi_fib6_rule_lookup+0x10/0x10 [ 294.780510][ T4800] ? __kasan_record_aux_stack+0xb6/0xc0 [ 294.786083][ T4800] ? kasan_record_aux_stack_noalloc+0xb/0x10 [ 294.792088][ T4800] ? call_rcu+0xd4/0xf90 [ 294.796354][ T4800] ? dst_release+0x123/0x190 [ 294.801079][ T4800] ? rt_cache_route+0x2ae/0x320 [ 294.805940][ T4800] ? rt_set_nexthop+0x415/0x790 [ 294.810802][ T4800] ? skb_copy_bits+0x8b/0x780 [ 294.815498][ T4800] ? ip_tunnel_xmit+0xa4b/0x2700 [ 294.820451][ T4800] ? ipgre_xmit+0x80b/0xb90 [ 294.824970][ T4800] ? dev_hard_start_xmit+0x20b/0x750 [ 294.830263][ T4800] ? __dev_queue_xmit+0x18d9/0x3420 [ 294.835476][ T4800] ? __bpf_redirect+0x8db/0x1130 [ 294.840430][ T4800] ? bpf_clone_redirect+0x26a/0x3c0 [ 294.845649][ T4800] ? bpf_test_run+0x2e2/0x740 [ 294.850335][ T4800] ? bpf_prog_test_run_skb+0xaec/0x1290 [ 294.855903][ T4800] ip6_route_output_flags_noref+0x283/0x340 [ 294.861810][ T4800] ip6_route_output_flags+0x3c/0x200 [ 294.867109][ T4800] icmpv6_rt_has_prefsrc+0x4a/0x200 [ 294.872321][ T4800] icmp6_send+0xa82/0x1580 [ 294.876748][ T4800] ? icmp6_send+0x8bc/0x1580 [ 294.881356][ T4800] ? __cfi_icmp6_send+0x10/0x10 [ 294.886218][ T4800] ? dst_alloc+0x191/0x1e0 [ 294.890656][ T4800] ? ip_route_input_rcu+0x13a0/0x2580 [ 294.896053][ T4800] ? __cfi_call_rcu+0x10/0x10 [ 294.900753][ T4800] ? memset+0x35/0x40 [ 294.904775][ T4800] ? xfrm_lookup_with_ifid+0xa02/0x21c0 [ 294.910341][ T4800] icmpv6_ndo_send+0x13f/0x4c0 [ 294.915135][ T4800] ? __cfi_icmpv6_ndo_send+0x10/0x10 [ 294.920449][ T4800] ? ip_route_output_flow+0x1dd/0x2e0 [ 294.925855][ T4800] ? arch_stack_walk+0xfc/0x150 [ 294.930822][ T4800] ? __cfi_ip_route_output_flow+0x10/0x10 [ 294.936570][ T4800] tnl_update_pmtu+0x828/0xc10 [ 294.941371][ T4800] ip_tunnel_xmit+0x133d/0x2700 [ 294.946252][ T4800] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 294.951461][ T4800] ? unwind_get_return_address+0x4d/0x90 [ 294.957117][ T4800] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 294.963337][ T4800] ? gre_build_header+0x25d/0x9b0 [ 294.968393][ T4800] ipgre_xmit+0x80b/0xb90 [ 294.972754][ T4800] dev_hard_start_xmit+0x20b/0x750 [ 294.977900][ T4800] __dev_queue_xmit+0x18d9/0x3420 [ 294.982947][ T4800] ? __dev_queue_xmit+0x250/0x3420 [ 294.988082][ T4800] ? __cfi___dev_queue_xmit+0x10/0x10 [ 294.993479][ T4800] ? __kasan_check_write+0x14/0x20 [ 294.998625][ T4800] ? skb_release_data+0x1d2/0x890 [ 295.003669][ T4800] ? skb_ensure_writable+0x2f8/0x470 [ 295.008976][ T4800] ? __kasan_check_write+0x14/0x20 [ 295.014123][ T4800] ? pskb_expand_head+0xc4a/0x1210 [ 295.019266][ T4800] __bpf_redirect+0x8db/0x1130 [ 295.024056][ T4800] bpf_clone_redirect+0x26a/0x3c0 [ 295.029110][ T4800] bpf_prog_e2f29814702bf05a+0x56/0x5e [ 295.034602][ T4800] ? free_swap_slot+0x30/0x300 [ 295.039395][ T4800] ? __build_skb+0x2d/0x410 [ 295.043914][ T4800] ? build_skb+0x24/0x200 [ 295.048260][ T4800] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 295.053819][ T4800] ? bpf_prog_test_run+0x3e3/0x630 [ 295.058961][ T4800] ? __sys_bpf+0x56d/0x780 [ 295.063398][ T4800] ? __x64_sys_bpf+0x7c/0x90 [ 295.068012][ T4800] ? x64_sys_call+0x488/0x9a0 [ 295.072710][ T4800] ? do_syscall_64+0x4c/0xa0 [ 295.075349][ T4794] GPL: port 1(erspan0) entered blocking state [ 295.077315][ T4800] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 295.089547][ T4800] ? ktime_get+0x141/0x170 [ 295.094001][ T4800] bpf_test_run+0x2e2/0x740 [ 295.098535][ T4800] ? kasan_save_alloc_info+0x25/0x30 [ 295.103844][ T4800] ? __kasan_slab_alloc+0x72/0x80 [ 295.105820][ T4794] GPL: port 1(erspan0) entered disabled state [ 295.108883][ T4800] ? convert___skb_to_skb+0x5b0/0x5b0 [ 295.108910][ T4800] ? __cfi_eth_type_trans+0x10/0x10 [ 295.108932][ T4800] ? __kasan_check_write+0x14/0x20 [ 295.130664][ T4800] ? convert___skb_to_skb+0x40/0x5b0 [ 295.135979][ T4800] bpf_prog_test_run_skb+0xaec/0x1290 [ 295.141372][ T4800] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 295.147193][ T4800] bpf_prog_test_run+0x3e3/0x630 [ 295.152158][ T4800] ? slab_free_freelist_hook+0xc2/0x190 [ 295.156374][ T4794] device erspan0 entered promiscuous mode [ 295.157724][ T4800] ? bpf_prog_query+0x270/0x270 [ 295.157759][ T4800] ? selinux_bpf+0xce/0xf0 [ 295.172723][ T4800] ? security_bpf+0x93/0xb0 [ 295.177280][ T4800] __sys_bpf+0x56d/0x780 [ 295.181636][ T4800] ? bpf_link_show_fdinfo+0x320/0x320 [ 295.187039][ T4800] ? __cfi_ksys_write+0x10/0x10 [ 295.191917][ T4800] ? debug_smp_processor_id+0x17/0x20 [ 295.197317][ T4800] __x64_sys_bpf+0x7c/0x90 [ 295.201759][ T4800] x64_sys_call+0x488/0x9a0 [ 295.206283][ T4800] do_syscall_64+0x4c/0xa0 [ 295.210724][ T4800] ? clear_bhb_loop+0x15/0x70 [ 295.215414][ T4800] ? clear_bhb_loop+0x15/0x70 [ 295.220105][ T4800] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 295.226027][ T4800] RIP: 0033:0x7fc96c98e969 [ 295.230461][ T4800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.250094][ T4800] RSP: 002b:00007fc96d76a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 295.258538][ T4800] RAX: ffffffffffffffda RBX: 00007fc96cbb5fa0 RCX: 00007fc96c98e969 [ 295.266541][ T4800] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 295.274528][ T4800] RBP: 00007fc96d76a090 R08: 0000000000000000 R09: 0000000000000000 [ 295.282519][ T4800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 295.290518][ T4800] R13: 0000000000000000 R14: 00007fc96cbb5fa0 R15: 00007ffd4fd641a8 [ 295.298521][ T4800] [ 295.301604][ T4800] memory allocation failure, unreliable refcount tracker. [ 295.695623][ T4808] device sit0 left promiscuous mode [ 296.782835][ T4840] bond_slave_1: mtu less than device minimum [ 297.185707][ T4850] device syzkaller0 entered promiscuous mode [ 300.509706][ T4895] device sit0 entered promiscuous mode [ 301.165282][ T4897] device wg2 left promiscuous mode [ 301.203871][ T4900] syz.3.1547[4900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.203971][ T4900] syz.3.1547[4900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.301765][ T4897] device wg2 entered promiscuous mode [ 302.361752][ T4922] device syzkaller0 entered promiscuous mode [ 302.771140][ T4920] device syzkaller0 entered promiscuous mode [ 302.845415][ T4927] device pim6reg1 entered promiscuous mode [ 302.910097][ T4933] FAULT_INJECTION: forcing a failure. [ 302.910097][ T4933] name failslab, interval 1, probability 0, space 0, times 0 [ 302.922793][ T4933] CPU: 0 PID: 4933 Comm: syz.2.1557 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 302.932618][ T4933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 302.942949][ T4933] Call Trace: [ 302.946232][ T4933] [ 302.949160][ T4933] __dump_stack+0x21/0x24 [ 302.953502][ T4933] dump_stack_lvl+0xee/0x150 [ 302.958100][ T4933] ? __cfi_dump_stack_lvl+0x8/0x8 [ 302.963132][ T4933] ? bpf_prog_6893982b85ceadf7+0x56/0x5b [ 302.968765][ T4933] ? bpf_test_run+0x2e2/0x740 [ 302.973437][ T4933] ? bpf_prog_test_run_skb+0xaec/0x1290 [ 302.978979][ T4933] ? __sys_bpf+0x56d/0x780 [ 302.983395][ T4933] ? __x64_sys_bpf+0x7c/0x90 [ 302.987984][ T4933] ? x64_sys_call+0x488/0x9a0 [ 302.992663][ T4933] ? do_syscall_64+0x4c/0xa0 [ 302.997255][ T4933] dump_stack+0x15/0x24 [ 303.001412][ T4933] should_fail_ex+0x3d4/0x520 [ 303.006086][ T4933] ? dst_alloc+0x16a/0x1e0 [ 303.010505][ T4933] __should_failslab+0xac/0xf0 [ 303.015266][ T4933] should_failslab+0x9/0x20 [ 303.019772][ T4933] kmem_cache_alloc+0x3b/0x330 [ 303.024535][ T4933] dst_alloc+0x16a/0x1e0 [ 303.028779][ T4933] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 303.034854][ T4933] ip_route_output_key_hash+0x131/0x1e0 [ 303.040402][ T4933] ? __cfi_ip_route_output_key_hash+0x10/0x10 [ 303.046473][ T4933] ? 0xffffffffa0000960 [ 303.050623][ T4933] vti6_tnl_xmit+0xd9c/0x1980 [ 303.055304][ T4933] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 303.061456][ T4933] ? skb_network_protocol+0x505/0x750 [ 303.066825][ T4933] ? __cfi_vti6_tnl_xmit+0x10/0x10 [ 303.071944][ T4933] dev_hard_start_xmit+0x20b/0x750 [ 303.077054][ T4933] __dev_queue_xmit+0x18d9/0x3420 [ 303.082075][ T4933] ? __dev_queue_xmit+0x250/0x3420 [ 303.087181][ T4933] ? __cfi___dev_queue_xmit+0x10/0x10 [ 303.092550][ T4933] ? __kasan_check_write+0x14/0x20 [ 303.097668][ T4933] ? skb_release_data+0x1d2/0x890 [ 303.102697][ T4933] ? skb_ensure_writable+0x2f8/0x470 [ 303.107995][ T4933] ? __kasan_check_write+0x14/0x20 [ 303.113117][ T4933] ? pskb_expand_head+0xc4a/0x1210 [ 303.118233][ T4933] __bpf_redirect+0x8db/0x1130 [ 303.123083][ T4933] bpf_clone_redirect+0x26a/0x3c0 [ 303.128109][ T4933] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 303.133564][ T4933] ? free_swap_slot+0x30/0x300 [ 303.138329][ T4933] ? __build_skb+0x2d/0x410 [ 303.142828][ T4933] ? build_skb+0x24/0x200 [ 303.147153][ T4933] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 303.152693][ T4933] ? bpf_prog_test_run+0x3e3/0x630 [ 303.157810][ T4933] ? __sys_bpf+0x56d/0x780 [ 303.162225][ T4933] ? __x64_sys_bpf+0x7c/0x90 [ 303.166813][ T4933] ? x64_sys_call+0x488/0x9a0 [ 303.171484][ T4933] ? do_syscall_64+0x4c/0xa0 [ 303.176073][ T4933] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 303.182148][ T4933] ? __kasan_check_read+0x11/0x20 [ 303.187178][ T4933] ? bpf_test_timer_continue+0x147/0x4a0 [ 303.192809][ T4933] bpf_test_run+0x2e2/0x740 [ 303.197306][ T4933] ? kasan_save_alloc_info+0x25/0x30 [ 303.202588][ T4933] ? __kasan_slab_alloc+0x72/0x80 [ 303.207610][ T4933] ? __build_skb+0x2d/0x410 [ 303.212112][ T4933] ? convert___skb_to_skb+0x5b0/0x5b0 [ 303.217481][ T4933] ? __cfi_eth_type_trans+0x10/0x10 [ 303.222693][ T4933] ? __kasan_check_write+0x14/0x20 [ 303.227826][ T4933] ? convert___skb_to_skb+0x40/0x5b0 [ 303.233128][ T4933] bpf_prog_test_run_skb+0xaec/0x1290 [ 303.238504][ T4933] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 303.244305][ T4933] bpf_prog_test_run+0x3e3/0x630 [ 303.249246][ T4933] ? slab_free_freelist_hook+0xc2/0x190 [ 303.254793][ T4933] ? bpf_prog_query+0x270/0x270 [ 303.259671][ T4933] ? selinux_bpf+0xce/0xf0 [ 303.264088][ T4933] ? security_bpf+0x93/0xb0 [ 303.268585][ T4933] __sys_bpf+0x56d/0x780 [ 303.272830][ T4933] ? bpf_link_show_fdinfo+0x320/0x320 [ 303.278244][ T4933] ? __cfi_ksys_write+0x10/0x10 [ 303.283098][ T4933] ? debug_smp_processor_id+0x17/0x20 [ 303.288481][ T4933] __x64_sys_bpf+0x7c/0x90 [ 303.292900][ T4933] x64_sys_call+0x488/0x9a0 [ 303.297403][ T4933] do_syscall_64+0x4c/0xa0 [ 303.301822][ T4933] ? clear_bhb_loop+0x15/0x70 [ 303.306495][ T4933] ? clear_bhb_loop+0x15/0x70 [ 303.311168][ T4933] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 303.317063][ T4933] RIP: 0033:0x7f06d798e969 [ 303.321473][ T4933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 303.341088][ T4933] RSP: 002b:00007f06d8858038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 303.349501][ T4933] RAX: ffffffffffffffda RBX: 00007f06d7bb5fa0 RCX: 00007f06d798e969 [ 303.357654][ T4933] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 303.365629][ T4933] RBP: 00007f06d8858090 R08: 0000000000000000 R09: 0000000000000000 [ 303.373595][ T4933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 303.381562][ T4933] R13: 0000000000000000 R14: 00007f06d7bb5fa0 R15: 00007ffd5ec01de8 [ 303.389539][ T4933] [ 304.368731][ T4948] syz.1.1562[4948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.368821][ T4948] syz.1.1562[4948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.465774][ T4939] device wg2 left promiscuous mode [ 304.520844][ T4948] device wg2 entered promiscuous mode [ 304.922218][ T4972] device sit0 left promiscuous mode [ 305.152227][ T4979] device sit0 entered promiscuous mode [ 306.244985][ T5014] device syzkaller0 entered promiscuous mode [ 306.262807][ T5012] device syzkaller0 entered promiscuous mode [ 306.481082][ T5037] FAULT_INJECTION: forcing a failure. [ 306.481082][ T5037] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 306.494228][ T5037] CPU: 0 PID: 5037 Comm: syz.1.1593 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 306.504048][ T5037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 306.514117][ T5037] Call Trace: [ 306.517398][ T5037] [ 306.520458][ T5037] __dump_stack+0x21/0x24 [ 306.524888][ T5037] dump_stack_lvl+0xee/0x150 [ 306.529507][ T5037] ? __cfi_dump_stack_lvl+0x8/0x8 [ 306.534544][ T5037] ? __kasan_check_write+0x14/0x20 [ 306.539662][ T5037] ? _raw_spin_lock_irq+0x8f/0xe0 [ 306.544733][ T5037] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 306.550302][ T5037] dump_stack+0x15/0x24 [ 306.554476][ T5037] should_fail_ex+0x3d4/0x520 [ 306.559253][ T5037] should_fail+0xb/0x10 [ 306.563416][ T5037] should_fail_usercopy+0x1a/0x20 [ 306.568446][ T5037] copy_page_from_iter_atomic+0x35c/0x1210 [ 306.574256][ T5037] ? __cfi_copy_page_from_iter_atomic+0x10/0x10 [ 306.580535][ T5037] ? __kasan_check_read+0x11/0x20 [ 306.585568][ T5037] ? shmem_write_begin+0x151/0x2c0 [ 306.590678][ T5037] generic_perform_write+0x348/0x6d0 [ 306.595986][ T5037] ? __cfi_generic_perform_write+0x10/0x10 [ 306.601885][ T5037] ? __cfi_file_update_time+0x10/0x10 [ 306.607435][ T5037] __generic_file_write_iter+0x227/0x580 [ 306.613077][ T5037] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 306.618802][ T5037] ? __cfi___generic_file_write_iter+0x10/0x10 [ 306.624954][ T5037] ? rwsem_write_trylock+0x130/0x300 [ 306.630247][ T5037] ? generic_write_checks_count+0x3c6/0x4a0 [ 306.636141][ T5037] ? generic_write_checks+0xca/0x100 [ 306.641428][ T5037] generic_file_write_iter+0xae/0x310 [ 306.646795][ T5037] vfs_write+0x5db/0xca0 [ 306.651037][ T5037] ? slab_free_freelist_hook+0xc2/0x190 [ 306.656590][ T5037] ? __cfi_vfs_write+0x10/0x10 [ 306.661365][ T5037] ? __cfi_mutex_lock+0x10/0x10 [ 306.666224][ T5037] ? __fdget_pos+0x2cd/0x380 [ 306.670816][ T5037] ? ksys_write+0x71/0x240 [ 306.675234][ T5037] ksys_write+0x140/0x240 [ 306.679568][ T5037] ? __cfi_ksys_write+0x10/0x10 [ 306.684422][ T5037] ? debug_smp_processor_id+0x17/0x20 [ 306.689795][ T5037] __x64_sys_write+0x7b/0x90 [ 306.694387][ T5037] x64_sys_call+0x27b/0x9a0 [ 306.698892][ T5037] do_syscall_64+0x4c/0xa0 [ 306.703309][ T5037] ? clear_bhb_loop+0x15/0x70 [ 306.707990][ T5037] ? clear_bhb_loop+0x15/0x70 [ 306.712660][ T5037] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 306.718566][ T5037] RIP: 0033:0x7fc96c98e969 [ 306.722979][ T5037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.742667][ T5037] RSP: 002b:00007fc96d76a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 306.751080][ T5037] RAX: ffffffffffffffda RBX: 00007fc96cbb5fa0 RCX: 00007fc96c98e969 [ 306.759050][ T5037] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000008 [ 306.767015][ T5037] RBP: 00007fc96d76a090 R08: 0000000000000000 R09: 0000000000000000 [ 306.774981][ T5037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 306.782948][ T5037] R13: 0000000000000000 R14: 00007fc96cbb5fa0 R15: 00007ffd4fd641a8 [ 306.790924][ T5037] [ 307.012681][ T5045] device pim6reg1 entered promiscuous mode [ 307.704572][ T5079] FAULT_INJECTION: forcing a failure. [ 307.704572][ T5079] name failslab, interval 1, probability 0, space 0, times 0 [ 307.717503][ T5079] CPU: 1 PID: 5079 Comm: syz.2.1609 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 307.727342][ T5079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 307.737405][ T5079] Call Trace: [ 307.740686][ T5079] [ 307.743610][ T5079] __dump_stack+0x21/0x24 [ 307.747942][ T5079] dump_stack_lvl+0xee/0x150 [ 307.752535][ T5079] ? __cfi_dump_stack_lvl+0x8/0x8 [ 307.757558][ T5079] ? __cfi_synchronize_rcu_expedited+0x10/0x10 [ 307.763713][ T5079] ? bpf_dispatcher_xdp_func+0x20/0x30 [ 307.769177][ T5079] dump_stack+0x15/0x24 [ 307.773332][ T5079] should_fail_ex+0x3d4/0x520 [ 307.778005][ T5079] __should_failslab+0xac/0xf0 [ 307.782766][ T5079] ? kvmalloc_node+0x294/0x480 [ 307.787533][ T5079] should_failslab+0x9/0x20 [ 307.792040][ T5079] __kmem_cache_alloc_node+0x3d/0x2c0 [ 307.797412][ T5079] ? mutex_unlock+0x89/0x220 [ 307.802010][ T5079] ? kvmalloc_node+0x294/0x480 [ 307.806778][ T5079] __kmalloc_node+0xa1/0x1e0 [ 307.811368][ T5079] kvmalloc_node+0x294/0x480 [ 307.815961][ T5079] ? __cfi_kvmalloc_node+0x10/0x10 [ 307.821074][ T5079] ? synchronize_rcu+0x93/0x3a0 [ 307.825921][ T5079] ? schedule_delayed_monitor_work+0x90/0x160 [ 307.831991][ T5079] bpf_test_run_xdp_live+0x185/0x1a00 [ 307.837399][ T5079] ? __cfi_mutex_unlock+0x10/0x10 [ 307.842531][ T5079] ? text_poke_copy+0x7b/0x90 [ 307.847207][ T5079] ? 0xffffffffa0004440 [ 307.851358][ T5079] ? 0xffffffffa0004440 [ 307.855530][ T5079] ? bpf_dispatcher_change_prog+0xb30/0xd80 [ 307.861444][ T5079] ? xdp_convert_md_to_buff+0x370/0x370 [ 307.867011][ T5079] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 307.872911][ T5079] ? __kasan_check_write+0x14/0x20 [ 307.878031][ T5079] ? _copy_from_user+0x8f/0xc0 [ 307.882883][ T5079] bpf_prog_test_run_xdp+0x6f1/0xe50 [ 307.888175][ T5079] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 307.893985][ T5079] ? __kasan_check_write+0x14/0x20 [ 307.899116][ T5079] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 307.904939][ T5079] bpf_prog_test_run+0x3e3/0x630 [ 307.909891][ T5079] ? slab_free_freelist_hook+0xc2/0x190 [ 307.915449][ T5079] ? bpf_prog_query+0x270/0x270 [ 307.920395][ T5079] ? selinux_bpf+0xce/0xf0 [ 307.924818][ T5079] ? security_bpf+0x93/0xb0 [ 307.929320][ T5079] __sys_bpf+0x56d/0x780 [ 307.933574][ T5079] ? bpf_link_show_fdinfo+0x320/0x320 [ 307.938956][ T5079] ? __cfi_ksys_write+0x10/0x10 [ 307.943814][ T5079] ? debug_smp_processor_id+0x17/0x20 [ 307.949186][ T5079] __x64_sys_bpf+0x7c/0x90 [ 307.953611][ T5079] x64_sys_call+0x488/0x9a0 [ 307.958115][ T5079] do_syscall_64+0x4c/0xa0 [ 307.962533][ T5079] ? clear_bhb_loop+0x15/0x70 [ 307.967202][ T5079] ? clear_bhb_loop+0x15/0x70 [ 307.971876][ T5079] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 307.977780][ T5079] RIP: 0033:0x7f06d798e969 [ 307.982209][ T5079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.001915][ T5079] RSP: 002b:00007f06d8858038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 308.010340][ T5079] RAX: ffffffffffffffda RBX: 00007f06d7bb5fa0 RCX: 00007f06d798e969 [ 308.018310][ T5079] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 308.026284][ T5079] RBP: 00007f06d8858090 R08: 0000000000000000 R09: 0000000000000000 [ 308.034256][ T5079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.042436][ T5079] R13: 0000000000000000 R14: 00007f06d7bb5fa0 R15: 00007ffd5ec01de8 [ 308.050413][ T5079] [ 308.163102][ T5082] device syzkaller0 entered promiscuous mode [ 308.205580][ T5091] device sit0 left promiscuous mode [ 308.285166][ T5091] device sit0 entered promiscuous mode [ 308.489376][ T5103] device pim6reg1 entered promiscuous mode [ 308.543792][ T5103] device sit0 left promiscuous mode [ 308.751841][ T5107] device sit0 entered promiscuous mode [ 309.475577][ T5127] FAULT_INJECTION: forcing a failure. [ 309.475577][ T5127] name failslab, interval 1, probability 0, space 0, times 0 [ 309.519738][ T5127] CPU: 0 PID: 5127 Comm: syz.0.1622 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 309.529606][ T5127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 309.539678][ T5127] Call Trace: [ 309.542965][ T5127] [ 309.545905][ T5127] __dump_stack+0x21/0x24 [ 309.550261][ T5127] dump_stack_lvl+0xee/0x150 [ 309.554878][ T5127] ? __cfi_dump_stack_lvl+0x8/0x8 [ 309.560005][ T5127] ? is_bpf_text_address+0x177/0x190 [ 309.565301][ T5127] ? kernel_text_address+0xa0/0xd0 [ 309.570466][ T5127] dump_stack+0x15/0x24 [ 309.574626][ T5127] should_fail_ex+0x3d4/0x520 [ 309.579327][ T5127] __should_failslab+0xac/0xf0 [ 309.584087][ T5127] ? bpf_tracing_prog_attach+0x338/0xfa0 [ 309.589714][ T5127] should_failslab+0x9/0x20 [ 309.594245][ T5127] __kmem_cache_alloc_node+0x3d/0x2c0 [ 309.599614][ T5127] ? stack_trace_save+0x98/0xe0 [ 309.604461][ T5127] ? bpf_tracing_prog_attach+0x338/0xfa0 [ 309.610086][ T5127] kmalloc_trace+0x29/0xb0 [ 309.614502][ T5127] bpf_tracing_prog_attach+0x338/0xfa0 [ 309.619954][ T5127] ? bpf_raw_tp_link_attach+0x550/0x550 [ 309.625493][ T5127] ? memcpy+0x56/0x70 [ 309.629477][ T5127] ? avc_has_perm_noaudit+0x2f4/0x460 [ 309.634854][ T5127] bpf_raw_tp_link_attach+0x3a5/0x550 [ 309.640232][ T5127] ? bpf_insn_prepare_dump+0x840/0x840 [ 309.645694][ T5127] ? __kasan_check_write+0x14/0x20 [ 309.650813][ T5127] bpf_raw_tracepoint_open+0x258/0x480 [ 309.656279][ T5127] ? slab_free_freelist_hook+0xc2/0x190 [ 309.661826][ T5127] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 309.667627][ T5127] ? selinux_bpf+0xce/0xf0 [ 309.672048][ T5127] ? security_bpf+0x93/0xb0 [ 309.676549][ T5127] __sys_bpf+0x4d1/0x780 [ 309.680830][ T5127] ? bpf_link_show_fdinfo+0x320/0x320 [ 309.686209][ T5127] ? __cfi_ksys_write+0x10/0x10 [ 309.691062][ T5127] ? debug_smp_processor_id+0x17/0x20 [ 309.696435][ T5127] __x64_sys_bpf+0x7c/0x90 [ 309.700851][ T5127] x64_sys_call+0x488/0x9a0 [ 309.705357][ T5127] do_syscall_64+0x4c/0xa0 [ 309.709771][ T5127] ? clear_bhb_loop+0x15/0x70 [ 309.714617][ T5127] ? clear_bhb_loop+0x15/0x70 [ 309.719293][ T5127] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 309.725192][ T5127] RIP: 0033:0x7fccb6d8e969 [ 309.729603][ T5127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.749207][ T5127] RSP: 002b:00007fccb7b73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 309.757635][ T5127] RAX: ffffffffffffffda RBX: 00007fccb6fb5fa0 RCX: 00007fccb6d8e969 [ 309.765634][ T5127] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 309.773687][ T5127] RBP: 00007fccb7b73090 R08: 0000000000000000 R09: 0000000000000000 [ 309.781654][ T5127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 309.789622][ T5127] R13: 0000000000000000 R14: 00007fccb6fb5fa0 R15: 00007ffc0c57ea98 [ 309.797598][ T5127] [ 310.760585][ T5193] FAULT_INJECTION: forcing a failure. [ 310.760585][ T5193] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 310.774121][ T5193] CPU: 1 PID: 5193 Comm: syz.2.1647 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 310.783957][ T5193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 310.794227][ T5193] Call Trace: [ 310.797516][ T5193] [ 310.800459][ T5193] __dump_stack+0x21/0x24 [ 310.804792][ T5193] dump_stack_lvl+0xee/0x150 [ 310.809383][ T5193] ? __cfi_dump_stack_lvl+0x8/0x8 [ 310.814409][ T5193] ? xas_create+0x618/0x16d0 [ 310.819012][ T5193] ? shmem_add_to_page_cache+0x6d8/0xac0 [ 310.824644][ T5193] dump_stack+0x15/0x24 [ 310.828800][ T5193] should_fail_ex+0x3d4/0x520 [ 310.833601][ T5193] should_fail_alloc_page+0x61/0x90 [ 310.838817][ T5193] prepare_alloc_pages+0x148/0x5f0 [ 310.843988][ T5193] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 310.849186][ T5193] __alloc_pages+0x115/0x3a0 [ 310.853781][ T5193] ? __cfi___alloc_pages+0x10/0x10 [ 310.858890][ T5193] ? percpu_counter_add_batch+0x13c/0x160 [ 310.864613][ T5193] __folio_alloc+0x12/0x40 [ 310.869034][ T5193] shmem_alloc_and_acct_folio+0x650/0x870 [ 310.874757][ T5193] ? shmem_replace_folio+0x590/0x590 [ 310.880046][ T5193] ? xas_load+0x39e/0x3b0 [ 310.884377][ T5193] ? __filemap_get_folio+0x93e/0x980 [ 310.889667][ T5193] ? __cfi___filemap_get_folio+0x10/0x10 [ 310.895301][ T5193] ? do_user_addr_fault+0x9ac/0x1050 [ 310.900589][ T5193] shmem_get_folio_gfp+0x119f/0x2230 [ 310.905891][ T5193] shmem_write_begin+0xea/0x2c0 [ 310.910743][ T5193] generic_perform_write+0x2f6/0x6d0 [ 310.916098][ T5193] ? __cfi_generic_perform_write+0x10/0x10 [ 310.921900][ T5193] ? __cfi_file_update_time+0x10/0x10 [ 310.927269][ T5193] __generic_file_write_iter+0x227/0x580 [ 310.932898][ T5193] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 310.938627][ T5193] ? __cfi___generic_file_write_iter+0x10/0x10 [ 310.944777][ T5193] ? rwsem_write_trylock+0x130/0x300 [ 310.950069][ T5193] ? generic_write_checks_count+0x3c6/0x4a0 [ 310.955964][ T5193] ? generic_write_checks+0xca/0x100 [ 310.961245][ T5193] generic_file_write_iter+0xae/0x310 [ 310.966617][ T5193] vfs_write+0x5db/0xca0 [ 310.970859][ T5193] ? slab_free_freelist_hook+0xc2/0x190 [ 310.976428][ T5193] ? __cfi_vfs_write+0x10/0x10 [ 310.981198][ T5193] ? __cfi_mutex_lock+0x10/0x10 [ 310.986068][ T5193] ? __fdget_pos+0x2cd/0x380 [ 310.990662][ T5193] ? ksys_write+0x71/0x240 [ 310.995081][ T5193] ksys_write+0x140/0x240 [ 310.999416][ T5193] ? __cfi_ksys_write+0x10/0x10 [ 311.004275][ T5193] ? debug_smp_processor_id+0x17/0x20 [ 311.009648][ T5193] __x64_sys_write+0x7b/0x90 [ 311.014244][ T5193] x64_sys_call+0x27b/0x9a0 [ 311.018749][ T5193] do_syscall_64+0x4c/0xa0 [ 311.023173][ T5193] ? clear_bhb_loop+0x15/0x70 [ 311.027845][ T5193] ? clear_bhb_loop+0x15/0x70 [ 311.032520][ T5193] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 311.038418][ T5193] RIP: 0033:0x7f06d798e969 [ 311.042915][ T5193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.062518][ T5193] RSP: 002b:00007f06d8858038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 311.070988][ T5193] RAX: ffffffffffffffda RBX: 00007f06d7bb5fa0 RCX: 00007f06d798e969 [ 311.078969][ T5193] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000006 [ 311.086938][ T5193] RBP: 00007f06d8858090 R08: 0000000000000000 R09: 0000000000000000 [ 311.094903][ T5193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 311.102872][ T5193] R13: 0000000000000000 R14: 00007f06d7bb5fa0 R15: 00007ffd5ec01de8 [ 311.110848][ T5193] [ 312.331426][ T5245] device syzkaller0 entered promiscuous mode [ 312.345502][ T5240] device veth1_macvtap left promiscuous mode [ 312.352088][ T5240] device macsec0 entered promiscuous mode [ 313.320827][ T5262] syz.1.1672 uses obsolete (PF_INET,SOCK_PACKET) [ 313.507712][ T28] audit: type=1400 audit(1746668049.254:150): avc: denied { append } for pid=5273 comm="syz.1.1679" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 313.607745][ T5278] device macsec0 left promiscuous mode [ 315.059188][ T5311] FAULT_INJECTION: forcing a failure. [ 315.059188][ T5311] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 315.080392][ T5311] CPU: 1 PID: 5311 Comm: syz.3.1693 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 315.090422][ T5311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 315.100580][ T5311] Call Trace: [ 315.103870][ T5311] [ 315.106808][ T5311] __dump_stack+0x21/0x24 [ 315.111170][ T5311] dump_stack_lvl+0xee/0x150 [ 315.115803][ T5311] ? __cfi_dump_stack_lvl+0x8/0x8 [ 315.120857][ T5311] ? migrate_enable+0x19c/0x280 [ 315.125726][ T5311] dump_stack+0x15/0x24 [ 315.129906][ T5311] should_fail_ex+0x3d4/0x520 [ 315.134598][ T5311] should_fail+0xb/0x10 [ 315.138767][ T5311] should_fail_usercopy+0x1a/0x20 [ 315.143808][ T5311] _copy_from_user+0x1e/0xc0 [ 315.148409][ T5311] generic_map_update_batch+0x458/0x780 [ 315.153978][ T5311] ? __cfi_generic_map_update_batch+0x10/0x10 [ 315.160082][ T5311] ? __fdget+0x19c/0x220 [ 315.164348][ T5311] ? __cfi_generic_map_update_batch+0x10/0x10 [ 315.170441][ T5311] bpf_map_do_batch+0x48c/0x620 [ 315.175307][ T5311] __sys_bpf+0x624/0x780 [ 315.179574][ T5311] ? bpf_link_show_fdinfo+0x320/0x320 [ 315.184973][ T5311] ? __cfi_ksys_write+0x10/0x10 [ 315.189859][ T5311] ? debug_smp_processor_id+0x17/0x20 [ 315.195257][ T5311] __x64_sys_bpf+0x7c/0x90 [ 315.199697][ T5311] x64_sys_call+0x488/0x9a0 [ 315.204217][ T5311] do_syscall_64+0x4c/0xa0 [ 315.208654][ T5311] ? clear_bhb_loop+0x15/0x70 [ 315.213341][ T5311] ? clear_bhb_loop+0x15/0x70 [ 315.218031][ T5311] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 315.223948][ T5311] RIP: 0033:0x7fb13418e969 [ 315.228404][ T5311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 315.248021][ T5311] RSP: 002b:00007fb134f99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 315.256456][ T5311] RAX: ffffffffffffffda RBX: 00007fb1343b5fa0 RCX: 00007fb13418e969 [ 315.264443][ T5311] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 315.272439][ T5311] RBP: 00007fb134f99090 R08: 0000000000000000 R09: 0000000000000000 [ 315.280434][ T5311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 315.288426][ T5311] R13: 0000000000000000 R14: 00007fb1343b5fa0 R15: 00007fff08cd78c8 [ 315.296424][ T5311] [ 315.310043][ T5298] GPL: port 1(erspan0) entered blocking state [ 315.316288][ T5298] GPL: port 1(erspan0) entered forwarding state [ 315.378925][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 315.473357][ T5324] device veth0_vlan left promiscuous mode [ 315.487245][ T5324] device veth0_vlan entered promiscuous mode [ 315.527878][ T5313] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.535045][ T5313] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.556299][ T5313] device bridge_slave_0 entered promiscuous mode [ 315.594190][ T5313] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.647846][ T5313] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.656797][ T5313] device bridge_slave_1 entered promiscuous mode [ 317.482311][ T5338] tap0: tun_chr_ioctl cmd 1074025675 [ 317.511858][ T5338] tap0: persist enabled [ 317.642941][ T28] audit: type=1400 audit(1746668053.394:151): avc: denied { create } for pid=5313 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 317.716950][ T28] audit: type=1400 audit(1746668053.424:152): avc: denied { write } for pid=5313 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 317.787726][ T28] audit: type=1400 audit(1746668053.424:153): avc: denied { read } for pid=5313 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 317.844861][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 317.858224][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.882613][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.900238][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.918412][ T740] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.925534][ T740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.964707][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.982993][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.993945][ T740] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.001041][ T740] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.065246][ T5361] device bridge_slave_1 left promiscuous mode [ 318.072276][ T5361] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.090667][ T5361] device bridge_slave_0 left promiscuous mode [ 318.098120][ T5361] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.217221][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 318.225901][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.234181][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 318.487118][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 318.498303][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 318.526584][ T5313] device veth0_vlan entered promiscuous mode [ 318.539016][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 318.547297][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 318.586429][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 318.594124][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 318.621050][ T5371] FAULT_INJECTION: forcing a failure. [ 318.621050][ T5371] name failslab, interval 1, probability 0, space 0, times 0 [ 318.634349][ T5371] CPU: 0 PID: 5371 Comm: syz.4.1714 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 318.644187][ T5371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 318.654262][ T5371] Call Trace: [ 318.657553][ T5371] [ 318.660494][ T5371] __dump_stack+0x21/0x24 [ 318.664842][ T5371] dump_stack_lvl+0xee/0x150 [ 318.669451][ T5371] ? __cfi_dump_stack_lvl+0x8/0x8 [ 318.674586][ T5371] ? kasan_save_alloc_info+0x25/0x30 [ 318.679885][ T5371] dump_stack+0x15/0x24 [ 318.684056][ T5371] should_fail_ex+0x3d4/0x520 [ 318.688744][ T5371] __should_failslab+0xac/0xf0 [ 318.693520][ T5371] should_failslab+0x9/0x20 [ 318.698043][ T5371] slab_pre_alloc_hook+0x30/0x1e0 [ 318.703083][ T5371] ? __cfi__raw_spin_lock+0x10/0x10 [ 318.708296][ T5371] kmem_cache_alloc_lru+0x49/0x280 [ 318.713417][ T5371] ? iget_locked+0x1f3/0x8b0 [ 318.718018][ T5371] iget_locked+0x1f3/0x8b0 [ 318.722444][ T5371] kernfs_get_inode+0x4b/0x6f0 [ 318.727216][ T5371] ? kernfs_find_ns+0x463/0x4b0 [ 318.732079][ T5371] kernfs_iop_lookup+0x20f/0x310 [ 318.737038][ T5371] ? __cfi_kernfs_iop_lookup+0x10/0x10 [ 318.742517][ T5371] path_openat+0xff3/0x2f50 [ 318.747050][ T5371] ? do_filp_open+0x3c0/0x3c0 [ 318.751737][ T5371] do_filp_open+0x1c1/0x3c0 [ 318.756250][ T5371] ? __cfi_do_filp_open+0x10/0x10 [ 318.761286][ T5371] ? alloc_fd+0x4e6/0x590 [ 318.765641][ T5371] do_sys_openat2+0x185/0x7e0 [ 318.770334][ T5371] ? __cfi_preempt_schedule_irq+0x10/0x10 [ 318.776080][ T5371] ? kvm_sched_clock_read+0x18/0x40 [ 318.781294][ T5371] ? do_sys_open+0xe0/0xe0 [ 318.785720][ T5371] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 318.791536][ T5371] __x64_sys_openat+0x136/0x160 [ 318.796407][ T5371] x64_sys_call+0x783/0x9a0 [ 318.800927][ T5371] do_syscall_64+0x4c/0xa0 [ 318.805356][ T5371] ? clear_bhb_loop+0x15/0x70 [ 318.810041][ T5371] ? clear_bhb_loop+0x15/0x70 [ 318.814728][ T5371] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 318.820649][ T5371] RIP: 0033:0x7f422c58e969 [ 318.825079][ T5371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.844698][ T5371] RSP: 002b:00007f422d475038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 318.853131][ T5371] RAX: ffffffffffffffda RBX: 00007f422c7b5fa0 RCX: 00007f422c58e969 [ 318.861109][ T5371] RDX: 0000000000000002 RSI: 00002000000002c0 RDI: 0000000000000008 [ 318.869088][ T5371] RBP: 00007f422d475090 R08: 0000000000000000 R09: 0000000000000000 [ 318.877063][ T5371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.885043][ T5371] R13: 0000000000000000 R14: 00007f422c7b5fa0 R15: 00007ffce4308fc8 [ 318.893046][ T5371] [ 318.912885][ T5313] device veth1_macvtap entered promiscuous mode [ 319.225094][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 319.239024][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 319.259380][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 319.277509][ T43] device bridge_slave_1 left promiscuous mode [ 319.285263][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.292961][ T43] device bridge_slave_0 left promiscuous mode [ 319.299774][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.487641][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 319.496646][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 319.505644][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 319.515206][ T740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.132985][ T5408] device syzkaller0 entered promiscuous mode [ 321.213208][ T5413] device syzkaller0 entered promiscuous mode [ 323.452285][ T5411] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.460780][ T5411] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.470238][ T5411] device bridge_slave_0 entered promiscuous mode [ 323.488919][ T5411] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.495992][ T5411] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.526208][ T5411] device bridge_slave_1 entered promiscuous mode [ 324.884789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 324.893699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.948166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 325.004120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.062045][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.069171][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.076702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 325.085292][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.094034][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.101111][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.256710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 325.264682][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 325.274951][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.283854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 325.293227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.341402][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 325.350706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 325.530491][ T5411] device veth0_vlan entered promiscuous mode [ 325.536972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 325.545104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.303287][ T43] device bridge_slave_1 left promiscuous mode [ 326.312236][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.320037][ T43] device bridge_slave_0 left promiscuous mode [ 326.326203][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.334605][ T43] device veth1_macvtap left promiscuous mode [ 326.344936][ T43] device veth0_vlan left promiscuous mode [ 326.552650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.560313][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 326.650700][ T5485] device syzkaller0 entered promiscuous mode [ 326.791724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 326.800116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 326.812121][ T5411] device veth1_macvtap entered promiscuous mode [ 326.940483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 326.948344][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 326.956868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 327.013287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 327.021819][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 327.270198][ T5509] device sit0 left promiscuous mode [ 327.351999][ T5509] device sit0 entered promiscuous mode [ 327.600192][ T5510] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.617105][ T5510] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.635201][ T5510] device bridge_slave_0 entered promiscuous mode [ 327.684838][ T5510] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.692472][ T5510] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.700471][ T5510] device bridge_slave_1 entered promiscuous mode [ 327.903677][ T5510] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.910818][ T5510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.918132][ T5510] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.925160][ T5510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.972629][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.997130][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.034594][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 328.067898][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.311185][ T5522] device syzkaller0 entered promiscuous mode [ 328.327764][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.346301][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.353390][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.401520][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.424282][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.431393][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.459781][ T5536] FAULT_INJECTION: forcing a failure. [ 328.459781][ T5536] name failslab, interval 1, probability 0, space 0, times 0 [ 328.472509][ T5536] CPU: 0 PID: 5536 Comm: syz.4.1764 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 328.482342][ T5536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 328.492396][ T5536] Call Trace: [ 328.495671][ T5536] [ 328.498593][ T5536] __dump_stack+0x21/0x24 [ 328.502931][ T5536] dump_stack_lvl+0xee/0x150 [ 328.507517][ T5536] ? __cfi_dump_stack_lvl+0x8/0x8 [ 328.512633][ T5536] dump_stack+0x15/0x24 [ 328.516798][ T5536] should_fail_ex+0x3d4/0x520 [ 328.521475][ T5536] __should_failslab+0xac/0xf0 [ 328.526246][ T5536] ? kvmalloc_node+0x294/0x480 [ 328.531013][ T5536] should_failslab+0x9/0x20 [ 328.535545][ T5536] __kmem_cache_alloc_node+0x3d/0x2c0 [ 328.540910][ T5536] ? __hw_addr_add_ex+0x3d6/0x770 [ 328.545949][ T5536] ? kvmalloc_node+0x294/0x480 [ 328.550709][ T5536] __kmalloc_node+0xa1/0x1e0 [ 328.555297][ T5536] kvmalloc_node+0x294/0x480 [ 328.559887][ T5536] ? __cfi_kvmalloc_node+0x10/0x10 [ 328.565008][ T5536] ? get_random_bytes+0x1d/0x30 [ 328.569867][ T5536] alloc_netdev_mqs+0x7b7/0xf90 [ 328.574717][ T5536] ? __cfi_selinux_capable+0x10/0x10 [ 328.580048][ T5536] ? __cfi_vti6_dev_setup+0x10/0x10 [ 328.585270][ T5536] vti6_locate+0x588/0x6d0 [ 328.589689][ T5536] ? memcpy+0x56/0x70 [ 328.593681][ T5536] ? vti6_link_config+0x550/0x550 [ 328.598726][ T5536] ? memcpy+0x56/0x70 [ 328.602794][ T5536] vti6_siocdevprivate+0x6d7/0xd20 [ 328.607931][ T5536] ? __cfi_vti6_siocdevprivate+0x10/0x10 [ 328.613564][ T5536] ? __mutex_lock+0x47a/0x16d0 [ 328.618339][ T5536] ? full_name_hash+0xba/0xf0 [ 328.623025][ T5536] dev_ifsioc+0xbc4/0xed0 [ 328.627358][ T5536] ? ioctl_has_perm+0x391/0x4c0 [ 328.632207][ T5536] ? dev_ioctl+0xd10/0xd10 [ 328.636617][ T5536] ? __mutex_lock_slowpath+0xe/0x10 [ 328.641817][ T5536] ? mutex_lock+0xf8/0x1a0 [ 328.646232][ T5536] ? __cfi_mutex_lock+0x10/0x10 [ 328.651091][ T5536] ? dev_get_by_name_rcu+0xe5/0x130 [ 328.656299][ T5536] dev_ioctl+0x5f3/0xd10 [ 328.660543][ T5536] sock_ioctl+0x675/0x6e0 [ 328.664867][ T5536] ? __cfi_sock_ioctl+0x10/0x10 [ 328.669712][ T5536] ? security_file_ioctl+0x95/0xc0 [ 328.674818][ T5536] ? __cfi_sock_ioctl+0x10/0x10 [ 328.679767][ T5536] __se_sys_ioctl+0x12f/0x1b0 [ 328.684450][ T5536] __x64_sys_ioctl+0x7b/0x90 [ 328.689053][ T5536] x64_sys_call+0x58b/0x9a0 [ 328.693561][ T5536] do_syscall_64+0x4c/0xa0 [ 328.697988][ T5536] ? clear_bhb_loop+0x15/0x70 [ 328.702693][ T5536] ? clear_bhb_loop+0x15/0x70 [ 328.707362][ T5536] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 328.713280][ T5536] RIP: 0033:0x7f422c58e969 [ 328.717781][ T5536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.737392][ T5536] RSP: 002b:00007f422d475038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 328.745809][ T5536] RAX: ffffffffffffffda RBX: 00007f422c7b5fa0 RCX: 00007f422c58e969 [ 328.753773][ T5536] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 328.761734][ T5536] RBP: 00007f422d475090 R08: 0000000000000000 R09: 0000000000000000 [ 328.769697][ T5536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.777660][ T5536] R13: 0000000000000000 R14: 00007f422c7b5fa0 R15: 00007ffce4308fc8 [ 328.785629][ T5536] [ 328.830326][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 328.841131][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.849867][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.950880][ T5510] device veth0_vlan entered promiscuous mode [ 328.957380][ T5548] GPL: port 1(erspan0) entered disabled state [ 329.033671][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 329.042112][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.064492][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.080639][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.104149][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 329.114813][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 329.137545][ T28] audit: type=1400 audit(1746668064.884:154): avc: denied { create } for pid=5556 comm="syz.0.1770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 329.206964][ T5552] device sit0 left promiscuous mode [ 329.247339][ T5510] device veth1_macvtap entered promiscuous mode [ 329.255311][ T5555] device sit0 entered promiscuous mode [ 329.436398][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 329.444408][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 329.452983][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 329.493663][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 329.513018][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 330.046711][ T5569] device syzkaller0 entered promiscuous mode [ 330.570544][ T5579] device syzkaller0 entered promiscuous mode [ 330.803906][ T43] device bridge_slave_1 left promiscuous mode [ 330.818210][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.841972][ T43] device bridge_slave_0 left promiscuous mode [ 330.862218][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.908813][ T43] device veth1_macvtap left promiscuous mode [ 330.915250][ T43] device veth0_vlan left promiscuous mode [ 331.200588][ T5583] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.218413][ T5583] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.237175][ T5583] device bridge_slave_0 entered promiscuous mode [ 331.263299][ T5583] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.270918][ T5583] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.278544][ T5583] device bridge_slave_1 entered promiscuous mode [ 332.199693][ T5615] device veth0_vlan left promiscuous mode [ 332.214042][ T5615] device veth0_vlan entered promiscuous mode [ 332.272166][ T5617] device syzkaller0 entered promiscuous mode [ 332.363170][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.372542][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.415702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.424586][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.440656][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.447753][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.455665][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.464190][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.472817][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.479891][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.488037][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.234616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.338039][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.367512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.897275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 333.929579][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.977928][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 334.018764][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.027183][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.034782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.060856][ T5583] device veth0_vlan entered promiscuous mode [ 334.061295][ T28] audit: type=1400 audit(1746668069.814:155): avc: denied { create } for pid=5650 comm="syz.2.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 334.081438][ T5583] device veth1_macvtap entered promiscuous mode [ 334.122198][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 334.161239][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 334.235217][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 334.292917][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 334.357214][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 334.421967][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 334.459648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.529563][ T43] device bridge_slave_1 left promiscuous mode [ 334.535755][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.593940][ T43] device bridge_slave_0 left promiscuous mode [ 334.614067][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.655468][ T43] device veth1_macvtap left promiscuous mode [ 334.662248][ T43] device veth0_vlan left promiscuous mode [ 335.569336][ T5681] device macsec0 left promiscuous mode [ 335.668248][ T5683] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.676406][ T5683] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.684314][ T5683] device bridge_slave_0 entered promiscuous mode [ 335.713346][ T5683] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.732237][ T5683] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.746051][ T5683] device bridge_slave_1 entered promiscuous mode [ 336.019053][ T43] device bridge_slave_1 left promiscuous mode [ 336.025270][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.149131][ T43] device bridge_slave_0 left promiscuous mode [ 336.155332][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.249315][ T43] device veth1_macvtap left promiscuous mode [ 336.269919][ T43] device veth0_vlan left promiscuous mode [ 336.926994][ T5716] device veth1_macvtap left promiscuous mode [ 336.935092][ T5716] device macsec0 left promiscuous mode [ 337.060428][ T5716] device veth1_macvtap entered promiscuous mode [ 337.067628][ T5716] device macsec0 entered promiscuous mode [ 337.230026][ T28] audit: type=1400 audit(1746668072.984:156): avc: denied { create } for pid=5727 comm="syz.4.1821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 337.235697][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.258731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.268352][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.276755][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.285610][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.292689][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.326273][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.334295][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.343116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.351881][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.358961][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.424843][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.433867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.442179][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.456516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.488702][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.497200][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.505609][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.514548][ T5683] device veth0_vlan entered promiscuous mode [ 337.571990][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 337.738389][ T5683] device veth1_macvtap entered promiscuous mode [ 337.754102][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 337.763070][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 337.808881][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 337.817590][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 341.210335][ T5759] device wg2 left promiscuous mode [ 341.235808][ T5756] device wg2 entered promiscuous mode [ 341.329851][ T43] device bridge_slave_1 left promiscuous mode [ 341.336037][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.769642][ T43] device bridge_slave_0 left promiscuous mode [ 341.787901][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.798556][ T43] device veth1_macvtap left promiscuous mode [ 341.804760][ T43] device veth0_vlan left promiscuous mode [ 342.024827][ T5777] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.032032][ T5777] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.040150][ T5777] device bridge_slave_0 entered promiscuous mode [ 342.054479][ T5777] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.061677][ T5777] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.069479][ T5777] device bridge_slave_1 entered promiscuous mode [ 342.702322][ T5777] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.709488][ T5777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.716799][ T5777] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.723873][ T5777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.335947][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.358539][ T5661] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.383588][ T5661] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.504397][ T5819] device syzkaller0 entered promiscuous mode [ 343.514432][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 343.522984][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.531332][ T5661] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.538424][ T5661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.563575][ T5820] device syzkaller0 entered promiscuous mode [ 343.617390][ T5830] device syzkaller0 left promiscuous mode [ 343.623936][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 343.632447][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.646465][ T5661] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.653582][ T5661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.705039][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 343.723559][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.735847][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 343.746598][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.796348][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 343.806026][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 343.839661][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 343.856434][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.896503][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.938545][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 343.966492][ T5777] device veth0_vlan entered promiscuous mode [ 344.087534][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 344.096126][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.105939][ T5777] device veth1_macvtap entered promiscuous mode [ 344.194788][ T28] audit: type=1400 audit(1746668079.944:157): avc: denied { getattr } for pid=5851 comm="syz.3.1862" path="net:[4026532564]" dev="nsfs" ino=4026532564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 344.230206][ T28] audit: type=1400 audit(1746668079.984:158): avc: denied { create } for pid=5851 comm="syz.3.1862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 344.265224][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.281639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 344.293964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.758914][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 344.779721][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 345.488193][ T8] device bridge_slave_1 left promiscuous mode [ 345.494335][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.501958][ T8] device bridge_slave_0 left promiscuous mode [ 345.508215][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.516186][ T8] device veth1_macvtap left promiscuous mode [ 345.522265][ T8] device veth0_vlan left promiscuous mode [ 346.114815][ T5888] device veth0_vlan left promiscuous mode [ 346.139307][ T5888] device veth0_vlan entered promiscuous mode [ 346.202115][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.247562][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.266846][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.274616][ T5886] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.281780][ T5886] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.289441][ T5886] device bridge_slave_0 entered promiscuous mode [ 346.403249][ T5886] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.410733][ T5886] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.420267][ T5886] device bridge_slave_1 entered promiscuous mode [ 347.172343][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 347.180760][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.462865][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.471642][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.480545][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.487651][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.569051][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 347.626219][ T5930] bond_slave_1: mtu less than device minimum [ 347.632993][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 347.641838][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.650298][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.657375][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.040492][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.048673][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.068729][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 348.089376][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 348.123436][ T5886] device veth0_vlan entered promiscuous mode [ 348.141931][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 348.150285][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 348.279779][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 348.287511][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.298040][ T5886] device veth1_macvtap entered promiscuous mode [ 348.366349][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 348.374839][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 348.383094][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 348.504346][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 348.513028][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 348.521575][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 348.530077][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 349.813279][ T8] device bridge_slave_1 left promiscuous mode [ 349.839876][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.873657][ T8] device bridge_slave_0 left promiscuous mode [ 349.879920][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.899160][ T8] device veth1_macvtap left promiscuous mode [ 349.905245][ T8] device veth0_vlan left promiscuous mode [ 353.515690][ T5971] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.522997][ T5971] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.530643][ T5971] device bridge_slave_0 entered promiscuous mode [ 353.537881][ T5971] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.545045][ T5971] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.553403][ T5971] device bridge_slave_1 entered promiscuous mode [ 353.725869][ T5971] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.732990][ T5971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.740326][ T5971] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.747374][ T5971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.775686][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.798332][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.807596][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.838596][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.857893][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.864980][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.872954][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.881346][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.888416][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.909235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 353.918815][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.926947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.026550][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 354.034970][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 354.042662][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.051316][ T5971] device veth0_vlan entered promiscuous mode [ 354.146397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.156677][ T5971] device veth1_macvtap entered promiscuous mode [ 354.167997][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.180760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 354.759422][ T8] device bridge_slave_1 left promiscuous mode [ 354.765617][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.808111][ T8] device bridge_slave_0 left promiscuous mode [ 354.814307][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.850449][ T8] device veth1_macvtap left promiscuous mode [ 354.859865][ T8] device veth0_vlan left promiscuous mode [ 355.297942][ T28] audit: type=1400 audit(1746668091.054:159): avc: denied { ioctl } for pid=6012 comm="syz.2.1915" path="pid:[4026532370]" dev="nsfs" ino=4026532370 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 355.477724][ T6016] device pim6reg1 entered promiscuous mode [ 356.475175][ T6019] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.482552][ T6019] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.490385][ T6019] device bridge_slave_0 entered promiscuous mode [ 357.889776][ T6019] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.896964][ T6019] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.904467][ T6019] device bridge_slave_1 entered promiscuous mode [ 357.924813][ T6050] device syzkaller0 entered promiscuous mode [ 358.125477][ T6067] FAULT_INJECTION: forcing a failure. [ 358.125477][ T6067] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 358.152566][ T6067] CPU: 0 PID: 6067 Comm: syz.3.1928 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 358.162448][ T6067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 358.172523][ T6067] Call Trace: [ 358.175810][ T6067] [ 358.178733][ T6067] __dump_stack+0x21/0x24 [ 358.183063][ T6067] dump_stack_lvl+0xee/0x150 [ 358.187647][ T6067] ? __cfi_dump_stack_lvl+0x8/0x8 [ 358.192699][ T6067] dump_stack+0x15/0x24 [ 358.196858][ T6067] should_fail_ex+0x3d4/0x520 [ 358.201527][ T6067] should_fail+0xb/0x10 [ 358.205674][ T6067] should_fail_usercopy+0x1a/0x20 [ 358.210690][ T6067] _copy_from_user+0x1e/0xc0 [ 358.215272][ T6067] __sys_bpf+0x277/0x780 [ 358.219512][ T6067] ? bpf_link_show_fdinfo+0x320/0x320 [ 358.224895][ T6067] ? __cfi_ksys_write+0x10/0x10 [ 358.229792][ T6067] ? debug_smp_processor_id+0x17/0x20 [ 358.235190][ T6067] __x64_sys_bpf+0x7c/0x90 [ 358.239634][ T6067] x64_sys_call+0x488/0x9a0 [ 358.244154][ T6067] do_syscall_64+0x4c/0xa0 [ 358.248567][ T6067] ? clear_bhb_loop+0x15/0x70 [ 358.253235][ T6067] ? clear_bhb_loop+0x15/0x70 [ 358.257932][ T6067] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 358.263832][ T6067] RIP: 0033:0x7fb13418e969 [ 358.268241][ T6067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 358.287868][ T6067] RSP: 002b:00007fb134f99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 358.296292][ T6067] RAX: ffffffffffffffda RBX: 00007fb1343b5fa0 RCX: 00007fb13418e969 [ 358.304267][ T6067] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 358.312234][ T6067] RBP: 00007fb134f99090 R08: 0000000000000000 R09: 0000000000000000 [ 358.320285][ T6067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 358.328346][ T6067] R13: 0000000000000000 R14: 00007fb1343b5fa0 R15: 00007fff08cd78c8 [ 358.336315][ T6067] [ 358.745768][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.753533][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.849577][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.858475][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.866722][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.873789][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.888869][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 358.913256][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.921813][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.928893][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.158788][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 359.175017][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.183661][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.197349][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.228250][ T6019] device veth0_vlan entered promiscuous mode [ 360.040102][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 360.049427][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.071977][ T6019] device veth1_macvtap entered promiscuous mode [ 360.242613][ T6096] device syzkaller0 entered promiscuous mode [ 360.249483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 360.257038][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 360.264827][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 360.273385][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 360.281943][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 360.854385][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 360.862903][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 360.871378][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 360.879736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 362.398300][ T8] device bridge_slave_1 left promiscuous mode [ 362.404504][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.437313][ T8] device bridge_slave_0 left promiscuous mode [ 362.469576][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.708055][ T8] device veth1_macvtap left promiscuous mode [ 364.716054][ T8] device veth0_vlan left promiscuous mode [ 364.819646][ T6134] device syzkaller0 entered promiscuous mode [ 364.870698][ T6143] device syzkaller0 entered promiscuous mode [ 465.397379][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 465.404533][ C1] rcu: 0-...!: (0 ticks this GP) idle=e384/1/0x4000000000000000 softirq=24845/24845 fqs=1 [ 465.414497][ C1] (detected by 1, t=10002 jiffies, g=33649, q=387 ncpus=2) [ 465.421781][ C1] Sending NMI from CPU 1 to CPUs 0: [ 465.427051][ C0] NMI backtrace for cpu 0 [ 465.427063][ C0] CPU: 0 PID: 6142 Comm: syz.2.1952 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 465.427082][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 465.427101][ C0] RIP: 0010:kvm_wait+0xcc/0x140 [ 465.427129][ C0] Code: 20 f6 44 24 21 02 75 24 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 48 0f b6 07 40 38 f0 75 a6 66 90 0f 00 2d 15 b7 13 04 f4 9a fa 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 3f 0f b6 07 [ 465.427145][ C0] RSP: 0018:ffffc90000ad6ec0 EFLAGS: 00000046 [ 465.427160][ C0] RAX: 0000000000000003 RBX: ffff8881f70279c0 RCX: ffffffff84efb682 [ 465.427174][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881f70279c0 [ 465.427186][ C0] RBP: ffffc90000ad6f50 R08: dffffc0000000000 R09: ffffed103ee04f39 [ 465.427200][ C0] R10: ffffed103ee04f39 R11: 1ffff1103ee04f38 R12: 1ffff1103ee00001 [ 465.427213][ C0] R13: ffff8881f7038bd4 R14: dffffc0000000000 R15: 1ffff9200015add8 [ 465.427246][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 465.427261][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 465.427274][ C0] CR2: 00005555946504a8 CR3: 000000012f7d7000 CR4: 00000000003506b0 [ 465.427290][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 465.427301][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 465.427312][ C0] Call Trace: [ 465.427319][ C0] [ 465.427329][ C0] ? __cfi_kvm_wait+0x10/0x10 [ 465.427362][ C0] ? bpf_prog_5186c38a4019a4cb+0x42/0x46 [ 465.427381][ C0] ? pv_hash+0x86/0x150 [ 465.427406][ C0] __pv_queued_spin_lock_slowpath+0x690/0xc40 [ 465.427434][ C0] ? __tun_detach+0xca6/0x1460 [ 465.427458][ C0] ? tun_chr_close+0x92/0x140 [ 465.427482][ C0] ? __cfi___pv_queued_spin_lock_slowpath+0x10/0x10 [ 465.427509][ C0] queued_spin_lock_slowpath+0x47/0x50 [ 465.427534][ C0] _raw_spin_lock+0xd8/0xe0 [ 465.427554][ C0] ? __cfi__raw_spin_lock+0x10/0x10 [ 465.427577][ C0] kvfree_call_rcu+0x100/0x7a0 [ 465.427598][ C0] ? __cfi_kvfree_call_rcu+0x10/0x10 [ 465.427617][ C0] ? longest_prefix_match+0x337/0x640 [ 465.427638][ C0] trie_delete_elem+0x572/0x720 [ 465.427658][ C0] bpf_prog_5186c38a4019a4cb+0x42/0x46 [ 465.427674][ C0] bpf_trace_run3+0x113/0x270 [ 465.427696][ C0] ? __cfi_bpf_trace_run3+0x10/0x10 [ 465.427718][ C0] ? debug_smp_processor_id+0x17/0x20 [ 465.427738][ C0] ? get_nohz_timer_target+0x74/0x540 [ 465.427755][ C0] ? neigh_sysctl_unregister+0x78/0x90 [ 465.427773][ C0] ? raw_notifier_call_chain+0xa1/0x110 [ 465.427799][ C0] __bpf_trace_timer_start+0x2b/0x40 [ 465.427816][ C0] enqueue_timer+0x337/0x480 [ 465.427838][ C0] __mod_timer+0x79f/0xb30 [ 465.427860][ C0] add_timer+0x68/0x80 [ 465.427877][ C0] __queue_delayed_work+0x173/0x200 [ 465.427900][ C0] mod_delayed_work_on+0x74/0xe0 [ 465.427922][ C0] kvfree_call_rcu+0x560/0x7a0 [ 465.427942][ C0] ? __cfi_kvfree_call_rcu+0x10/0x10 [ 465.427960][ C0] ? _raw_spin_lock+0x8e/0xe0 [ 465.427981][ C0] ? __cfi__raw_spin_lock+0x10/0x10 [ 465.428004][ C0] drop_sysctl_table+0x2ef/0x410 [ 465.428030][ C0] ? insert_header+0xeb0/0xeb0 [ 465.428053][ C0] ? _raw_spin_lock+0x8e/0xe0 [ 465.428074][ C0] ? __cfi__raw_spin_lock+0x10/0x10 [ 465.428103][ C0] ? count_subheaders+0xc9/0x100 [ 465.428128][ C0] unregister_sysctl_table+0x75/0x120 [ 465.428153][ C0] ? unregister_net_sysctl_table+0xd/0x20 [ 465.428174][ C0] unregister_net_sysctl_table+0x15/0x20 [ 465.428194][ C0] neigh_sysctl_unregister+0x78/0x90 [ 465.428213][ C0] inetdev_event+0x860/0x10e0 [ 465.428237][ C0] ? __cfi_inetdev_event+0x10/0x10 [ 465.428261][ C0] ? arp_netdev_event+0xd4/0x2b0 [ 465.428279][ C0] raw_notifier_call_chain+0xa1/0x110 [ 465.428305][ C0] unregister_netdevice_many+0xf8f/0x1820 [ 465.428326][ C0] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 465.428348][ C0] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 465.428366][ C0] ? ref_tracker_alloc+0x2a5/0x430 [ 465.428390][ C0] ? __kasan_check_write+0x14/0x20 [ 465.428414][ C0] ? queue_delayed_work_on+0x101/0x150 [ 465.428434][ C0] ? linkwatch_fire_event+0x1d2/0x240 [ 465.428453][ C0] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 465.428474][ C0] ? do_exit+0xa1d/0x2650 [ 465.428498][ C0] ? __kasan_check_read+0x11/0x20 [ 465.428522][ C0] unregister_netdevice_queue+0x31c/0x360 [ 465.428539][ C0] ? linkwatch_schedule_work+0x161/0x190 [ 465.428557][ C0] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 465.428574][ C0] ? linkwatch_fire_event+0x1ed/0x240 [ 465.428594][ C0] __tun_detach+0xca6/0x1460 [ 465.428621][ C0] tun_chr_close+0x92/0x140 [ 465.428644][ C0] ? __cfi_tun_chr_close+0x10/0x10 [ 465.428667][ C0] __fput+0x1fc/0x8f0 [ 465.428686][ C0] ____fput+0x15/0x20 [ 465.428702][ C0] task_work_run+0x1db/0x240 [ 465.428723][ C0] ? __cfi_task_work_run+0x10/0x10 [ 465.428742][ C0] ? free_nsproxy+0x21f/0x270 [ 465.428766][ C0] do_exit+0xa1d/0x2650 [ 465.428803][ C0] ? __cfi_do_exit+0x10/0x10 [ 465.428824][ C0] ? xfd_validate_state+0x70/0x150 [ 465.428847][ C0] ? __kasan_check_write+0x14/0x20 [ 465.428873][ C0] __x64_sys_exit+0x40/0x40 [ 465.428895][ C0] x64_sys_call+0x67/0x9a0 [ 465.428915][ C0] do_syscall_64+0x4c/0xa0 [ 465.428936][ C0] ? clear_bhb_loop+0x15/0x70 [ 465.428951][ C0] ? clear_bhb_loop+0x15/0x70 [ 465.428967][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 465.428991][ C0] RIP: 0033:0x7f06d798e969 [ 465.429003][ C0] Code: Unable to access opcode bytes at 0x7f06d798e93f. [ 465.429010][ C0] RSP: 002b:00007f06d87f4fe8 EFLAGS: 00000246 ORIG_RAX: 000000000000003c [ 465.429027][ C0] RAX: ffffffffffffffda RBX: 00007f06d7bb6240 RCX: 00007f06d798e969 [ 465.429039][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 465.429049][ C0] RBP: 00007f06d7a10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 465.429060][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 465.429070][ C0] R13: 0000000000000000 R14: 00007f06d7bb6240 R15: 00007ffd5ec01de8 [ 465.429086][ C0] [ 465.430013][ C1] rcu: rcu_preempt kthread starved for 10000 jiffies! g33649 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 466.026328][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 466.036280][ C1] rcu: RCU grace-period kthread stack dump: [ 466.042151][ C1] task:rcu_preempt state:R running task stack:28064 pid:14 ppid:2 flags:0x00004000 [ 466.052906][ C1] Call Trace: [ 466.056169][ C1] [ 466.059088][ C1] __schedule+0xb87/0x14e0 [ 466.063498][ C1] ? __bpf_trace_timer_start+0x2b/0x40 [ 466.068942][ C1] ? release_firmware_map_entry+0x194/0x194 [ 466.074826][ C1] ? __mod_timer+0x7ae/0xb30 [ 466.079404][ C1] schedule+0xbd/0x170 [ 466.083464][ C1] schedule_timeout+0x12c/0x2e0 [ 466.088301][ C1] ? __cfi_schedule_timeout+0x10/0x10 [ 466.093658][ C1] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 466.099106][ C1] ? __cfi_process_timeout+0x10/0x10 [ 466.104382][ C1] ? prepare_to_swait_event+0x308/0x320 [ 466.109921][ C1] rcu_gp_fqs_loop+0x2d8/0x10a0 [ 466.114769][ C1] ? __cfi_dyntick_save_progress_counter+0x10/0x10 [ 466.121269][ C1] ? rcu_gp_init+0xf10/0xf10 [ 466.125942][ C1] rcu_gp_kthread+0x95/0x370 [ 466.130526][ C1] ? __cfi_rcu_gp_kthread+0x10/0x10 [ 466.135726][ C1] ? set_cpus_allowed_ptr+0x82/0xc0 [ 466.140913][ C1] ? __kasan_check_read+0x11/0x20 [ 466.145940][ C1] ? __kthread_parkme+0x142/0x180 [ 466.150984][ C1] kthread+0x281/0x320 [ 466.155039][ C1] ? __cfi_rcu_gp_kthread+0x10/0x10 [ 466.160222][ C1] ? __cfi_kthread+0x10/0x10 [ 466.164804][ C1] ret_from_fork+0x1f/0x30 [ 466.169210][ C1] [ 466.172213][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 466.178517][ C1] CPU: 1 PID: 43 Comm: kworker/u4:2 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 466.188302][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 466.198346][ C1] Workqueue: events_unbound toggle_allocation_gate [ 466.204836][ C1] RIP: 0010:smp_call_function_many_cond+0x872/0x960 [ 466.211425][ C1] Code: 41 8b 1f 89 de 83 e6 01 31 ff e8 39 66 09 00 83 e3 01 48 bb 00 00 00 00 00 fc ff df 75 0a e8 05 62 09 00 e9 38 ff ff ff f3 90 <41> 0f b6 44 1d 00 84 c0 75 14 41 f7 07 01 00 00 00 0f 84 1a ff ff [ 466.231102][ C1] RSP: 0000:ffffc900002cf840 EFLAGS: 00000293 [ 466.237157][ C1] RAX: ffffffff816684ee RBX: dffffc0000000000 RCX: ffff888100262880 [ 466.245112][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 466.253065][ C1] RBP: ffffc900002cf978 R08: dffffc0000000000 R09: ffffed103ee271fb [ 466.261107][ C1] R10: 0000000000000000 R11: ffffffff81341390 R12: 1ffff1103ee271f8 [ 466.269062][ C1] R13: 1ffff1103ee07a99 R14: 0000000000000000 R15: ffff8881f703d4c8 [ 466.277039][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 466.285956][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 466.292546][ C1] CR2: 0000001b2d91bff8 CR3: 0000000006e0f000 CR4: 00000000003506a0 [ 466.300522][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 466.308494][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 466.316449][ C1] Call Trace: [ 466.319721][ C1] [ 466.322638][ C1] ? __cfi_do_sync_core+0x10/0x10 [ 466.327682][ C1] ? smp_call_function_many+0x40/0x40 [ 466.333037][ C1] ? kmem_cache_alloc_bulk+0xfd/0x3c0 [ 466.338392][ C1] ? text_poke+0x30/0x30 [ 466.342619][ C1] ? text_poke_loc_init+0xd6/0x570 [ 466.347738][ C1] ? __cfi_do_sync_core+0x10/0x10 [ 466.352766][ C1] on_each_cpu_cond_mask+0x43/0x80 [ 466.357874][ C1] text_poke_bp_batch+0x1cc/0x580 [ 466.362884][ C1] ? text_poke_loc_init+0x570/0x570 [ 466.368069][ C1] ? __kasan_check_write+0x14/0x20 [ 466.373170][ C1] ? mutex_lock+0x8d/0x1a0 [ 466.377597][ C1] ? __cfi_mutex_lock+0x10/0x10 [ 466.382440][ C1] ? text_poke_queue+0xdf/0x180 [ 466.387297][ C1] text_poke_finish+0x1a/0x30 [ 466.391980][ C1] arch_jump_label_transform_apply+0x15/0x30 [ 466.397950][ C1] __jump_label_update+0x37c/0x3a0 [ 466.403051][ C1] jump_label_update+0x39b/0x450 [ 466.407980][ C1] static_key_enable_cpuslocked+0x126/0x240 [ 466.413860][ C1] static_key_enable+0x1a/0x30 [ 466.418606][ C1] toggle_allocation_gate+0xb4/0x400 [ 466.423877][ C1] ? __cfi_toggle_allocation_gate+0x10/0x10 [ 466.429752][ C1] ? finish_task_switch+0x16b/0x7b0 [ 466.434938][ C1] ? __switch_to_asm+0x3a/0x60 [ 466.439688][ C1] ? __schedule+0xb8f/0x14e0 [ 466.444267][ C1] ? __kasan_check_read+0x11/0x20 [ 466.449286][ C1] ? read_word_at_a_time+0x12/0x20 [ 466.454385][ C1] ? strscpy+0x9b/0x290 [ 466.458526][ C1] process_one_work+0x71f/0xc40 [ 466.463364][ C1] worker_thread+0xa29/0x11f0 [ 466.468043][ C1] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 466.473499][ C1] kthread+0x281/0x320 [ 466.477554][ C1] ? __cfi_worker_thread+0x10/0x10 [ 466.482649][ C1] ? __cfi_kthread+0x10/0x10 [ 466.487221][ C1] ret_from_fork+0x1f/0x30 [ 466.491648][ C1] [ 617.135503][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [kworker/u4:2:43] [ 617.143887][ C1] Modules linked in: [ 617.147770][ C1] CPU: 1 PID: 43 Comm: kworker/u4:2 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 617.157576][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 617.167621][ C1] Workqueue: events_unbound toggle_allocation_gate [ 617.174117][ C1] RIP: 0010:smp_call_function_many_cond+0x872/0x960 [ 617.180729][ C1] Code: 41 8b 1f 89 de 83 e6 01 31 ff e8 39 66 09 00 83 e3 01 48 bb 00 00 00 00 00 fc ff df 75 0a e8 05 62 09 00 e9 38 ff ff ff f3 90 <41> 0f b6 44 1d 00 84 c0 75 14 41 f7 07 01 00 00 00 0f 84 1a ff ff [ 617.200322][ C1] RSP: 0000:ffffc900002cf840 EFLAGS: 00000293 [ 617.206373][ C1] RAX: ffffffff816684ee RBX: dffffc0000000000 RCX: ffff888100262880 [ 617.214338][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 617.222298][ C1] RBP: ffffc900002cf978 R08: dffffc0000000000 R09: ffffed103ee271fb [ 617.230259][ C1] R10: 0000000000000000 R11: ffffffff81341390 R12: 1ffff1103ee271f8 [ 617.238216][ C1] R13: 1ffff1103ee07a99 R14: 0000000000000000 R15: ffff8881f703d4c8 [ 617.246197][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 617.255111][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 617.261679][ C1] CR2: 0000001b2d91bff8 CR3: 0000000006e0f000 CR4: 00000000003506a0 [ 617.269640][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 617.277602][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 617.285702][ C1] Call Trace: [ 617.288967][ C1] [ 617.291892][ C1] ? __cfi_do_sync_core+0x10/0x10 [ 617.296908][ C1] ? smp_call_function_many+0x40/0x40 [ 617.302264][ C1] ? kmem_cache_alloc_bulk+0xfd/0x3c0 [ 617.307630][ C1] ? text_poke+0x30/0x30 [ 617.311859][ C1] ? text_poke_loc_init+0xd6/0x570 [ 617.316957][ C1] ? __cfi_do_sync_core+0x10/0x10 [ 617.321977][ C1] on_each_cpu_cond_mask+0x43/0x80 [ 617.327093][ C1] text_poke_bp_batch+0x1cc/0x580 [ 617.332129][ C1] ? text_poke_loc_init+0x570/0x570 [ 617.337319][ C1] ? __kasan_check_write+0x14/0x20 [ 617.342421][ C1] ? mutex_lock+0x8d/0x1a0 [ 617.346829][ C1] ? __cfi_mutex_lock+0x10/0x10 [ 617.351672][ C1] ? text_poke_queue+0xdf/0x180 [ 617.356518][ C1] text_poke_finish+0x1a/0x30 [ 617.361183][ C1] arch_jump_label_transform_apply+0x15/0x30 [ 617.367172][ C1] __jump_label_update+0x37c/0x3a0 [ 617.372273][ C1] jump_label_update+0x39b/0x450 [ 617.377199][ C1] static_key_enable_cpuslocked+0x126/0x240 [ 617.383076][ C1] static_key_enable+0x1a/0x30 [ 617.387832][ C1] toggle_allocation_gate+0xb4/0x400 [ 617.393104][ C1] ? __cfi_toggle_allocation_gate+0x10/0x10 [ 617.398983][ C1] ? finish_task_switch+0x16b/0x7b0 [ 617.404172][ C1] ? __switch_to_asm+0x3a/0x60 [ 617.408927][ C1] ? __schedule+0xb8f/0x14e0 [ 617.413530][ C1] ? __kasan_check_read+0x11/0x20 [ 617.418545][ C1] ? read_word_at_a_time+0x12/0x20 [ 617.423644][ C1] ? strscpy+0x9b/0x290 [ 617.427788][ C1] process_one_work+0x71f/0xc40 [ 617.432626][ C1] worker_thread+0xa29/0x11f0 [ 617.437291][ C1] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 617.442743][ C1] kthread+0x281/0x320 [ 617.446829][ C1] ? __cfi_worker_thread+0x10/0x10 [ 617.451920][ C1] ? __cfi_kthread+0x10/0x10 [ 617.456499][ C1] ret_from_fork+0x1f/0x30 [ 617.460936][ C1] [ 617.463980][ C1] Sending NMI from CPU 1 to CPUs 0: [ 617.469268][ C0] NMI backtrace for cpu 0 [ 617.469278][ C0] CPU: 0 PID: 6142 Comm: syz.2.1952 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 617.469296][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 617.469306][ C0] RIP: 0010:kvm_wait+0xcc/0x140 [ 617.469331][ C0] Code: 20 f6 44 24 21 02 75 24 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 48 0f b6 07 40 38 f0 75 a6 66 90 0f 00 2d 15 b7 13 04 f4 9a fa 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 3f 0f b6 07 [ 617.469345][ C0] RSP: 0018:ffffc90000ad6ec0 EFLAGS: 00000046 [ 617.469360][ C0] RAX: 0000000000000003 RBX: ffff8881f70279c0 RCX: ffffffff84efb682 [ 617.469373][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881f70279c0 [ 617.469386][ C0] RBP: ffffc90000ad6f50 R08: dffffc0000000000 R09: ffffed103ee04f39 [ 617.469399][ C0] R10: ffffed103ee04f39 R11: 1ffff1103ee04f38 R12: 1ffff1103ee00001 [ 617.469412][ C0] R13: ffff8881f7038bd4 R14: dffffc0000000000 R15: 1ffff9200015add8 [ 617.469426][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 617.469441][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 617.469453][ C0] CR2: 00005555946504a8 CR3: 000000012f7d7000 CR4: 00000000003506b0 [ 617.469469][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 617.469479][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 617.469490][ C0] Call Trace: [ 617.469496][ C0] [ 617.469504][ C0] ? __cfi_kvm_wait+0x10/0x10 [ 617.469536][ C0] ? bpf_prog_5186c38a4019a4cb+0x42/0x46 [ 617.469554][ C0] ? pv_hash+0x86/0x150 [ 617.469579][ C0] __pv_queued_spin_lock_slowpath+0x690/0xc40 [ 617.469604][ C0] ? __tun_detach+0xca6/0x1460 [ 617.469628][ C0] ? tun_chr_close+0x92/0x140 [ 617.469651][ C0] ? __cfi___pv_queued_spin_lock_slowpath+0x10/0x10 [ 617.469678][ C0] queued_spin_lock_slowpath+0x47/0x50 [ 617.469703][ C0] _raw_spin_lock+0xd8/0xe0 [ 617.469723][ C0] ? __cfi__raw_spin_lock+0x10/0x10 [ 617.469745][ C0] kvfree_call_rcu+0x100/0x7a0 [ 617.469766][ C0] ? __cfi_kvfree_call_rcu+0x10/0x10 [ 617.469784][ C0] ? longest_prefix_match+0x337/0x640 [ 617.469804][ C0] trie_delete_elem+0x572/0x720 [ 617.469823][ C0] bpf_prog_5186c38a4019a4cb+0x42/0x46 [ 617.469838][ C0] bpf_trace_run3+0x113/0x270 [ 617.469877][ C0] ? __cfi_bpf_trace_run3+0x10/0x10 [ 617.469899][ C0] ? debug_smp_processor_id+0x17/0x20 [ 617.469918][ C0] ? get_nohz_timer_target+0x74/0x540 [ 617.469935][ C0] ? neigh_sysctl_unregister+0x78/0x90 [ 617.469953][ C0] ? raw_notifier_call_chain+0xa1/0x110 [ 617.470004][ C0] __bpf_trace_timer_start+0x2b/0x40 [ 617.470021][ C0] enqueue_timer+0x337/0x480 [ 617.470043][ C0] __mod_timer+0x79f/0xb30 [ 617.470063][ C0] add_timer+0x68/0x80 [ 617.470081][ C0] __queue_delayed_work+0x173/0x200 [ 617.470104][ C0] mod_delayed_work_on+0x74/0xe0 [ 617.470126][ C0] kvfree_call_rcu+0x560/0x7a0 [ 617.470146][ C0] ? __cfi_kvfree_call_rcu+0x10/0x10 [ 617.470164][ C0] ? _raw_spin_lock+0x8e/0xe0 [ 617.470185][ C0] ? __cfi__raw_spin_lock+0x10/0x10 [ 617.470219][ C0] drop_sysctl_table+0x2ef/0x410 [ 617.470244][ C0] ? insert_header+0xeb0/0xeb0 [ 617.470266][ C0] ? _raw_spin_lock+0x8e/0xe0 [ 617.470286][ C0] ? __cfi__raw_spin_lock+0x10/0x10 [ 617.470307][ C0] ? count_subheaders+0xc9/0x100 [ 617.470330][ C0] unregister_sysctl_table+0x75/0x120 [ 617.470353][ C0] ? unregister_net_sysctl_table+0xd/0x20 [ 617.470374][ C0] unregister_net_sysctl_table+0x15/0x20 [ 617.470394][ C0] neigh_sysctl_unregister+0x78/0x90 [ 617.470412][ C0] inetdev_event+0x860/0x10e0 [ 617.470440][ C0] ? __cfi_inetdev_event+0x10/0x10 [ 617.470463][ C0] ? arp_netdev_event+0xd4/0x2b0 [ 617.470499][ C0] raw_notifier_call_chain+0xa1/0x110 [ 617.470524][ C0] unregister_netdevice_many+0xf8f/0x1820 [ 617.470545][ C0] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 617.470568][ C0] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 617.470586][ C0] ? ref_tracker_alloc+0x2a5/0x430 [ 617.470611][ C0] ? __kasan_check_write+0x14/0x20 [ 617.470635][ C0] ? queue_delayed_work_on+0x101/0x150 [ 617.470655][ C0] ? linkwatch_fire_event+0x1d2/0x240 [ 617.470674][ C0] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 617.470695][ C0] ? do_exit+0xa1d/0x2650 [ 617.470719][ C0] ? __kasan_check_read+0x11/0x20 [ 617.470742][ C0] unregister_netdevice_queue+0x31c/0x360 [ 617.470759][ C0] ? linkwatch_schedule_work+0x161/0x190 [ 617.470778][ C0] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 617.470795][ C0] ? linkwatch_fire_event+0x1ed/0x240 [ 617.470814][ C0] __tun_detach+0xca6/0x1460 [ 617.470849][ C0] tun_chr_close+0x92/0x140 [ 617.470871][ C0] ? __cfi_tun_chr_close+0x10/0x10 [ 617.470894][ C0] __fput+0x1fc/0x8f0 [ 617.470914][ C0] ____fput+0x15/0x20 [ 617.470931][ C0] task_work_run+0x1db/0x240 [ 617.470951][ C0] ? __cfi_task_work_run+0x10/0x10 [ 617.470971][ C0] ? free_nsproxy+0x21f/0x270 [ 617.470995][ C0] do_exit+0xa1d/0x2650 [ 617.471019][ C0] ? __cfi_do_exit+0x10/0x10 [ 617.471041][ C0] ? xfd_validate_state+0x70/0x150 [ 617.471065][ C0] ? __kasan_check_write+0x14/0x20 [ 617.471091][ C0] __x64_sys_exit+0x40/0x40 [ 617.471114][ C0] x64_sys_call+0x67/0x9a0 [ 617.471134][ C0] do_syscall_64+0x4c/0xa0 [ 617.471156][ C0] ? clear_bhb_loop+0x15/0x70 [ 617.471171][ C0] ? clear_bhb_loop+0x15/0x70 [ 617.471186][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 617.471211][ C0] RIP: 0033:0x7f06d798e969 [ 617.471224][ C0] Code: Unable to access opcode bytes at 0x7f06d798e93f. [ 617.471232][ C0] RSP: 002b:00007f06d87f4fe8 EFLAGS: 00000246 ORIG_RAX: 000000000000003c [ 617.471249][ C0] RAX: ffffffffffffffda RBX: 00007f06d7bb6240 RCX: 00007f06d798e969 [ 617.471262][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 617.471272][ C0] RBP: 00007f06d7a10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 617.471283][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 617.471294][ C0] R13: 0000000000000000 R14: 00007f06d7bb6240 R15: 00007ffd5ec01de8 [ 617.471310][ C0]