last executing test programs: 2.593073552s ago: executing program 1 (id=3133): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000017000000b7080000000000005b8af8ff00000000bfa200000000000007020000f8ffffff5444000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000600), 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffff8c, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.539139043s ago: executing program 1 (id=3135): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000017000000b7080000000000005b8af8ff00000000bfa200000000000007020000f8ffffff5444000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='ext4_writepages_result\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x6, 0x61a, 0x2, 0x100, r7, 0x9, '\x00', 0x0, r7, 0x0, 0x0, 0x0, 0x3, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r8, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0xffffffff, 0x0, r8, 0x5, '\x00', r9, r7, 0x1, 0x1, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10, r1}, 0x18) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xd, 0x7fffffff, 0xbd, 0x3ff, 0x8, r2, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x7, 0x3, &(0x7f0000000000)=@raw=[@alu={0x4, 0x0, 0x4, 0x5, 0x6, 0xfffffffffffffff4}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x5}], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', r9, @fallback=0x25, r2, 0x8, &(0x7f0000000200)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0xb, 0x3, 0x1}, 0x10, 0x0, r10, 0x2, &(0x7f0000000400)=[r0, r0, r11], &(0x7f00000004c0)=[{0x1, 0x3, 0xf, 0x8}, {0x4, 0x3, 0xabd9, 0xc}], 0x10, 0x1, @void, @value}, 0x94) sendmsg$unix(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)='D', 0x33fe0}], 0x1, 0x0, 0x0, 0x803e0000}, 0x20000040) sendmsg$inet(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x84) sendmsg$inet(r4, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4000000) close(r3) write$cgroup_int(r2, &(0x7f0000000600), 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.368376266s ago: executing program 4 (id=3138): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000200)={0x0, r0}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{0x6, 0x60, 0x6, 0x6}, {0x9, 0x9, 0x7, 0xfffffff6}, {0xfff8, 0x8, 0xf0, 0xc9f}, {0x9, 0x4, 0x1, 0x10001}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0xee, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f00000004c0), 0x8, 0xcd, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x1, 0x0, r1, 0x200, '\x00', r3, r4, 0x0, 0x4, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x6, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x0, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000ffffff000000000000000004000000fcffffffc600feff0000000a950000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x7, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.339195247s ago: executing program 1 (id=3139): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='qdisc_create\x00', r2, 0x0, 0x8}, 0x56) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000200)=ANY=[@ANYRES16=r3, @ANYRESDEC, @ANYRES16=r4], 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000140)={'bond0\x00', @broadcast}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) close(r6) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0x10000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='pids.events\x00', 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.313773357s ago: executing program 0 (id=3140): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r1, 0x0, 0x0, 0x0}, 0x30) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000140)={&(0x7f0000000400)="31abc76d74a5af32c9b6a0005260b5e024e6089ff25df102bbf428987cb0e692c226d8e4480dde14e8de77ecaf802797b3c652874d3f50a2ccf9f1084d1c02329f193f6cd31064a01a2eedb5d5bd5f9cd4aec2be1e71183dcafbb45868d999107b4127a716aa6d2715f68aefff09e0de624bf3ee139bc0dd9a23a3f01de1ce18bb802f4d7310e4bd2efd4e015e37161b53763f81568a60", &(0x7f0000000100)=""/49, &(0x7f0000000780)="afcfbb580546f352652817fed35ae869635cde063ac836967ee108f451d7a8df482af79a343150b0dfb0ca1969be980bbdfd89b67be1a8130a57c31fe6617dac1ab2201e8ea667601c4c47ff0983134aa1852ad713a14aa93dcfaced95445b507cb2f39ccda9744524d5d2d6916a80876e92463999d725a4163872e06c606ec9aebb45b6", &(0x7f0000000840)="1ebe32e2d72c06bf76276d6694f5239e54eff0b039d920b6bb332b312d8403ee0b9fb615c47d7a1c93c82d9cd1ddd77ca32aea601705ac6f1b49a17e355d64a0d55cdd62d1a87fcb6b870cca7bc52bb6dd6471df420d3eb23109db6cb16a8efcf4f173afbe282dee50b34bee2b9d625f019d70b814dba0e7ddcd5104c0c3cf5557df02d819ba2064b6ea816970b5e9a249ef80c71d76b8c21fb0ba52d7c5c9a5d4266af2b7e310", 0x10, r1, 0x4}, 0x38) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1601, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={&(0x7f0000000540)="40d052fde3d34fa3a96b007d1a7721a0ee2475320d3f47233273d66644b9ad092523f04f572b2546362cb67450af25da3ac78b2534defaf14ecb08322dde2c49efeb116fcafa61e046e64a09827315e98848de2166e18f788a156a7dc96ccf9783dc1be6af1bbbaa5d74918490ee936b321df10c6884e1594068a80eb2120c55ef7b2f348dc2d5a1027478ed1d6de507cd8fb2fa118c02e9a0", &(0x7f00000000c0)=""/16, &(0x7f00000003c0)="f70fb4db632b84085e976a89b5d948c726a1ba3d87c91317c57a1bd8f98b14ec201a20af6e675d01deaaf55b55eb1d5fc02a0e4573c90893f4", &(0x7f0000000600)="67bd5ba1b5cfcae7651a2e5f5e182688ec44204b23aeccd995bec8414d6f5f498306668a2e60661a1ffeb6717bde7e92710d738c252ae9cc7e3a574b", 0x1, 0xffffffffffffffff, 0x4}, 0x38) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000a00)={'dvmrp0\x00', @random='c\b\x00'}) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f0000000000), 0x4) 2.254626048s ago: executing program 4 (id=3141): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000017000000b7080000000000005b8af8ff00000000bfa200000000000007020000f8ffffff5444000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000600), 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 12) 1.931218164s ago: executing program 2 (id=3142): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0x5}, 0x800, 0x0, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x200009668}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async, rerun: 32) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="00000000000000100006000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) (rerun: 32) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={r1}, 0x4) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000200000085000000b600000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) (async, rerun: 64) close(r4) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) (async, rerun: 64) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x80047441, 0x2000000c) (rerun: 64) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000e3f40000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="180800001b00000000000000ffff000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000002b7020000000000007b6af8ff00000000b5090000000000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff7402000008000000c5ab09ca", @ANYRES32=r6, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000028500000005000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="740a0000000000ec6910ac0000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd1200000000000085000000b0000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad03c22624c9f87f9793f50bb546040677b2d9e31fc79db0c5077da90fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c4089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302003d2036b8a24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3a4d6926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873095cbff90326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288c9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffff9c77000000000000ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0f3494d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36060000000000000006f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb9973164a714b930b075bdaaedbf17866fb84d4173731efe895ff2e1c5560926e90109b598502c9e959ef939ec71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a45a1c168d832fecb06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a636c3b0e69102d1567f2e4d9dc080466c51bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf790842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc9da71c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e4a4660fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000200000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1b3be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fad05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6000010237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b0842bd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920386f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945eceda26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9f96756ea5cce7daac4be29bcf58ff30159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf974fcf36cbf6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e3c78b2a78f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397dacafa86966d7ba10413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd574d67ff2a49c4f93c0984b5c2d452340000d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d2cd1fe21ba8eaab827624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c79217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b29637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000002b77000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae4ffffffffb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a73efb16d4b2db6421fd4e343fa23bad8240e51067d5d675d0104361c37c61a43b5afd865b60d4cae891b73220f17d25979a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2d7a510000a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7f090000001551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab0300d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c7a1b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e64701b049239e7f5faac16441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867810000004faa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a2689217380400a9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3adf01a072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a20ffffffff682139c58ac1deb039a691ad640e12c12fe11d70fe495906f2d5d71778acbd4eee53a3996cb0de84bd2b059d60c0f96a53ea44e0b293865aa68df494f87db976e36ad6c06912244d4c883c4aaa60b4a1392ce0b2f2c51966504652ff871e0f6dfff9f7d34ecf04be0a58c354fb7388ff7796d53174b67d1886e34b81ad8c60da56acc64739c3acab24aa8d0ac92d465074f915608b1b60a948bad401b1a7fb3627bbe6c45123ed44bfdf8cc143bd1b7a663dc3d0476b8e39becffc429e41f66b1e37ae52aacaff0f1dc8ea70b68c25072e20586b19127d75fa71577f265c51000000000000000000000000003bba840af65aff3d8261bc163b57a23d3e3ab2d8bbd314cd5c7699bd08f58b83c07e8c3d36261609e8d5461e2e7633e8377627ccf0613308155aaf7d746c08a685ea9ae0ab702ee4edc393d76a73d00452b1cc6eeadd186f54ea77c416a4b2cbcfe37fc778621a3178baae78ff1b7ded218a3366712b3feb9415141ecb23abfb37f43a1c6dd6354a104b2cb17b90757b6a71459cc758463be2ca2d80aa285ff00fff4381bfcf659dd02147b74f784d06d0c3be24f26405ce09fb31688dbc5430c8a02079d2d128a6b72cc54d6c859d9a2fd8e87f87cd096ec92440c5c6d6905955d0e74a80385011e16f05d3eb815b0333ca5f6d3cf82962a4ed240ef1bcd2ad552c00e10fb9dd9f0ea7987eb6187aa310dfc3d5e63c31118d284b253d8a52d0081eb36e502b6de0ae05836469bf82b5055feaeef92a3e07446d86a971bcfdd7ed1b1cb44ac59faa9fc81d405c65cf0b74709a000000001283bf8f1df0acd0edffa16ed206042809d15ca101afda8a461d1f0f48e28e8a5c8ccccc0d86a9ec1fac367a2b7c6879000000000000000000000000000000000000da408de957a3b509882b212e0169d0a4194b21a144d9c08f5c9460ff45701d0a8db27d34fe973fab987d6ceb2e8524b84f6aedb811c048f5d8e7f8f5879f4a430fa4275f2cb50e0575dacb04b510d19d1a3b21b937f85ec9948cd3efedff8c886ce01119c36e76088b4e452f94b7a45421058132cc74a21b37c587dccdc209ff86840d75e58a806f90a243664cceedfc2d915f6f4f6047390c9ac78bb7bf8f01a08d63c925c9a5718ce721cb4207697ff3d524897436f9696321878639ce34af2c3807fb181b1471eff7470f1254b426e2d2550ab5cd8210664f318f4a0b370d63ebc658b4544b6bc4ac192fe39e554bcaab67caaf6e058e46d0eb71d6ec2137c0487602e2175c87581b7b1aecb6158ac1fe65e37e7eb581873c95f3eb4c6e2ebcc2ae55f3d25bbf3bc3b35bfbb4233db7d998a7b6c494992680380caf577b04d6d44883a547f401ab2df13ba6ef0f96e626ed3a4ea196e99ccad3234f9648cb5d6bc140472c0721660b963d6f5bf70f78f541c7a5e7a91e4741317a0d779b44b52d8c2b200d1e2e8674c427ec2d1c2286118dbb839ada07fa4ee86b9e18b4114b2b4dd8d799aa76d07bbd3a6e350be8591aadefef39e1d4b7cf59b2e9a3b23ed81110beca3190faa027dc7cba6a214a5f2ff011db2e77f51cedd449103b3ef36d04d9fa0f67dc78053640f06364c9c745eadd6ab3052750c54137a18ea3eb7e7caf8542934586fea611b94c1800b7ab4bd371da15027d88ac1cdb52c2f73467ee66f05040e1f780da007e87936c91bf1b145bc64a9a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x22, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r7}, 0x10) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x12428, 0x0, 0xffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (rerun: 32) 1.930812694s ago: executing program 4 (id=3143): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) (fail_nth: 4) 1.798550217s ago: executing program 2 (id=3145): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair(0x2, 0x3, 0x1, &(0x7f0000000300)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x41aa1000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000071122c000000000095"], &(0x7f0000000100)='GPL\x00', 0x8000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xdf) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00'}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 1.786922577s ago: executing program 4 (id=3146): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) 1.747876577s ago: executing program 1 (id=3147): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1600"/20, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="1d0000000400000002000000fdffffff01020000", @ANYRES32, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRES16, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r4}, 0x57) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xd51cb64ff5f5e3e1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00'}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000500)='kvm_ioapic_set_irq\x00', r7, 0x0, 0x2}, 0xfefa) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1700000000000000008400000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008e0d9e3a144b586310574fbb4c49d787d04dd5adbf2b866078577a58cefb6b2e804840cb4a04b7c1987f1c1579a9c968b847bad306f4e3a9963be9acea7b990a765dc834f3e0092aca0e59295c3e0c21634b3bccef45d53ace2d389df3d48b2969f94776b9cae6a3217ddf58915963a5078dbedfe75d4e2a617ee7f2c5219e9e20b45a219547c5a8bbac6fbf74965067f75e528a6a3f121c717ffb28deaa"], 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r8, 0x0, 0x20000000}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r9, 0x40047459, 0xf0ff1f00000000) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.60796187s ago: executing program 3 (id=3148): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x58, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x170, 0x170, 0x6, [@int={0xb, 0x0, 0x0, 0x1, 0x0, 0x5d, 0x0, 0x7a, 0x7}, @ptr={0xb, 0x0, 0x0, 0x2, 0x1}, @union={0x8, 0x7, 0x0, 0x5, 0x1, 0x4, [{0x10, 0x4, 0x3}, {0x4, 0x4, 0x6}, {0xc, 0x4, 0x4}, {0x4, 0x5, 0xf}, {0xd, 0x3, 0x8}, {0xd, 0x2, 0xfff}, {0xc, 0x2, 0x5}]}, @enum64={0x10, 0x8, 0x0, 0x13, 0x0, 0x2, [{0x2, 0x6, 0x5}, {0x2, 0x200, 0xa1af}, {0x7, 0x3, 0x5}, {0x6, 0x5, 0x1}, {0xc, 0xfffffffe, 0x2}, {0xc, 0x4, 0xfff}, {0x10, 0x3, 0x400}, {0x10, 0x8, 0xffffffff}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x13}}, @decl_tag={0x10, 0x0, 0x0, 0x11, 0x4, 0x4}, @fwd={0xb}, @fwd={0xa}, @union={0xd, 0x5, 0x0, 0x5, 0x0, 0x2, [{0x8, 0x3, 0x3}, {0xe, 0x5, 0x800}, {0xc, 0x1, 0x8}, {0xd}, {0xc, 0x5, 0x1000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000c00)=""/123, 0x18e, 0x7b, 0x0, 0x3, 0x0, @void, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000fc0)={r1, 0xe0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000d00)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb9, &(0x7f0000000dc0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000e00), &(0x7f0000000e40), 0x8, 0x100af, 0x8, 0x8, &(0x7f0000000e80)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x15, 0x13, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x8}, [@tail_call, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000680)='syzkaller\x00', 0x1ede58db, 0x3e, &(0x7f00000006c0)=""/62, 0x41100, 0x9, '\x00', r3, @fallback=0x9, r4, 0x8, &(0x7f0000000cc0)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, r6, r2, 0x1, &(0x7f0000001000)=[r0], &(0x7f0000001040)=[{0x4, 0x2, 0xc, 0x7}], 0x10, 0xfffffff7, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, 0x0, 0x0}, 0x20) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001439) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x16, 0x8, 0xc, 0x8, 0x1, 0x1, 0x0, '\x00', r5, 0xffffffffffffffff, 0x0, 0x20000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r7}, &(0x7f0000000380), &(0x7f00000003c0)=r8}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r9, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="15000000030000000c000000b642000002040000", @ANYRES32=0x1, @ANYBLOB="070000000000000000000400003200000000a6d5cc0a4851c726d47d000028d0b391fe5e878f4e4dd95df4626fa974bc62c58100000000", @ANYRES32=r3, @ANYRES32=r10, @ANYBLOB="05000000040000000500"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x37de6c8a68769c38, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.60612914s ago: executing program 3 (id=3158): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'gre0\x00', 0x10}) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000084850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) socketpair(0x23, 0x5, 0x1000, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x2, 0x8, &(0x7f00000002c0)='\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b40200000100000061194c0000000000850000002700000095000000000000009683c8d87699f72fa94f436ec1ff59664e1812f6082c68dc707bb9f12e6c61cd4eae5bf6260e5fea29f5ed7de02389b1920d7a82010a3d38f11ebe70164ac81bbcbe4b1aecaec10000a658e53c437c980bd722d70403e4c52b30b7239c38ea22f0a9919415cfe83e9ff9218b82eb5f84ed89ee56bf5c040713f97dea7437cc0ce0b864ac010b8a0c7348e6a3e4d7ef63bf74855d42530f1b5dfc9deb2b0933b1a3c8fd7e4bf87fa9cc0237c6e266a92f0e986a8c43665827331c824c06a6dfb5127a8ae20e634f787447afecd92b6da2e8ac5bb8463b1a450e97e1c2628a5958"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_procs(r3, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000d313f800000000", @ANYBLOB, @ANYRES32=r2, @ANYBLOB, @ANYBLOB="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", @ANYRESDEC=r5], 0x48) openat$cgroup(r3, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) (async) socketpair(0x10, 0x3, 0x6, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) (async) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)) 1.524889962s ago: executing program 2 (id=3149): bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x33fe0}], 0x1}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x44000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000380)=0x1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) syz_clone(0x5200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000640)='fib6_table_lookup\x00'}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 1.524055222s ago: executing program 4 (id=3150): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000017000000b7080000000000005b8af8ff00000000bfa200000000000007020000f8ffffff5444000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, r0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f00000100000012", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000080000000000000000000001811000074d7b87b57fe6eeeca726953bba4740c11f725b940357d21da4fa3d9e02dfc040ac69fc54872b0648a27a8b3c6f1e963bbb6b1a66f75898bfeeed203c691ecf6b54bc473850ad78e39722d05972210fa4ea6050678042e37cdcd08000000908e2313ab2607b93114198b79684d988b48aee9385787abdc641d549aff15fdbafaa441618cf337d77276e652fb7a794f8f2428de32f65b4bb629dd424494dcaf8886c1533273e6c2dd3b169f3952172d64", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)="988d0466195d47819873cca522548dfc962dfef155718e2c4cdff22d4f875640faba10ca4e20acbd99c66d001b965b1a126a7051e84b259de0eb828440", 0x80000002, r3, 0x4}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[], 0x31) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) close(r1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="880e629500000000ace1fb000014c88e1b650ab9b000000000000028aee9125248eb72c46f11aca5250f60", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.416103844s ago: executing program 3 (id=3151): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x40000) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) (async, rerun: 32) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x49, 0x49, 0x9, [@enum={0x8, 0x3, 0x0, 0x6, 0x4, [{0x5, 0x87}, {0x1, 0xf833}, {0x6, 0x9}]}, @datasec={0xa, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x8, 0x1e57}, {0x3, 0x4, 0x33}], '3'}]}, {0x0, [0x61, 0x30, 0x5f, 0x61, 0x61, 0x61, 0x5f]}}, &(0x7f00000002c0)=""/31, 0x6d, 0x1f, 0x1, 0xfffffffa, 0x0, @void, @value}, 0x28) (rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x8002, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r1, @void, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x70000000, 0x0, 0x3f00, 0x0, 0x0, 0x1000, 0xff600000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000}, 0x3b) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000200000000000000000000040000000000000000010000040018ed700000000001000000010000000000b68318bd5a3f0e875dcd40ff139e8fb18c7241747fe16c84fd7b7e36f4572df38d074c6aab5249fac744639f9be2a81744298505f7d99bd66b36fa7038ee4b15a04e38f8181fe9ca0c9ceaf3b86704e70b0fb653d93a82b157ec950d050c64e32c164a1bb39232b43ee398e224e6d16553969831a5b8b93d453d80b463c95bc7e18e5b17d0525ce0800320d67c3033da7e00c70f88613b08eeaf760435f2f63d"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2, 0x0, 0x0, @void, @value}, 0x20) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@fallback=r5, 0xa, 0x0, 0x1ff, &(0x7f0000000080)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7d}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r9}, 0xc) (async) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.356825405s ago: executing program 3 (id=3152): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000007420ca9f1a4d845097c209b22a044aa77bf687c75e23037f16dfc77a4d919baaaa3600ae98f13560de2b7b538d1170a86a1081d19dfeeed00f7f9f9b93d81e86d85d9ce1776c1e394189c167d5d7260b5012e4961e3dacaa302e0aeb6c35c1d7ac89522b87ee5fad33015c3739cc6152cf2a8fa58ced98a0374051b61d74f47bd0e33422b7fc5faecf20af1b7aa890c2e848a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r2}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRES16=r0], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r5}, 0x69) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000fc971d39da0b0c339848828a65e1621f4550a13ef7e710cbb2aaeb5f173b65a530db43d79ba25128048431be6976e2b45f6e08000000000000001a70f4dd976300"/106], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c40)={{}, &(0x7f0000000800), &(0x7f0000000c00)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000240)='./cgroup/../file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54611, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x9, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1ff, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r6, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000180)='%ps \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r8}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.355971505s ago: executing program 0 (id=3153): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3}, {0x61}, {}, {}, {0x6}]}) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0xb, &(0x7f00000006c0)=@framed={{}, [@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.284413856s ago: executing program 0 (id=3154): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b000000b900000001000100", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f00000001c0)=r0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000040), 0x3b) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1088d8b8588d72ec29c48f0af5f2d9f51c4b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465ad32b77a74e802a0dc6bf25cca242bc6099ad2300000480006ef6c1ff0900000000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000126abfb0767042361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b6c7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae645ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48fc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1fb8f72cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa7956488bef241875f3b4b6ab7929a57affe760e797724f4fce1093b62d7e8c7123d890decacec55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f870b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3acb2003016f154772f514216bdf57d2a40d40b51ab67903ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1594e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214d00000000d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c471c784ae7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec30cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd63bed8d31c31c37a373d4efd89f0000377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f0059161c5e0000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe34124172e436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fa03b84f63e022fe755f4007a4a899eaf52c4f491d8e97c862e29e457060000007ac691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104ebc1581848f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c716357d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c24936615ee68538e8fddd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426ca85e82ccf821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ad6acf5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba1c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63c41cbde2ba66ad81168070c8c6e18a6e452a31bdc4a60d637545ed4c8a1c649c3ce54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c5140200000054d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c7340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a3bc38613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f14eafe4b28ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1bfeef448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae0040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483f02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e9180100000000000000654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732e74dd690c57bdfdc1f069f9491bca7a8c59363799be70018c25ece5ad7307dc7a95c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272ab28a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece98c077b358e752b439132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae2676384ff799783f55d7e5a1a092a01b965dc99cb7a9d98440c355927629f2bcf9dc2396eb2f5d25829715b24327642ac48f1201014a95e0e65e12cdf27e19043e3c5d3e798375cead35b9a93190a52cdecaaccc854a1d41ef365303f0e9b4fc969c9dab6df5e8a795b140fcc09e8a7b694d12932917facd8ceaa4e2d0d16bb0b95387fcd5ff136d8abddf94daf442bbff744591931872a36cf921ad69f2127386e8b0f9afee4da8d3fbec809fbb3ca0fded2859cf25d4c6155d396c5b9bd1a928923123f63f4c40688eae69990a9419456247bbaeb7948de84d2ff875414883bb1e503d4bfebc01bc12a53ea06bf38e571157bd642dac25dbee7832c58378374a39483d6721eec96c28911db21c0c006b42afc90000000000000000000000700000000000000000008ce4ea442c1a207108b35511186c5e860278f6463f52f3990ce08b1bfccc3cff4b5ae27b610aa9ba11b47d4f94c439e055cdbb2b12c983885c93ea4ab4ca1e02d831ae162ee104"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x80000000, 0x9, 0x2, 0x2c00, r2, 0xfffff786, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2, 0x2, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000014007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) 1.174021458s ago: executing program 3 (id=3155): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000017000000b7080000000000005b8af8ff00000000bfa200000000000007020000f8ffffff5444000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000600), 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 13) 1.148627499s ago: executing program 0 (id=3156): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) (fail_nth: 5) 1.09908088s ago: executing program 1 (id=3157): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000980)='@\\]!:-#-@\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d80)=ANY=[], 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0}, 0x24048850) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a000000070000000300000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r5}, 0x69) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000008000000060000000000000e010000000000000000000000010000060400000006000000000000000000000000005f005d8819de"], &(0x7f00000001c0)=""/131, 0x44, 0x83, 0x1, 0x0, 0x0, @void, @value}, 0x28) socketpair(0x2, 0xa, 0x0, &(0x7f00000000c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1}, 0x6e, 0x0}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.07727411s ago: executing program 2 (id=3159): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'batadv_slave_0\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x1}, 0x18800, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x1}, 0x18800, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'netpci0\x00', @random='@\x00'}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000baf99c004dffff6e850000002a00000095000000650cdeca186c83297017052455c7fca1842d1ca042f786ebea5b07136a8386754b733e03cb87e4368ce637d6f9a0ae3d7bd173f939f8dfeacf128381dc090000000000000018517041cb66cff9977724a3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1b0000000000000000000000fe7f00000000000030e0a414fc95ef6a706bed6e5c39ad7584f80ae66c408b0b7da6", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000a40)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000a40)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xc875, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x100002, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000e83f99ad40abb71e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 617.145688ms ago: executing program 3 (id=3160): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="020000000400000003000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b0000000000000000d55ad1c093a02cba1fc5d25f36d8e16b0373cd65e069946697aa99dce0148abbe1c9b1fe299412970f28df6fde05db8460ab87861f91956cc0a8c47a", @ANYRES32, @ANYRES64=r0, @ANYBLOB="0000000000f2ff00db260d00"/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000070a00006a0a00fe0000000c850000005a000000b70000000000012995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}, 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x9852}, 0x0, 0x100000, 0xfffffffc, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYRESOCT=0x0, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x14, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB='6-d'], 0x6a) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xebf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 145.683487ms ago: executing program 1 (id=3161): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0xff4c6b5425a3810d, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000880)=ANY=[@ANYRESHEX=r4, @ANYBLOB="0413eb3606235e0735825d0e33b6ef9bd34e94a77e5d1425b7477188642d4dc6e329433ca4cf475ba374e65f3c2b53a11b12aa1056c40f858e201ee02ebb9b0dc5ad61aeea1c1e9e751a43a4feaf5067798f8b75510f6488b5fb1d0ed17193b416e5cdd67f30bb68785d0197a016512a6362eac443d7c4ef61addf84f8c585a2eb9999df0a63265be707b328a61eacb134e755ac382db0e0f816", @ANYRES32=r3, @ANYRES64=r5, @ANYRES16=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r1}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) r9 = openat$tun(0xffffffffffffff9c, 0x0, 0x4500, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRESHEX=0x0, @ANYRES16=r3, @ANYRES64=r4, @ANYRES8=r4, @ANYRES32=r2, @ANYRESOCT=r9, @ANYRES8=r7, @ANYRESHEX=0x0, @ANYRESHEX=0x0, @ANYRES32=r10], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0xf7e3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000600)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r12, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r13}, 0x10) ioctl$SIOCSIFHWADDR(r11, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r14, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 115.615248ms ago: executing program 4 (id=3162): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000cae74b68104b45f54b0438df1457fb4595e695af3ee435647e730d56f12d09c4259766ba1216b14d2ccfbac1cef9a1e5ce6e78569cb14217d2086cf60000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000000)='console\x00', r2, 0x0, 0x6}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 52.196669ms ago: executing program 2 (id=3163): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0x3, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0xfffffff9}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (rerun: 64) 50.910529ms ago: executing program 0 (id=3164): r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2a, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xec, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0x8, 0x0}, 0x8) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xe, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}], &(0x7f0000000640)='syzkaller\x00', 0xd25b, 0x6f, &(0x7f0000000680)=""/111, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000740)=[{0x4, 0x4, 0x6, 0x6}, {0x1, 0x4, 0x9, 0x8}, {0x1, 0x3, 0x4, 0xc}, {0x5, 0x2, 0x1, 0x5}, {0x0, 0x5, 0xe, 0xb}], 0x10, 0x2, @void, @value}, 0x94) (async) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1e, 0x2b, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000001}, {}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @jmp={0x5, 0x0, 0xd, 0x2, 0x4, 0xfffffffffffffff4, 0x1}, @alu={0x4, 0x0, 0x3, 0x4, 0xa, 0xffffffffffffffc0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffeff}, @call={0x85, 0x0, 0x0, 0x25}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xef95}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0xa, 0x0, 0x0, 0x61780, 0x1, '\x00', r1, @sk_lookup=0x24, r3, 0x8, &(0x7f0000000540)={0x9, 0x2}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x1, &(0x7f0000000980)=[r6, r7], &(0x7f00000009c0)=[{0x4, 0x3, 0x5, 0x6}], 0x10, 0x6, @void, @value}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ac0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x146180, '\x00', 0x0, r0, 0x3, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000b40)={0x2, 0x4e22, @private=0xa010101}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000b80)="2b7ced4ca8f2252975aabe453c9c8104501f76ba45230d9a2c269e8f41bbb478d95fcaf617d50f8ccb1d752cef0be857b62dee78a25efff14ff3cfaab379bf2cd23716b3b53f6060ba606a626d6c2e3d25cd6c5725", 0x55}, {&(0x7f0000000c00)="0fa734730e0eafd6134b9de232c209d7603f53163a83b804f0eb0e4eb4cc99200ddf2a44ae031e487e71360474a29b50fd246e6aa3db6dc20b74dc78cd49d202b7407241674418ea328997b2eb1d68a2b389f429fdbd0a34ce9144a0534026602165b39b55c99987df828a5412fbd569b1dff738a656e0482a20734fdac133869e85eac09eba0824e1c029d7", 0x8c}, {&(0x7f0000000cc0)="3a30da7a252c3aa7592d0fccc9c83774caa37def52304eb4e2dccc1e5fe971f81d719c91c8d43bec4b378be55d3865544fdc80003a022330b817d0c54f1a72cb0565b7c25df56cd8a60950bafa65e0385f25e066737369bc7286d8d276019820ddb663b48736790016b726d94c236238758691f81a86aaa747ce001733f1a2ce95c95fb10e9bfcff61a1b7c9061f2c6ddc9571ae464e06df7c9cac11014904b113352d584fa18390", 0xa8}, {&(0x7f0000000d80)="4b7e77d4e4f2d38585565ab61b73bf29493687b432965003ae447f00", 0x1c}, {&(0x7f0000000dc0)="b43ad96f214a957fcc45c37a717b7ea2b2cd676eb7a7bc8a2a204bd4a24b32c61af8ec1b3eb126c3d2789eb3", 0x2c}, {&(0x7f0000000e00)="7f033fd2d729f054f19d2c15f31690b1f36761e9a77e9bb4259b68b536a516899229e63f29b55ddc9f2cbb6b63b64e9d8c47b30f23b432717342c2f9fa4ccb497b8993e00d4e137285d5fcf87b7e3144731b2d670c229ecc5ce7e7c3f09eaf2379def1f25d95b8fd9b3543dac7419cdf9fc9", 0x72}], 0x6, &(0x7f0000000f00)=[@ip_ttl={{0x14, 0x0, 0x2, 0xfffffffc}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x76}}, @ip_tos_int={{0x14}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast1, @dev={0xac, 0x14, 0x14, 0x18}}}}], 0x98}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001180)={r7, &(0x7f0000001000)="f5000704d80cc860b062954ed000bdd7349f523de8f2c389f340402b816ec57341413e8576bc532ed7b1d7ca966d9b78f9abd4d2e27f4633766c69b100823307d7b59bb46fce4ff3ea", &(0x7f0000001080)=""/252}, 0x20) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000011c0), 0x2000, 0x0) (async) r9 = openat$cgroup_ro(r8, &(0x7f0000001200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) openat$cgroup_int(r9, &(0x7f0000001240)='cgroup.max.depth\x00', 0x2, 0x0) (async) ioctl$TUNGETVNETLE(r9, 0x800454dd, &(0x7f0000001280)) (async) socketpair(0x9, 0x6, 0x101, &(0x7f00000012c0)) (async, rerun: 32) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001300)=r2, 0x4) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x5, 0x8, &(0x7f0000001340)=@raw=[@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x71ff}}], &(0x7f0000001380)='GPL\x00', 0xffffffff, 0x7a, &(0x7f00000013c0)=""/122, 0x41000, 0x48, '\x00', r1, @fallback=0x9, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x0, &(0x7f0000001440), 0x0, 0x10, 0x3, @void, @value}, 0x94) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3ff) write$cgroup_int(r0, &(0x7f0000001540)=0x8001, 0x12) (async) r10 = openat$cgroup_int(r0, &(0x7f0000001580)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f00000015c0)=0x7f, 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000017c0)={r0, 0x20, &(0x7f0000001780)={&(0x7f0000001600)=""/193, 0xc1, 0x0, &(0x7f0000001700)=""/123, 0x7b}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001ac0)={r5, 0xe0, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000001840)=[0x0, 0x0], &(0x7f0000001880)=[0x0, 0x0, 0x0], 0x0, 0x9b, &(0x7f00000018c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000001900), &(0x7f0000001940), 0x8, 0xb8, 0x8, 0x8, &(0x7f0000001980)}}, 0x10) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000001b00)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) (async) r11 = getpid() syz_open_procfs$namespace(r11, &(0x7f0000001b40)='ns/pid_for_children\x00') (async) openat$cgroup_procs(r9, &(0x7f0000001b80)='tasks\x00', 0x2, 0x0) openat$cgroup_pressure(r9, &(0x7f0000001bc0)='cpu.pressure\x00', 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f0000001c00), 0x2, 0x0) 23.492679ms ago: executing program 2 (id=3165): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0xe569, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000faffffff0000000000004000850000002c0000001800000004000000000000000700000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x27, 0x8, 0x0, &(0x7f0000000140)="f3ed48cc460029fc", 0x0, 0x1400, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b0000f604000000000400000900000001000000ab4aaf5c8931ce56d4dcfd721803de46f0acc29ac8e57a5e54f1ef8c9cd8adb179b167c48be7110c4c69c6cf4f09fc43ea5b7d495d0baf2436f744fa820e0a03a8b44979d2c5d4ea83d2f550de72b1c8882af5a462543c", @ANYRES32, @ANYRES8=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28, @ANYRES8, @ANYRES16=r5, @ANYRES16=r4], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000b98b1d00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000280)='sched_switch\x00', r7, 0x0, 0x6}, 0x18) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x61, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800, @void, @value}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x1000}) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r11}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r10}, 0x10) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) 0s ago: executing program 0 (id=3166): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00'}, 0x10) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1, 0x0, 0x0, 0x2044}, 0x60) (async) ioctl$TUNGETVNETLE(r2, 0x40047451, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xe}, 0x8, 0x0, 0x0, 0x4, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x68, 0x1, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x6}, 0x810, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8a}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x40047451, 0x2000000c) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="12000000090000000400000002"], 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000005016f519eb3d49d5409e4535146f58e8d8c91417f0d3b21488519a0130947da4a319c6d410a8437aca9e3f4799ed2486af3fe6ec7d8a3fa961d2f214990aa33c5f9fd1a99b054e43ab77fb21bbb06a20cc0dab759f6075bc1d56e01d992ec4e6d6e3b4a4701db1a9a85fffe280f883738a947da106a9ead1939b7a8b2f9d13d3b13cb7761d89b0c2de578b791965fbd10a66f9b710ecc23e909f0a08e22eac76", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e00000009000000070000003f0e000040080100", @ANYRES32=r1, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00050000000defff00000000c500000000", @ANYRES32=r1, @ANYBLOB], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="0000000000010000000100a6965c41a900"/26, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2102, 0x0) kernel console output (not intermixed with test programs): 74.205240][ T2061] kmem_cache_alloc+0x3b/0x320 [ 74.209844][ T2061] getname_flags+0xba/0x520 [ 74.214270][ T2061] getname+0x19/0x20 [ 74.218000][ T2061] do_sys_openat2+0xe0/0x870 [ 74.222510][ T2061] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 74.228500][ T2061] ? do_sys_open+0x220/0x220 [ 74.232929][ T2061] ? fput+0x15b/0x1b0 [ 74.236745][ T2061] ? ksys_write+0x260/0x2c0 [ 74.241088][ T2061] __x64_sys_openat+0x243/0x290 [ 74.245786][ T2061] ? __ia32_sys_open+0x270/0x270 [ 74.250579][ T2061] ? debug_smp_processor_id+0x17/0x20 [ 74.255751][ T2061] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 74.261654][ T2061] ? exit_to_user_mode_prepare+0x39/0xa0 [ 74.267123][ T2061] x64_sys_call+0x6bf/0x9a0 [ 74.271463][ T2061] do_syscall_64+0x3b/0xb0 [ 74.275716][ T2061] ? clear_bhb_loop+0x55/0xb0 [ 74.280226][ T2061] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 74.285955][ T2061] RIP: 0033:0x7f101d38bad0 [ 74.290210][ T2061] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 74.309667][ T2061] RSP: 002b:00007f101d1fef10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 74.318682][ T2061] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f101d38bad0 [ 74.326584][ T2061] RDX: 0000000000000002 RSI: 00007f101d1fefa0 RDI: 00000000ffffff9c [ 74.334597][ T2061] RBP: 00007f101d1fefa0 R08: 0000000000000000 R09: 00007f101d1fecd5 [ 74.342502][ T2061] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 74.350304][ T2061] R13: 0000000000000000 R14: 00007f101d5a5fa0 R15: 00007ffdae481018 [ 74.358124][ T2061] [ 75.097743][ T2116] FAULT_INJECTION: forcing a failure. [ 75.097743][ T2116] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 75.218786][ T2116] CPU: 0 PID: 2116 Comm: syz.2.519 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 75.228351][ T2116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 75.238248][ T2116] Call Trace: [ 75.241366][ T2116] [ 75.244146][ T2116] dump_stack_lvl+0x151/0x1b7 [ 75.248663][ T2116] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 75.253965][ T2116] dump_stack+0x15/0x18 [ 75.257943][ T2116] should_fail_ex+0x3d0/0x520 [ 75.262458][ T2116] should_fail+0xb/0x10 [ 75.266451][ T2116] should_fail_usercopy+0x1a/0x20 [ 75.271310][ T2116] strncpy_from_user+0x24/0x2b0 [ 75.275997][ T2116] ? enqueue_hrtimer+0xca/0x250 [ 75.280688][ T2116] ? getname_flags+0xba/0x520 [ 75.285206][ T2116] getname_flags+0xf2/0x520 [ 75.289762][ T2116] getname+0x19/0x20 [ 75.293495][ T2116] do_sys_openat2+0xe0/0x870 [ 75.297927][ T2116] ? do_sys_open+0x220/0x220 [ 75.302348][ T2116] ? kvm_sched_clock_read+0x18/0x40 [ 75.307383][ T2116] ? sched_clock+0x9/0x10 [ 75.311548][ T2116] ? sched_clock_cpu+0x71/0x2b0 [ 75.316240][ T2116] __x64_sys_openat+0x243/0x290 [ 75.320927][ T2116] ? __ia32_sys_open+0x270/0x270 [ 75.325706][ T2116] ? debug_smp_processor_id+0x17/0x20 [ 75.330901][ T2116] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 75.336803][ T2116] x64_sys_call+0x6bf/0x9a0 [ 75.341145][ T2116] do_syscall_64+0x3b/0xb0 [ 75.345394][ T2116] ? clear_bhb_loop+0x55/0xb0 [ 75.349915][ T2116] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 75.355764][ T2116] RIP: 0033:0x7f0e62f8bad0 [ 75.360014][ T2116] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 75.379457][ T2116] RSP: 002b:00007f0e63e29f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 75.387701][ T2116] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f0e62f8bad0 [ 75.395509][ T2116] RDX: 0000000000000002 RSI: 00007f0e63e29fa0 RDI: 00000000ffffff9c [ 75.403320][ T2116] RBP: 00007f0e63e29fa0 R08: 0000000000000000 R09: 00007f0e63e29cd5 [ 75.411130][ T2116] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 75.418945][ T2116] R13: 0000000000000000 R14: 00007f0e631a5fa0 R15: 00007ffec6e42ff8 [ 75.426762][ T2116] [ 76.987609][ T2188] FAULT_INJECTION: forcing a failure. [ 76.987609][ T2188] name failslab, interval 1, probability 0, space 0, times 0 [ 77.008925][ T2188] CPU: 1 PID: 2188 Comm: syz.2.541 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 77.018496][ T2188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 77.028391][ T2188] Call Trace: [ 77.031508][ T2188] [ 77.034288][ T2188] dump_stack_lvl+0x151/0x1b7 [ 77.038802][ T2188] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 77.044108][ T2188] dump_stack+0x15/0x18 [ 77.048082][ T2188] should_fail_ex+0x3d0/0x520 [ 77.052597][ T2188] ? __alloc_file+0x29/0x2a0 [ 77.057027][ T2188] __should_failslab+0xaf/0xf0 [ 77.062319][ T2188] should_failslab+0x9/0x20 [ 77.066661][ T2188] kmem_cache_alloc+0x3b/0x320 [ 77.071272][ T2188] __alloc_file+0x29/0x2a0 [ 77.075516][ T2188] alloc_empty_file+0x95/0x180 [ 77.080108][ T2188] path_openat+0xec/0x2d60 [ 77.084371][ T2188] ? kasan_set_track+0x60/0x70 [ 77.089184][ T2188] ? kasan_set_track+0x4b/0x70 [ 77.093789][ T2188] ? kasan_save_alloc_info+0x1f/0x30 [ 77.098904][ T2188] ? __kasan_slab_alloc+0x6c/0x80 [ 77.103778][ T2188] ? slab_post_alloc_hook+0x53/0x2c0 [ 77.108889][ T2188] ? getname_flags+0xba/0x520 [ 77.113398][ T2188] ? getname+0x19/0x20 [ 77.117346][ T2188] ? do_sys_openat2+0xe0/0x870 [ 77.121915][ T2188] ? __x64_sys_openat+0x243/0x290 [ 77.126854][ T2188] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 77.132858][ T2188] ? do_filp_open+0x480/0x480 [ 77.137644][ T2188] do_filp_open+0x230/0x480 [ 77.142249][ T2188] ? vfs_tmpfile+0x480/0x480 [ 77.146987][ T2188] ? alloc_fd+0x4fe/0x5a0 [ 77.151152][ T2188] do_sys_openat2+0x151/0x870 [ 77.155667][ T2188] ? do_sys_open+0x220/0x220 [ 77.160078][ T2188] ? bpf_trace_run2+0x138/0x290 [ 77.164762][ T2188] __x64_sys_openat+0x243/0x290 [ 77.169449][ T2188] ? __ia32_sys_open+0x270/0x270 [ 77.174221][ T2188] ? __bpf_trace_sys_enter+0x62/0x70 [ 77.179345][ T2188] x64_sys_call+0x6bf/0x9a0 [ 77.183679][ T2188] do_syscall_64+0x3b/0xb0 [ 77.187941][ T2188] ? clear_bhb_loop+0x55/0xb0 [ 77.192450][ T2188] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 77.198205][ T2188] RIP: 0033:0x7f0e62f8bad0 [ 77.202432][ T2188] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 77.221873][ T2188] RSP: 002b:00007f0e63e29f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 77.230138][ T2188] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f0e62f8bad0 [ 77.237928][ T2188] RDX: 0000000000000002 RSI: 00007f0e63e29fa0 RDI: 00000000ffffff9c [ 77.245740][ T2188] RBP: 00007f0e63e29fa0 R08: 0000000000000000 R09: 00007f0e63e29cd5 [ 77.253550][ T2188] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 77.261363][ T2188] R13: 0000000000000000 R14: 00007f0e631a5fa0 R15: 00007ffec6e42ff8 [ 77.269179][ T2188] [ 77.495806][ T28] audit: type=1400 audit(1743819240.538:141): avc: denied { create } for pid=2200 comm="syz.0.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 77.759922][ T2044] syz.3.498 (2044) used greatest stack depth: 21664 bytes left [ 77.853463][ T2222] tap0: tun_chr_ioctl cmd 1074025681 [ 78.305128][ T2251] device pim6reg1 entered promiscuous mode [ 78.932193][ T2272] FAULT_INJECTION: forcing a failure. [ 78.932193][ T2272] name failslab, interval 1, probability 0, space 0, times 0 [ 78.970886][ T2272] CPU: 1 PID: 2272 Comm: syz.0.564 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 78.980463][ T2272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 78.990357][ T2272] Call Trace: [ 78.993479][ T2272] [ 78.996253][ T2272] dump_stack_lvl+0x151/0x1b7 [ 79.000900][ T2272] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 79.006190][ T2272] ? dump_stack+0x9/0x18 [ 79.010351][ T2272] dump_stack+0x15/0x18 [ 79.014339][ T2272] should_fail_ex+0x3d0/0x520 [ 79.018861][ T2272] ? security_file_alloc+0x29/0x120 [ 79.023884][ T2272] __should_failslab+0xaf/0xf0 [ 79.028488][ T2272] should_failslab+0x9/0x20 [ 79.032822][ T2272] kmem_cache_alloc+0x3b/0x320 [ 79.037548][ T2272] ? __alloc_file+0x29/0x2a0 [ 79.041966][ T2272] security_file_alloc+0x29/0x120 [ 79.046826][ T2272] __alloc_file+0xb2/0x2a0 [ 79.051075][ T2272] alloc_empty_file+0x95/0x180 [ 79.055675][ T2272] path_openat+0xec/0x2d60 [ 79.059931][ T2272] ? kasan_set_track+0x60/0x70 [ 79.064527][ T2272] ? kasan_set_track+0x4b/0x70 [ 79.069128][ T2272] ? kasan_save_alloc_info+0x1f/0x30 [ 79.074260][ T2272] ? __kasan_slab_alloc+0x6c/0x80 [ 79.079106][ T2272] ? slab_post_alloc_hook+0x53/0x2c0 [ 79.084229][ T2272] ? getname_flags+0xba/0x520 [ 79.088739][ T2272] ? getname+0x19/0x20 [ 79.092646][ T2272] ? do_sys_openat2+0xe0/0x870 [ 79.097246][ T2272] ? __x64_sys_openat+0x243/0x290 [ 79.102110][ T2272] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 79.108014][ T2272] ? do_filp_open+0x480/0x480 [ 79.112529][ T2272] do_filp_open+0x230/0x480 [ 79.116864][ T2272] ? vfs_tmpfile+0x480/0x480 [ 79.121295][ T2272] ? alloc_fd+0x4fe/0x5a0 [ 79.125461][ T2272] do_sys_openat2+0x151/0x870 [ 79.130090][ T2272] ? do_sys_open+0x220/0x220 [ 79.134600][ T2272] ? kvm_sched_clock_read+0x18/0x40 [ 79.139801][ T2272] ? sched_clock+0x9/0x10 [ 79.143963][ T2272] ? sched_clock_cpu+0x71/0x2b0 [ 79.148879][ T2272] __x64_sys_openat+0x243/0x290 [ 79.153712][ T2272] ? __ia32_sys_open+0x270/0x270 [ 79.158830][ T2272] ? debug_smp_processor_id+0x17/0x20 [ 79.164007][ T2272] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 79.169945][ T2272] x64_sys_call+0x6bf/0x9a0 [ 79.175172][ T2272] do_syscall_64+0x3b/0xb0 [ 79.179412][ T2272] ? clear_bhb_loop+0x55/0xb0 [ 79.183929][ T2272] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 79.189785][ T2272] RIP: 0033:0x7f4ff978bad0 [ 79.194042][ T2272] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 79.213476][ T2272] RSP: 002b:00007f4ffa546f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 79.221719][ T2272] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f4ff978bad0 [ 79.229527][ T2272] RDX: 0000000000000002 RSI: 00007f4ffa546fa0 RDI: 00000000ffffff9c [ 79.237348][ T2272] RBP: 00007f4ffa546fa0 R08: 0000000000000000 R09: 00007f4ffa546cd5 [ 79.245170][ T2272] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 79.252967][ T2272] R13: 0000000000000000 R14: 00007f4ff99a5fa0 R15: 00007ffdbe8f61f8 [ 79.260783][ T2272] [ 79.636090][ T2309] device sit0 entered promiscuous mode [ 79.874703][ T2334] FAULT_INJECTION: forcing a failure. [ 79.874703][ T2334] name failslab, interval 1, probability 0, space 0, times 0 [ 79.887479][ T2334] CPU: 1 PID: 2334 Comm: syz.2.582 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 79.897035][ T2334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 79.907148][ T2334] Call Trace: [ 79.910275][ T2334] [ 79.913049][ T2334] dump_stack_lvl+0x151/0x1b7 [ 79.917571][ T2334] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 79.922860][ T2334] dump_stack+0x15/0x18 [ 79.926846][ T2334] should_fail_ex+0x3d0/0x520 [ 79.931362][ T2334] __should_failslab+0xaf/0xf0 [ 79.935959][ T2334] ? proc_self_get_link+0xe6/0x180 [ 79.940904][ T2334] should_failslab+0x9/0x20 [ 79.945250][ T2334] __kmem_cache_alloc_node+0x3d/0x2a0 [ 79.950453][ T2334] ? proc_self_get_link+0xe6/0x180 [ 79.955501][ T2334] kmalloc_trace+0x2a/0xa0 [ 79.959753][ T2334] proc_self_get_link+0xe6/0x180 [ 79.964525][ T2334] ? proc_setup_self+0x2f0/0x2f0 [ 79.969297][ T2334] pick_link+0x754/0xe90 [ 79.973380][ T2334] step_into+0xca2/0x1090 [ 79.977542][ T2334] ? read_word_at_a_time+0x1a/0x20 [ 79.982489][ T2334] ? set_root+0x400/0x400 [ 79.986654][ T2334] link_path_walk+0x72c/0xee0 [ 79.991172][ T2334] ? handle_lookup_down+0x130/0x130 [ 79.996203][ T2334] path_openat+0x25f/0x2d60 [ 80.000541][ T2334] ? kasan_save_alloc_info+0x1f/0x30 [ 80.005656][ T2334] ? slab_post_alloc_hook+0x53/0x2c0 [ 80.010779][ T2334] ? getname_flags+0xba/0x520 [ 80.015294][ T2334] ? getname+0x19/0x20 [ 80.019201][ T2334] ? __x64_sys_openat+0x243/0x290 [ 80.024061][ T2334] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 80.029966][ T2334] ? do_filp_open+0x480/0x480 [ 80.034480][ T2334] do_filp_open+0x230/0x480 [ 80.038817][ T2334] ? vfs_tmpfile+0x480/0x480 [ 80.043249][ T2334] ? alloc_fd+0x4fe/0x5a0 [ 80.047411][ T2334] do_sys_openat2+0x151/0x870 [ 80.051925][ T2334] ? do_sys_open+0x220/0x220 [ 80.056350][ T2334] ? kvm_sched_clock_read+0x18/0x40 [ 80.061384][ T2334] ? sched_clock+0x9/0x10 [ 80.065548][ T2334] __x64_sys_openat+0x243/0x290 [ 80.070241][ T2334] ? __ia32_sys_open+0x270/0x270 [ 80.075125][ T2334] ? syscall_enter_from_user_mode+0x19/0x190 [ 80.080938][ T2334] x64_sys_call+0x6bf/0x9a0 [ 80.085276][ T2334] do_syscall_64+0x3b/0xb0 [ 80.089530][ T2334] ? clear_bhb_loop+0x55/0xb0 [ 80.094048][ T2334] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 80.099772][ T2334] RIP: 0033:0x7f0e62f8bad0 [ 80.106195][ T2334] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 80.125636][ T2334] RSP: 002b:00007f0e63e29f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 80.133881][ T2334] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f0e62f8bad0 [ 80.141691][ T2334] RDX: 0000000000000002 RSI: 00007f0e63e29fa0 RDI: 00000000ffffff9c [ 80.149503][ T2334] RBP: 00007f0e63e29fa0 R08: 0000000000000000 R09: 00007f0e63e29cd5 [ 80.157313][ T2334] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 80.165126][ T2334] R13: 0000000000000000 R14: 00007f0e631a5fa0 R15: 00007ffec6e42ff8 [ 80.172945][ T2334] [ 80.187568][ T2340] device wg2 left promiscuous mode [ 80.230161][ T2340] device wg2 entered promiscuous mode [ 80.379586][ T2350] device macsec0 left promiscuous mode [ 81.545330][ T2385] FAULT_INJECTION: forcing a failure. [ 81.545330][ T2385] name failslab, interval 1, probability 0, space 0, times 0 [ 81.578729][ T2385] CPU: 0 PID: 2385 Comm: syz.2.597 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 81.588303][ T2385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 81.598311][ T2385] Call Trace: [ 81.601430][ T2385] [ 81.604209][ T2385] dump_stack_lvl+0x151/0x1b7 [ 81.608732][ T2385] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 81.614015][ T2385] ? arch_stack_walk+0xf3/0x140 [ 81.618706][ T2385] dump_stack+0x15/0x18 [ 81.622698][ T2385] should_fail_ex+0x3d0/0x520 [ 81.627210][ T2385] __should_failslab+0xaf/0xf0 [ 81.631810][ T2385] should_failslab+0x9/0x20 [ 81.636153][ T2385] slab_pre_alloc_hook+0x2e/0x1b0 [ 81.641008][ T2385] ? kfree+0x7a/0xf0 [ 81.644741][ T2385] kmem_cache_alloc_lru+0x49/0x270 [ 81.649689][ T2385] ? __d_alloc+0x34/0x700 [ 81.653859][ T2385] ? kasan_set_track+0x4b/0x70 [ 81.658468][ T2385] __d_alloc+0x34/0x700 [ 81.662452][ T2385] ? irqentry_exit+0x30/0x40 [ 81.666875][ T2385] d_alloc_parallel+0xe6/0x12e0 [ 81.671565][ T2385] ? memcpy+0x56/0x70 [ 81.675381][ T2385] ? avc_has_perm_noaudit+0x2dd/0x430 [ 81.680589][ T2385] ? down_read+0xeb7/0x1aa0 [ 81.684924][ T2385] ? d_hash_and_lookup+0x1e0/0x1e0 [ 81.689875][ T2385] ? __down_common+0x690/0x690 [ 81.694477][ T2385] __lookup_slow+0x154/0x3e0 [ 81.698898][ T2385] ? lookup_one_len+0x2c0/0x2c0 [ 81.703587][ T2385] ? __sanitizer_cov_trace_const_cmp4+0x34/0x90 [ 81.709660][ T2385] lookup_slow+0x5a/0x80 [ 81.713740][ T2385] link_path_walk+0x9d3/0xee0 [ 81.718437][ T2385] ? handle_lookup_down+0x130/0x130 [ 81.723461][ T2385] path_openat+0x25f/0x2d60 [ 81.727797][ T2385] ? kasan_save_alloc_info+0x1f/0x30 [ 81.732919][ T2385] ? slab_post_alloc_hook+0x53/0x2c0 [ 81.738044][ T2385] ? getname_flags+0xba/0x520 [ 81.742659][ T2385] ? getname+0x19/0x20 [ 81.746558][ T2385] ? __x64_sys_openat+0x243/0x290 [ 81.751419][ T2385] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 81.757327][ T2385] ? do_filp_open+0x480/0x480 [ 81.761966][ T2385] do_filp_open+0x230/0x480 [ 81.766266][ T2385] ? vfs_tmpfile+0x480/0x480 [ 81.770695][ T2385] ? noop_direct_IO+0x20/0x20 [ 81.775202][ T2385] ? alloc_fd+0x4fe/0x5a0 [ 81.779401][ T2385] do_sys_openat2+0x151/0x870 [ 81.783881][ T2385] ? __mutex_lock_slowpath+0x10/0x10 [ 81.789000][ T2385] ? do_sys_open+0x220/0x220 [ 81.793430][ T2385] ? fput+0x15b/0x1b0 [ 81.797248][ T2385] ? ksys_write+0x260/0x2c0 [ 81.801696][ T2385] __x64_sys_openat+0x243/0x290 [ 81.806714][ T2385] ? __ia32_sys_open+0x270/0x270 [ 81.811577][ T2385] ? debug_smp_processor_id+0x17/0x20 [ 81.816780][ T2385] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 81.822766][ T2385] ? exit_to_user_mode_prepare+0x39/0xa0 [ 81.828238][ T2385] x64_sys_call+0x6bf/0x9a0 [ 81.832572][ T2385] do_syscall_64+0x3b/0xb0 [ 81.836828][ T2385] ? clear_bhb_loop+0x55/0xb0 [ 81.841336][ T2385] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 81.847065][ T2385] RIP: 0033:0x7f0e62f8bad0 [ 81.851328][ T2385] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 81.870770][ T2385] RSP: 002b:00007f0e63e29f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 81.879216][ T2385] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f0e62f8bad0 [ 81.887024][ T2385] RDX: 0000000000000002 RSI: 00007f0e63e29fa0 RDI: 00000000ffffff9c [ 81.894837][ T2385] RBP: 00007f0e63e29fa0 R08: 0000000000000000 R09: 00007f0e63e29cd5 [ 81.902647][ T2385] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 81.910458][ T2385] R13: 0000000000000000 R14: 00007f0e631a5fa0 R15: 00007ffec6e42ff8 [ 81.918277][ T2385] [ 81.925172][ T28] audit: type=1400 audit(1743819244.978:142): avc: denied { remove_name } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 81.999754][ T28] audit: type=1400 audit(1743819244.978:143): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 82.734859][ T28] audit: type=1400 audit(1743819245.778:144): avc: denied { create } for pid=2402 comm="syz.2.602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 83.013902][ T2418] device veth1_macvtap left promiscuous mode [ 83.069635][ T2418] device macsec0 left promiscuous mode [ 83.157729][ T2415] device veth1_macvtap entered promiscuous mode [ 83.298879][ T2415] device macsec0 entered promiscuous mode [ 83.446282][ T2428] device wg2 left promiscuous mode [ 83.791657][ T2442] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 83.872993][ T2329] syz.4.579 (2329) used greatest stack depth: 21256 bytes left [ 83.876811][ T2455] FAULT_INJECTION: forcing a failure. [ 83.876811][ T2455] name failslab, interval 1, probability 0, space 0, times 0 [ 83.899232][ T2455] CPU: 1 PID: 2455 Comm: syz.1.619 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 83.899624][ T2442] device syzkaller0 entered promiscuous mode [ 83.908814][ T2455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 83.908831][ T2455] Call Trace: [ 83.908836][ T2455] [ 83.908843][ T2455] dump_stack_lvl+0x151/0x1b7 [ 83.908876][ T2455] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 83.908910][ T2455] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 83.908938][ T2455] ? __wake_up_klogd+0xd5/0x110 [ 83.908965][ T2455] dump_stack+0x15/0x18 [ 83.908991][ T2455] should_fail_ex+0x3d0/0x520 [ 83.909014][ T2455] __should_failslab+0xaf/0xf0 [ 83.909039][ T2455] should_failslab+0x9/0x20 [ 83.909066][ T2455] slab_pre_alloc_hook+0x2e/0x1b0 [ 83.909090][ T2455] ? __d_lookup_rcu+0x34f/0x3e0 [ 83.909114][ T2455] kmem_cache_alloc_lru+0x49/0x270 [ 83.909136][ T2455] ? proc_alloc_inode+0x2a/0xc0 [ 83.909160][ T2455] proc_alloc_inode+0x2a/0xc0 [ 83.909182][ T2455] ? proc_invalidate_siblings_dcache+0x3d0/0x3d0 [ 83.909208][ T2455] new_inode_pseudo+0x65/0x1d0 [ 83.909235][ T2455] new_inode+0x28/0x1c0 [ 84.007937][ T2455] proc_pid_make_inode+0x27/0x1d0 [ 84.012791][ T2455] ? radix_tree_lookup+0x23a/0x290 [ 84.017890][ T2455] proc_task_instantiate+0x50/0x2c0 [ 84.022908][ T2455] proc_task_lookup+0x21e/0x330 [ 84.027593][ T2455] __lookup_slow+0x2b9/0x3e0 [ 84.032018][ T2455] ? lookup_one_len+0x2c0/0x2c0 [ 84.036702][ T2455] ? security_inode_permission+0xb0/0xf0 [ 84.042174][ T2455] lookup_slow+0x5a/0x80 [ 84.046255][ T2455] link_path_walk+0x9d3/0xee0 [ 84.050771][ T2455] ? handle_lookup_down+0x130/0x130 [ 84.055799][ T2455] path_openat+0x25f/0x2d60 [ 84.060139][ T2455] ? kasan_save_alloc_info+0x1f/0x30 [ 84.065254][ T2455] ? slab_post_alloc_hook+0x53/0x2c0 [ 84.070552][ T2455] ? getname_flags+0xba/0x520 [ 84.075066][ T2455] ? getname+0x19/0x20 [ 84.078974][ T2455] ? __x64_sys_openat+0x243/0x290 [ 84.083953][ T2455] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 84.089843][ T2455] ? do_filp_open+0x480/0x480 [ 84.094355][ T2455] do_filp_open+0x230/0x480 [ 84.098690][ T2455] ? vfs_tmpfile+0x480/0x480 [ 84.103117][ T2455] ? noop_direct_IO+0x20/0x20 [ 84.107626][ T2455] ? alloc_fd+0x4fe/0x5a0 [ 84.111796][ T2455] do_sys_openat2+0x151/0x870 [ 84.116306][ T2455] ? do_sys_open+0x220/0x220 [ 84.120733][ T2455] ? kvm_sched_clock_read+0x18/0x40 [ 84.125767][ T2455] ? sched_clock+0x9/0x10 [ 84.129930][ T2455] ? sched_clock_cpu+0x71/0x2b0 [ 84.134621][ T2455] __x64_sys_openat+0x243/0x290 [ 84.139307][ T2455] ? __ia32_sys_open+0x270/0x270 [ 84.144093][ T2455] ? debug_smp_processor_id+0x17/0x20 [ 84.149289][ T2455] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 84.155190][ T2455] x64_sys_call+0x6bf/0x9a0 [ 84.159538][ T2455] do_syscall_64+0x3b/0xb0 [ 84.163787][ T2455] ? clear_bhb_loop+0x55/0xb0 [ 84.168300][ T2455] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 84.174025][ T2455] RIP: 0033:0x7f101d38bad0 [ 84.178277][ T2455] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 84.197830][ T2455] RSP: 002b:00007f101d1fef10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 84.206312][ T2455] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f101d38bad0 [ 84.214512][ T2455] RDX: 0000000000000002 RSI: 00007f101d1fefa0 RDI: 00000000ffffff9c [ 84.222294][ T2455] RBP: 00007f101d1fefa0 R08: 0000000000000000 R09: 00007f101d1fecd5 [ 84.230106][ T2455] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 84.237960][ T2455] R13: 0000000000000000 R14: 00007f101d5a5fa0 R15: 00007ffdae481018 [ 84.245826][ T2455] [ 89.143926][ T2623] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 89.239316][ T2623] device syzkaller0 entered promiscuous mode [ 89.925642][ T2651] device veth1_macvtap left promiscuous mode [ 89.954885][ T2651] device macsec0 left promiscuous mode [ 90.116845][ T2656] device veth1_macvtap entered promiscuous mode [ 90.153845][ T2656] device macsec0 entered promiscuous mode [ 90.646794][ T2683] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 90.753451][ T2683] device syzkaller0 entered promiscuous mode [ 90.970214][ T2700] device pim6reg1 entered promiscuous mode [ 91.121881][ T2707] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.128907][ T2707] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.311430][ T2719] device veth0_vlan left promiscuous mode [ 91.319349][ T2719] device veth0_vlan entered promiscuous mode [ 91.329475][ T1795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.415187][ T1795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.484376][ T1795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.574561][ T2734] device wg2 entered promiscuous mode [ 91.923812][ T2754] device veth1_macvtap left promiscuous mode [ 91.930502][ T2754] device macsec0 left promiscuous mode [ 93.595332][ T2829] device wg2 left promiscuous mode [ 93.730696][ T2829] device wg2 entered promiscuous mode [ 93.991467][ T2843] syz.0.735[2843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.991562][ T2843] syz.0.735[2843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.115980][ T2847] device wg2 left promiscuous mode [ 94.506891][ T2872] device wg2 entered promiscuous mode [ 98.473366][ T3049] device pim6reg1 entered promiscuous mode [ 99.199102][ T3083] device pim6reg1 entered promiscuous mode [ 99.207992][ T3083] device pim6reg1 left promiscuous mode [ 99.478235][ T3102] device wg2 left promiscuous mode [ 100.236485][ T3144] FAULT_INJECTION: forcing a failure. [ 100.236485][ T3144] name failslab, interval 1, probability 0, space 0, times 0 [ 100.265069][ T3144] CPU: 1 PID: 3144 Comm: syz.4.830 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 100.274731][ T3144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 100.284625][ T3144] Call Trace: [ 100.287743][ T3144] [ 100.290553][ T3144] dump_stack_lvl+0x151/0x1b7 [ 100.295036][ T3144] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 100.300479][ T3144] dump_stack+0x15/0x18 [ 100.304469][ T3144] should_fail_ex+0x3d0/0x520 [ 100.308977][ T3144] ? security_inode_alloc+0x29/0x120 [ 100.314123][ T3144] __should_failslab+0xaf/0xf0 [ 100.318701][ T3144] should_failslab+0x9/0x20 [ 100.323031][ T3144] kmem_cache_alloc+0x3b/0x320 [ 100.327636][ T3144] security_inode_alloc+0x29/0x120 [ 100.332592][ T3144] inode_init_always+0x720/0x970 [ 100.337370][ T3144] new_inode_pseudo+0x98/0x1d0 [ 100.341963][ T3144] __ns_get_path+0x16a/0x480 [ 100.346385][ T3144] ? _raw_spin_unlock+0x4c/0x70 [ 100.351072][ T3144] ns_get_path+0x57/0x90 [ 100.355176][ T3144] proc_ns_get_link+0xf5/0x1f0 [ 100.359745][ T3144] ? proc_ns_instantiate+0x100/0x100 [ 100.365044][ T3144] ? security_inode_follow_link+0xbc/0x100 [ 100.370683][ T3144] ? proc_ns_instantiate+0x100/0x100 [ 100.375811][ T3144] pick_link+0x708/0xe90 [ 100.379891][ T3144] step_into+0xca2/0x1090 [ 100.384051][ T3144] ? _raw_spin_unlock+0x4c/0x70 [ 100.388739][ T3144] ? set_root+0x400/0x400 [ 100.392911][ T3144] ? __kasan_check_write+0x14/0x20 [ 100.397853][ T3144] path_openat+0x1752/0x2d60 [ 100.402283][ T3144] ? do_filp_open+0x480/0x480 [ 100.406789][ T3144] do_filp_open+0x230/0x480 [ 100.411129][ T3144] ? vfs_tmpfile+0x480/0x480 [ 100.415572][ T3144] ? alloc_fd+0x4fe/0x5a0 [ 100.419734][ T3144] do_sys_openat2+0x151/0x870 [ 100.424236][ T3144] ? do_sys_open+0x220/0x220 [ 100.428659][ T3144] ? kvm_sched_clock_read+0x18/0x40 [ 100.433694][ T3144] ? sched_clock+0x9/0x10 [ 100.437860][ T3144] ? sched_clock_cpu+0x71/0x2b0 [ 100.442552][ T3144] __x64_sys_openat+0x243/0x290 [ 100.447235][ T3144] ? __ia32_sys_open+0x270/0x270 [ 100.452006][ T3144] ? debug_smp_processor_id+0x17/0x20 [ 100.457213][ T3144] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 100.463117][ T3144] x64_sys_call+0x6bf/0x9a0 [ 100.467456][ T3144] do_syscall_64+0x3b/0xb0 [ 100.471711][ T3144] ? clear_bhb_loop+0x55/0xb0 [ 100.476225][ T3144] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 100.481951][ T3144] RIP: 0033:0x7f01e958bad0 [ 100.486201][ T3144] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 100.505645][ T3144] RSP: 002b:00007f01ea343f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 100.514594][ T3144] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f01e958bad0 [ 100.522391][ T3144] RDX: 0000000000000002 RSI: 00007f01ea343fa0 RDI: 00000000ffffff9c [ 100.530196][ T3144] RBP: 00007f01ea343fa0 R08: 0000000000000000 R09: 00007f01ea343cd5 [ 100.538011][ T3144] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 100.545822][ T3144] R13: 0000000000000000 R14: 00007f01e97a5fa0 R15: 00007ffc78d7e3d8 [ 100.553640][ T3144] [ 101.633302][ T3180] device pim6reg1 entered promiscuous mode [ 101.757618][ T3180] device wg2 left promiscuous mode [ 102.029800][ T28] audit: type=1400 audit(1743819265.068:145): avc: denied { create } for pid=3199 comm="syz.3.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 102.126574][ T28] audit: type=1400 audit(1743819265.068:146): avc: denied { create } for pid=3199 comm="syz.3.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 102.153457][ T28] audit: type=1400 audit(1743819265.068:147): avc: denied { create } for pid=3199 comm="syz.3.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 102.459836][ T3230] FAULT_INJECTION: forcing a failure. [ 102.459836][ T3230] name failslab, interval 1, probability 0, space 0, times 0 [ 102.525269][ T3230] CPU: 1 PID: 3230 Comm: syz.2.854 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 102.534839][ T3230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 102.544823][ T3230] Call Trace: [ 102.547945][ T3230] [ 102.550900][ T3230] dump_stack_lvl+0x151/0x1b7 [ 102.555416][ T3230] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.560707][ T3230] dump_stack+0x15/0x18 [ 102.564697][ T3230] should_fail_ex+0x3d0/0x520 [ 102.569221][ T3230] __should_failslab+0xaf/0xf0 [ 102.573809][ T3230] should_failslab+0x9/0x20 [ 102.578149][ T3230] slab_pre_alloc_hook+0x2e/0x1b0 [ 102.583015][ T3230] kmem_cache_alloc_lru+0x49/0x270 [ 102.587954][ T3230] ? __d_alloc+0x34/0x700 [ 102.592172][ T3230] __d_alloc+0x34/0x700 [ 102.596115][ T3230] ? __ns_get_path+0x252/0x480 [ 102.600721][ T3230] d_alloc_anon+0x17/0x20 [ 102.604880][ T3230] __ns_get_path+0x2fc/0x480 [ 102.609309][ T3230] ns_get_path+0x57/0x90 [ 102.613390][ T3230] proc_ns_get_link+0xf5/0x1f0 [ 102.617989][ T3230] ? proc_ns_instantiate+0x100/0x100 [ 102.623129][ T3230] ? security_inode_follow_link+0xbc/0x100 [ 102.628752][ T3230] ? proc_ns_instantiate+0x100/0x100 [ 102.633872][ T3230] pick_link+0x708/0xe90 [ 102.637953][ T3230] step_into+0xca2/0x1090 [ 102.642119][ T3230] ? irqentry_exit+0x30/0x40 [ 102.646542][ T3230] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 102.652197][ T3230] ? set_root+0x400/0x400 [ 102.656354][ T3230] ? path_openat+0x169d/0x2d60 [ 102.660954][ T3230] path_openat+0x1752/0x2d60 [ 102.665404][ T3230] ? do_filp_open+0x480/0x480 [ 102.669895][ T3230] do_filp_open+0x230/0x480 [ 102.674324][ T3230] ? vfs_tmpfile+0x480/0x480 [ 102.678751][ T3230] ? alloc_fd+0x4fe/0x5a0 [ 102.682913][ T3230] do_sys_openat2+0x151/0x870 [ 102.687425][ T3230] ? do_sys_open+0x220/0x220 [ 102.691854][ T3230] ? kvm_sched_clock_read+0x18/0x40 [ 102.696883][ T3230] ? sched_clock+0x9/0x10 [ 102.701163][ T3230] __x64_sys_openat+0x243/0x290 [ 102.705854][ T3230] ? __ia32_sys_open+0x270/0x270 [ 102.710619][ T3230] ? syscall_enter_from_user_mode+0x19/0x190 [ 102.716444][ T3230] x64_sys_call+0x6bf/0x9a0 [ 102.720779][ T3230] do_syscall_64+0x3b/0xb0 [ 102.725026][ T3230] ? clear_bhb_loop+0x55/0xb0 [ 102.729543][ T3230] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 102.735268][ T3230] RIP: 0033:0x7f0e62f8bad0 [ 102.739524][ T3230] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 102.759273][ T3230] RSP: 002b:00007f0e63e29f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 102.767525][ T3230] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f0e62f8bad0 [ 102.775329][ T3230] RDX: 0000000000000002 RSI: 00007f0e63e29fa0 RDI: 00000000ffffff9c [ 102.783141][ T3230] RBP: 00007f0e63e29fa0 R08: 0000000000000000 R09: 00007f0e63e29cd5 [ 102.790948][ T3230] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 102.798763][ T3230] R13: 0000000000000000 R14: 00007f0e631a5fa0 R15: 00007ffec6e42ff8 [ 102.806971][ T3230] [ 103.534304][ T3281] FAULT_INJECTION: forcing a failure. [ 103.534304][ T3281] name failslab, interval 1, probability 0, space 0, times 0 [ 103.589512][ T3281] CPU: 0 PID: 3281 Comm: syz.0.872 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 103.599088][ T3281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 103.608988][ T3281] Call Trace: [ 103.612103][ T3281] [ 103.614879][ T3281] dump_stack_lvl+0x151/0x1b7 [ 103.619394][ T3281] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.624776][ T3281] ? do_sys_openat2+0xb4/0x870 [ 103.629388][ T3281] dump_stack+0x15/0x18 [ 103.633364][ T3281] should_fail_ex+0x3d0/0x520 [ 103.637881][ T3281] ? getname_flags+0xba/0x520 [ 103.642393][ T3281] __should_failslab+0xaf/0xf0 [ 103.647078][ T3281] should_failslab+0x9/0x20 [ 103.651426][ T3281] kmem_cache_alloc+0x3b/0x320 [ 103.656031][ T3281] getname_flags+0xba/0x520 [ 103.660445][ T3281] getname+0x19/0x20 [ 103.664352][ T3281] do_sys_openat2+0xe0/0x870 [ 103.668777][ T3281] ? __fput+0x619/0x870 [ 103.672770][ T3281] ? do_sys_open+0x220/0x220 [ 103.677194][ T3281] ? blkcg_maybe_throttle_current+0x17d/0xa00 [ 103.683187][ T3281] ? __this_cpu_preempt_check+0x13/0x20 [ 103.688660][ T3281] __x64_sys_openat+0x243/0x290 [ 103.693425][ T3281] ? __ia32_sys_open+0x270/0x270 [ 103.698197][ T3281] ? switch_fpu_return+0xe/0x10 [ 103.702893][ T3281] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 103.708439][ T3281] x64_sys_call+0x6bf/0x9a0 [ 103.712784][ T3281] do_syscall_64+0x3b/0xb0 [ 103.717030][ T3281] ? clear_bhb_loop+0x55/0xb0 [ 103.721549][ T3281] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 103.727274][ T3281] RIP: 0033:0x7f4ff978bad0 [ 103.731615][ T3281] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 103.751401][ T3281] RSP: 002b:00007f4ffa546f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 103.759820][ T3281] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4ff978bad0 [ 103.767629][ T3281] RDX: 0000000000000000 RSI: 00007f4ffa546fa0 RDI: 00000000ffffff9c [ 103.775446][ T3281] RBP: 00007f4ffa546fa0 R08: 0000000000000000 R09: 00007f4ffa546cd5 [ 103.783340][ T3281] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 103.791167][ T3281] R13: 0000000000000000 R14: 00007f4ff99a5fa0 R15: 00007ffdbe8f61f8 [ 103.798978][ T3281] [ 105.103105][ T3366] device syzkaller0 entered promiscuous mode [ 105.127199][ T3364] device veth1_macvtap left promiscuous mode [ 105.133846][ T3364] device macsec0 left promiscuous mode [ 105.212267][ T3373] device veth1_macvtap entered promiscuous mode [ 105.218420][ T3373] device macsec0 entered promiscuous mode [ 106.107506][ T3440] device veth1_macvtap left promiscuous mode [ 106.231685][ T3449] device sit0 entered promiscuous mode [ 106.332669][ T3440] device veth1_macvtap entered promiscuous mode [ 106.351807][ T3440] device macsec0 entered promiscuous mode [ 107.466898][ T28] audit: type=1400 audit(1743819270.508:148): avc: denied { ioctl } for pid=3493 comm="syz.3.936" path="socket:[26073]" dev="sockfs" ino=26073 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 107.523178][ T3497] device pim6reg1 entered promiscuous mode [ 107.807626][ T3508] device veth1_macvtap left promiscuous mode [ 107.833585][ T3508] device macsec0 left promiscuous mode [ 107.916952][ T3515] device veth1_macvtap entered promiscuous mode [ 107.926937][ T3515] device macsec0 entered promiscuous mode [ 108.429780][ T3540] device pim6reg1 entered promiscuous mode [ 108.446684][ T28] audit: type=1400 audit(1743819271.488:149): avc: denied { create } for pid=3543 comm="syz.4.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 108.730402][ T3488] syz.3.932 (3488) used greatest stack depth: 21176 bytes left [ 108.908204][ T3568] device pim6reg1 entered promiscuous mode [ 109.144649][ T3586] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 109.151517][ T3586] syzkaller0: linktype set to 804 [ 110.020736][ T28] audit: type=1400 audit(1743819273.068:150): avc: denied { write } for pid=3612 comm="syz.2.975" name="net" dev="proc" ino=26774 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 110.047270][ T28] audit: type=1400 audit(1743819273.068:151): avc: denied { add_name } for pid=3612 comm="syz.2.975" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 110.073754][ T28] audit: type=1400 audit(1743819273.068:152): avc: denied { create } for pid=3612 comm="syz.2.975" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 110.106952][ T28] audit: type=1400 audit(1743819273.068:153): avc: denied { associate } for pid=3612 comm="syz.2.975" name="blkio.throttle.io_service_bytes_recursive" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 110.993438][ T3656] syz.3.986[3656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.993523][ T3656] syz.3.986[3656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.129398][ T28] audit: type=1400 audit(1743819274.168:154): avc: denied { create } for pid=3675 comm="syz.0.991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 111.299196][ T102] udevd[102]: worker [2293] terminated by signal 33 (Unknown signal 33) [ 111.326960][ T102] udevd[102]: worker [2293] failed while handling '/devices/virtual/block/loop4' [ 111.443878][ T102] udevd[102]: worker [320] terminated by signal 33 (Unknown signal 33) [ 111.470681][ T102] udevd[102]: worker [320] failed while handling '/devices/virtual/block/loop1' [ 112.029317][ T3705] device pim6reg1 entered promiscuous mode [ 112.049010][ T102] udevd[102]: worker [3700] terminated by signal 33 (Unknown signal 33) [ 112.084946][ T102] udevd[102]: worker [3700] failed while handling '/devices/virtual/block/loop2' [ 112.102854][ T102] udevd[102]: worker [3707] terminated by signal 33 (Unknown signal 33) [ 112.112521][ T102] udevd[102]: worker [3707] failed while handling '/devices/virtual/block/loop3' [ 112.916405][ T3756] bond_slave_1: mtu less than device minimum [ 113.863942][ T3797] device syzkaller0 entered promiscuous mode [ 114.357821][ T3823] device sit0 left promiscuous mode [ 114.382472][ T3823] device sit0 entered promiscuous mode [ 116.030581][ T102] udevd[102]: worker [3715] terminated by signal 33 (Unknown signal 33) [ 116.051619][ T3874] device sit0 left promiscuous mode [ 116.062398][ T102] udevd[102]: worker [3715] failed while handling '/devices/virtual/block/loop0' [ 116.116848][ T3874] device sit0 entered promiscuous mode [ 116.308517][ T3878] device veth0_vlan left promiscuous mode [ 116.330119][ T3878] device veth0_vlan entered promiscuous mode [ 118.158397][ T3941] device sit0 entered promiscuous mode [ 118.660317][ T3975] device sit0 left promiscuous mode [ 118.674656][ T3975] device sit0 entered promiscuous mode [ 119.015465][ T3992] device sit0 entered promiscuous mode [ 120.671488][ T4052] device lo entered promiscuous mode [ 120.740238][ T4060] bond_slave_1: mtu less than device minimum [ 123.436268][ T4160] device syzkaller0 entered promiscuous mode [ 123.764824][ T4171] ÿ: renamed from bond_slave_0 [ 123.772221][ T4173] device veth0_vlan left promiscuous mode [ 123.788034][ T4173] device veth0_vlan entered promiscuous mode [ 124.662336][ T4231] device syzkaller0 entered promiscuous mode [ 125.355684][ T4270] device veth1_macvtap left promiscuous mode [ 125.362795][ T4270] device macsec0 left promiscuous mode [ 125.472146][ T4270] device veth1_macvtap entered promiscuous mode [ 125.479558][ T4270] device macsec0 entered promiscuous mode [ 125.490958][ T4277] device veth1_macvtap entered promiscuous mode [ 125.497471][ T4277] device macsec0 entered promiscuous mode [ 125.530941][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 125.549032][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 125.998361][ T4288] device syzkaller0 entered promiscuous mode [ 129.151748][ T4446] device wg2 entered promiscuous mode [ 129.186530][ T4444] device wg2 left promiscuous mode [ 134.246981][ T4641] device sit0 left promiscuous mode [ 134.469323][ T4642] device sit0 entered promiscuous mode [ 139.751563][ T4833] device pim6reg1 entered promiscuous mode [ 141.332912][ T4909] device syzkaller0 entered promiscuous mode [ 142.745620][ T4995] device wg2 left promiscuous mode [ 142.799901][ T4995] device wg2 entered promiscuous mode [ 143.398232][ T5036] device pim6reg1 entered promiscuous mode [ 143.624520][ T28] audit: type=1400 audit(1743819306.668:155): avc: denied { create } for pid=5041 comm="syz.0.1389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 144.266631][ T5074] device sit0 left promiscuous mode [ 145.170216][ T5112] device syzkaller0 entered promiscuous mode [ 146.360867][ T5180] device sit0 entered promiscuous mode [ 148.090638][ T5267] device sit0 left promiscuous mode [ 148.178846][ T28] audit: type=1400 audit(1743819311.218:156): avc: denied { create } for pid=5266 comm="syz.2.1456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 148.399556][ T28] audit: type=1400 audit(1743819311.448:157): avc: denied { create } for pid=5285 comm="syz.1.1461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 148.480546][ T28] audit: type=1400 audit(1743819311.528:158): avc: denied { create } for pid=5292 comm="syz.3.1463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 149.060285][ T28] audit: type=1400 audit(1743819312.108:159): avc: denied { append } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 149.087389][ T28] audit: type=1400 audit(1743819312.108:160): avc: denied { open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 149.109714][ T28] audit: type=1400 audit(1743819312.108:161): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 149.707132][ T28] audit: type=1400 audit(1743819312.748:162): avc: denied { create } for pid=5332 comm="syz.1.1479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 150.329966][ T5375] device sit0 left promiscuous mode [ 150.357755][ T5376] bond_slave_1: mtu less than device minimum [ 150.383435][ T5377] bond_slave_1: mtu less than device minimum [ 150.394137][ T5375] device sit0 entered promiscuous mode [ 151.182018][ T5429] device sit0 entered promiscuous mode [ 153.663680][ T28] audit: type=1400 audit(1743819316.708:163): avc: denied { write } for pid=5510 comm="syz.4.1529" name="cgroup.subtree_control" dev="cgroup2" ino=352 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 153.817602][ T28] audit: type=1400 audit(1743819316.768:164): avc: denied { open } for pid=5510 comm="syz.4.1529" path="" dev="cgroup2" ino=352 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 157.288620][ C0] sched: RT throttling activated [ 159.612030][ T5572] device syzkaller0 entered promiscuous mode [ 161.471210][ T5688] device wg2 left promiscuous mode [ 161.544765][ T5696] device wg2 entered promiscuous mode [ 162.023307][ T5711] device pim6reg1 entered promiscuous mode [ 163.553671][ T28] audit: type=1400 audit(1743819326.598:165): avc: denied { create } for pid=5796 comm="syz.1.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 163.648080][ T5810] device wg2 left promiscuous mode [ 164.819543][ T5868] device pim6reg1 entered promiscuous mode [ 167.355853][ T5947] device syzkaller0 entered promiscuous mode [ 170.302568][ T6038] device wg2 entered promiscuous mode [ 173.021739][ T6178] device veth1_macvtap left promiscuous mode [ 173.027978][ T6178] device macsec0 left promiscuous mode [ 173.390406][ T6178] device veth1_macvtap entered promiscuous mode [ 173.397110][ T6178] device macsec0 entered promiscuous mode [ 175.229465][ T6248] syz.0.1737 uses obsolete (PF_INET,SOCK_PACKET) [ 175.428874][ T6254] device veth1_macvtap left promiscuous mode [ 175.435061][ T6254] device macsec0 left promiscuous mode [ 175.512240][ T6259] device syzkaller0 entered promiscuous mode [ 175.842687][ T6284] device lo left promiscuous mode [ 175.872365][ T6283] ¡Y­4`Ò˜: renamed from lo [ 176.546277][ T6317] bond_slave_1: mtu less than device minimum [ 176.590626][ T6317] device veth0_vlan left promiscuous mode [ 176.597022][ T6317] device veth0_vlan entered promiscuous mode [ 177.319788][ T6360] device wg2 left promiscuous mode [ 177.360698][ T6360] device wg2 entered promiscuous mode [ 177.366028][ T6360] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 177.691788][ T6364] device syzkaller0 entered promiscuous mode [ 177.922799][ T6380] device sit0 left promiscuous mode [ 178.124429][ T6406] device sit0 entered promiscuous mode [ 178.571829][ T28] audit: type=1400 audit(1743819341.618:166): avc: denied { create } for pid=6425 comm="syz.4.1793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 178.968502][ T6445] device bridge0 entered promiscuous mode [ 179.865828][ T6492] syz.4.1813[6492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.865942][ T6492] syz.4.1813[6492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.926049][ T6492] device veth1_macvtap left promiscuous mode [ 180.930410][ T6554] device wg2 entered promiscuous mode [ 182.922582][ T6550] syz.2.1824 (6550) used greatest stack depth: 20888 bytes left [ 183.938304][ T6675] device pim6reg1 entered promiscuous mode [ 184.409953][ T6708] FAULT_INJECTION: forcing a failure. [ 184.409953][ T6708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 184.465703][ T6708] CPU: 1 PID: 6708 Comm: syz.2.1876 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 184.475465][ T6708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 184.485361][ T6708] Call Trace: [ 184.488481][ T6708] [ 184.491328][ T6708] dump_stack_lvl+0x151/0x1b7 [ 184.495775][ T6708] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 184.501065][ T6708] ? __kasan_check_write+0x14/0x20 [ 184.506013][ T6708] dump_stack+0x15/0x18 [ 184.510093][ T6708] should_fail_ex+0x3d0/0x520 [ 184.514606][ T6708] should_fail+0xb/0x10 [ 184.518599][ T6708] should_fail_usercopy+0x1a/0x20 [ 184.523461][ T6708] _copy_from_user+0x1e/0xc0 [ 184.527888][ T6708] perf_copy_attr+0x163/0x880 [ 184.532403][ T6708] __se_sys_perf_event_open+0xd7/0x3d60 [ 184.537782][ T6708] ? __kasan_check_write+0x14/0x20 [ 184.542725][ T6708] ? mutex_unlock+0xb2/0x260 [ 184.547153][ T6708] ? __mutex_lock_slowpath+0x10/0x10 [ 184.552278][ T6708] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 184.557740][ T6708] ? fput+0x15b/0x1b0 [ 184.561564][ T6708] ? __ia32_sys_read+0x90/0x90 [ 184.566166][ T6708] ? debug_smp_processor_id+0x17/0x20 [ 184.571368][ T6708] __x64_sys_perf_event_open+0xbf/0xd0 [ 184.576664][ T6708] x64_sys_call+0x7de/0x9a0 [ 184.581012][ T6708] do_syscall_64+0x3b/0xb0 [ 184.585255][ T6708] ? clear_bhb_loop+0x55/0xb0 [ 184.589772][ T6708] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 184.595495][ T6708] RIP: 0033:0x7f0e62f8d169 [ 184.599746][ T6708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.619242][ T6708] RSP: 002b:00007f0e63e2a038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 184.627434][ T6708] RAX: ffffffffffffffda RBX: 00007f0e631a5fa0 RCX: 00007f0e62f8d169 [ 184.635332][ T6708] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 184.643143][ T6708] RBP: 00007f0e63e2a090 R08: 0000000000000000 R09: 0000000000000000 [ 184.650957][ T6708] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 184.658856][ T6708] R13: 0000000000000000 R14: 00007f0e631a5fa0 R15: 00007ffec6e42ff8 [ 184.666858][ T6708] [ 184.697000][ T6724] device sit0 left promiscuous mode [ 185.142922][ T6767] FAULT_INJECTION: forcing a failure. [ 185.142922][ T6767] name failslab, interval 1, probability 0, space 0, times 0 [ 185.159330][ T6764] device pim6reg1 entered promiscuous mode [ 185.194678][ T6767] CPU: 0 PID: 6767 Comm: syz.4.1892 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 185.204336][ T6767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 185.214236][ T6767] Call Trace: [ 185.217354][ T6767] [ 185.220168][ T6767] dump_stack_lvl+0x151/0x1b7 [ 185.224657][ T6767] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 185.229941][ T6767] ? expand_files+0xd3/0x700 [ 185.234374][ T6767] dump_stack+0x15/0x18 [ 185.238359][ T6767] should_fail_ex+0x3d0/0x520 [ 185.242872][ T6767] __should_failslab+0xaf/0xf0 [ 185.247474][ T6767] should_failslab+0x9/0x20 [ 185.251812][ T6767] kmem_cache_alloc_node+0x42/0x330 [ 185.256846][ T6767] ? perf_event_alloc+0x11b/0x1840 [ 185.261796][ T6767] perf_event_alloc+0x11b/0x1840 [ 185.266572][ T6767] __se_sys_perf_event_open+0xb27/0x3d60 [ 185.272036][ T6767] ? __mutex_lock_slowpath+0x1/0x10 [ 185.277071][ T6767] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 185.282539][ T6767] ? fput+0x15b/0x1b0 [ 185.286365][ T6767] ? __ia32_sys_read+0x90/0x90 [ 185.290957][ T6767] ? debug_smp_processor_id+0x17/0x20 [ 185.296164][ T6767] __x64_sys_perf_event_open+0xbf/0xd0 [ 185.301462][ T6767] x64_sys_call+0x7de/0x9a0 [ 185.305796][ T6767] do_syscall_64+0x3b/0xb0 [ 185.310070][ T6767] ? clear_bhb_loop+0x55/0xb0 [ 185.314562][ T6767] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 185.320293][ T6767] RIP: 0033:0x7f01e958d169 [ 185.324549][ T6767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.344126][ T6767] RSP: 002b:00007f01ea344038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 185.352541][ T6767] RAX: ffffffffffffffda RBX: 00007f01e97a5fa0 RCX: 00007f01e958d169 [ 185.360448][ T6767] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 185.368259][ T6767] RBP: 00007f01ea344090 R08: 0000000000000000 R09: 0000000000000000 [ 185.376071][ T6767] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 185.383881][ T6767] R13: 0000000000000000 R14: 00007f01e97a5fa0 R15: 00007ffc78d7e3d8 [ 185.391707][ T6767] [ 186.353874][ T6809] device pim6reg1 entered promiscuous mode [ 188.382215][ T6944] FAULT_INJECTION: forcing a failure. [ 188.382215][ T6944] name failslab, interval 1, probability 0, space 0, times 0 [ 190.331285][ T6944] CPU: 0 PID: 6944 Comm: syz.4.1941 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 190.340943][ T6944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 190.351102][ T6944] Call Trace: [ 190.354218][ T6944] [ 190.357001][ T6944] dump_stack_lvl+0x151/0x1b7 [ 190.361512][ T6944] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 190.366806][ T6944] ? perf_uprobe_event_init+0x106/0x190 [ 190.372190][ T6944] ? __x64_sys_perf_event_open+0xbf/0xd0 [ 190.377659][ T6944] ? do_syscall_64+0x3b/0xb0 [ 190.382081][ T6944] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 190.387994][ T6944] dump_stack+0x15/0x18 [ 190.391975][ T6944] should_fail_ex+0x3d0/0x520 [ 190.396488][ T6944] ? getname_kernel+0x59/0x2e0 [ 190.401091][ T6944] __should_failslab+0xaf/0xf0 [ 190.405696][ T6944] should_failslab+0x9/0x20 [ 190.410147][ T6944] kmem_cache_alloc+0x3b/0x320 [ 190.414750][ T6944] getname_kernel+0x59/0x2e0 [ 190.419166][ T6944] kern_path+0x23/0x1a0 [ 190.423154][ T6944] create_local_trace_uprobe+0xa2/0x710 [ 190.428539][ T6944] ? bpf_get_uprobe_info+0x540/0x540 [ 190.433658][ T6944] perf_uprobe_init+0xfa/0x1a0 [ 190.438258][ T6944] perf_uprobe_event_init+0x106/0x190 [ 190.443465][ T6944] perf_try_init_event+0x143/0x410 [ 190.448413][ T6944] perf_event_alloc+0x1029/0x1840 [ 190.453272][ T6944] __se_sys_perf_event_open+0xb27/0x3d60 [ 190.458748][ T6944] ? __mutex_lock_slowpath+0x1/0x10 [ 190.463784][ T6944] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 190.469383][ T6944] ? fput+0x15b/0x1b0 [ 190.473200][ T6944] ? __ia32_sys_read+0x90/0x90 [ 190.477811][ T6944] ? debug_smp_processor_id+0x17/0x20 [ 190.483240][ T6944] __x64_sys_perf_event_open+0xbf/0xd0 [ 190.488532][ T6944] x64_sys_call+0x7de/0x9a0 [ 190.492867][ T6944] do_syscall_64+0x3b/0xb0 [ 190.497115][ T6944] ? clear_bhb_loop+0x55/0xb0 [ 190.501632][ T6944] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 190.507359][ T6944] RIP: 0033:0x7f01e958d169 [ 190.511612][ T6944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.531056][ T6944] RSP: 002b:00007f01ea344038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 190.539300][ T6944] RAX: ffffffffffffffda RBX: 00007f01e97a5fa0 RCX: 00007f01e958d169 [ 190.547207][ T6944] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 190.555017][ T6944] RBP: 00007f01ea344090 R08: 0000000000000000 R09: 0000000000000000 [ 190.562825][ T6944] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 190.570635][ T6944] R13: 0000000000000000 R14: 00007f01e97a5fa0 R15: 00007ffc78d7e3d8 [ 190.578452][ T6944] [ 190.706273][ T6985] device sit0 left promiscuous mode [ 190.722657][ T6985] device sit0 entered promiscuous mode [ 191.081918][ T7007] device veth0_vlan left promiscuous mode [ 191.093345][ T7007] device veth0_vlan entered promiscuous mode [ 191.880476][ T7068] device veth0_vlan left promiscuous mode [ 191.897516][ T7068] device veth0_vlan entered promiscuous mode [ 191.983311][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.991401][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.999002][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.061092][ T7078] syz.1.1980[7078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.061169][ T7078] syz.1.1980[7078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.242596][ T7181] ¡Y­4`Ò˜: renamed from lo [ 194.880864][ T7217] device veth1_macvtap left promiscuous mode [ 195.408730][ T7254] device sit0 left promiscuous mode [ 195.552615][ T7258] device sit0 entered promiscuous mode [ 195.798347][ T7281] device veth1_macvtap left promiscuous mode [ 195.806085][ T7281] device macsec0 left promiscuous mode [ 195.886240][ T7282] device veth1_macvtap entered promiscuous mode [ 196.207675][ T7282] device macsec0 entered promiscuous mode [ 199.408996][ T7372] device syzkaller0 entered promiscuous mode [ 206.276987][ T7600] device macsec0 entered promiscuous mode [ 206.567588][ T7619] device pim6reg1 entered promiscuous mode [ 214.889904][ T7907] device veth0_vlan left promiscuous mode [ 214.903813][ T7907] device veth0_vlan entered promiscuous mode [ 214.914294][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.931988][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.942425][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.137568][ T7916] device syzkaller0 entered promiscuous mode [ 215.631885][ T7982] device syzkaller0 entered promiscuous mode [ 215.644448][ T7982] syzkaller0: tun_net_xmit 1280 [ 215.677398][ T7982] syzkaller0: create flow: hash 3728886823 index 3 [ 215.719918][ T7982] syzkaller0: create flow: hash 2570743694 index 1 [ 215.788701][ T7980] syzkaller0: delete flow: hash 3728886823 index 3 [ 215.804375][ T7980] syzkaller0: delete flow: hash 2570743694 index 1 [ 216.323482][ T8013] FAULT_INJECTION: forcing a failure. [ 216.323482][ T8013] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 216.461435][ T8013] CPU: 0 PID: 8013 Comm: syz.0.2232 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 216.471106][ T8013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 216.480998][ T8013] Call Trace: [ 216.484121][ T8013] [ 216.486898][ T8013] dump_stack_lvl+0x151/0x1b7 [ 216.491413][ T8013] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 216.496709][ T8013] ? __kasan_check_write+0x14/0x20 [ 216.501655][ T8013] dump_stack+0x15/0x18 [ 216.505646][ T8013] should_fail_ex+0x3d0/0x520 [ 216.510159][ T8013] should_fail+0xb/0x10 [ 216.514150][ T8013] should_fail_usercopy+0x1a/0x20 [ 216.519195][ T8013] _copy_from_user+0x1e/0xc0 [ 216.523624][ T8013] copy_msghdr_from_user+0xaa/0x670 [ 216.528658][ T8013] ? __kasan_check_write+0x14/0x20 [ 216.533597][ T8013] ? proc_fail_nth_write+0x20b/0x290 [ 216.538720][ T8013] ? sendmsg_copy_msghdr+0x70/0x70 [ 216.543669][ T8013] __sys_recvmsg+0x24b/0x3d0 [ 216.548093][ T8013] ? ____sys_recvmsg+0x530/0x530 [ 216.552883][ T8013] ? __kasan_check_write+0x14/0x20 [ 216.557921][ T8013] ? __ia32_sys_read+0x90/0x90 [ 216.562503][ T8013] ? debug_smp_processor_id+0x17/0x20 [ 216.567718][ T8013] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 216.573609][ T8013] __x64_sys_recvmsg+0x7f/0x90 [ 216.578213][ T8013] x64_sys_call+0x171/0x9a0 [ 216.582545][ T8013] do_syscall_64+0x3b/0xb0 [ 216.586799][ T8013] ? clear_bhb_loop+0x55/0xb0 [ 216.591315][ T8013] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 216.597044][ T8013] RIP: 0033:0x7f4ff978d169 [ 216.601296][ T8013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.620737][ T8013] RSP: 002b:00007f4ffa526038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 216.628982][ T8013] RAX: ffffffffffffffda RBX: 00007f4ff99a6080 RCX: 00007f4ff978d169 [ 216.637226][ T8013] RDX: 0000000000000000 RSI: 0000200000000380 RDI: 000000000000000c [ 216.645165][ T8013] RBP: 00007f4ffa526090 R08: 0000000000000000 R09: 0000000000000000 [ 216.652971][ T8013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.660785][ T8013] R13: 0000000000000000 R14: 00007f4ff99a6080 R15: 00007ffdbe8f61f8 [ 216.668601][ T8013] [ 217.329715][ T8060] FAULT_INJECTION: forcing a failure. [ 217.329715][ T8060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 217.353025][ T8060] CPU: 0 PID: 8060 Comm: syz.4.2247 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 217.362691][ T8060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 217.372586][ T8060] Call Trace: [ 217.375798][ T8060] [ 217.378584][ T8060] dump_stack_lvl+0x151/0x1b7 [ 217.383079][ T8060] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 217.388374][ T8060] ? perf_swevent_hrtimer+0x449/0x4f0 [ 217.393579][ T8060] ? __kasan_check_write+0x14/0x20 [ 217.398530][ T8060] dump_stack+0x15/0x18 [ 217.402521][ T8060] should_fail_ex+0x3d0/0x520 [ 217.407034][ T8060] should_fail+0xb/0x10 [ 217.411026][ T8060] should_fail_usercopy+0x1a/0x20 [ 217.415894][ T8060] _copy_to_user+0x1e/0x90 [ 217.420171][ T8060] simple_read_from_buffer+0xc7/0x150 [ 217.425350][ T8060] proc_fail_nth_read+0x1a3/0x210 [ 217.430207][ T8060] ? proc_fault_inject_write+0x390/0x390 [ 217.435675][ T8060] ? fsnotify_perm+0x269/0x5b0 [ 217.440280][ T8060] ? security_file_permission+0x86/0xb0 [ 217.445654][ T8060] ? proc_fault_inject_write+0x390/0x390 [ 217.451124][ T8060] vfs_read+0x26c/0xae0 [ 217.455117][ T8060] ? kernel_read+0x1f0/0x1f0 [ 217.459542][ T8060] ? mutex_lock+0xb1/0x1e0 [ 217.463794][ T8060] ? bit_wait_io_timeout+0x120/0x120 [ 217.468918][ T8060] ? __fdget_pos+0x2e2/0x390 [ 217.473344][ T8060] ? ksys_read+0x77/0x2c0 [ 217.477510][ T8060] ksys_read+0x199/0x2c0 [ 217.481590][ T8060] ? irqentry_exit+0x30/0x40 [ 217.486161][ T8060] ? vfs_write+0xed0/0xed0 [ 217.490409][ T8060] __x64_sys_read+0x7b/0x90 [ 217.494746][ T8060] x64_sys_call+0x28/0x9a0 [ 217.498996][ T8060] do_syscall_64+0x3b/0xb0 [ 217.503259][ T8060] ? clear_bhb_loop+0x55/0xb0 [ 217.507906][ T8060] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 217.513630][ T8060] RIP: 0033:0x7f01e958bb7c [ 217.517875][ T8060] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 217.537317][ T8060] RSP: 002b:00007f01ea344030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 217.545560][ T8060] RAX: ffffffffffffffda RBX: 00007f01e97a5fa0 RCX: 00007f01e958bb7c [ 217.553375][ T8060] RDX: 000000000000000f RSI: 00007f01ea3440a0 RDI: 000000000000000e [ 217.561187][ T8060] RBP: 00007f01ea344090 R08: 0000000000000000 R09: 0000000000000000 [ 217.568994][ T8060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.576807][ T8060] R13: 0000000000000000 R14: 00007f01e97a5fa0 R15: 00007ffc78d7e3d8 [ 217.584633][ T8060] [ 218.020451][ T8090] device sit0 left promiscuous mode [ 218.076859][ T8090] device sit0 entered promiscuous mode [ 218.325620][ T8105] device sit0 left promiscuous mode [ 218.443710][ T8108] device sit0 entered promiscuous mode [ 223.711663][ T8275] device sit0 entered promiscuous mode [ 223.796770][ T28] audit: type=1400 audit(1743819386.838:167): avc: denied { create } for pid=8274 comm="syz.4.2315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 224.086628][ T8294] syz.4.2319[8294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.086715][ T8294] syz.4.2319[8294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.214656][ T8299] ip6_vti0: mtu greater than device maximum [ 224.682372][ T8313] device wg2 left promiscuous mode [ 233.941548][ T8385] device sit0 left promiscuous mode [ 234.449990][ T8418] device pim6reg1 entered promiscuous mode [ 236.201618][ T8540] device wg2 left promiscuous mode [ 237.333832][ T28] audit: type=1400 audit(1743819400.368:168): avc: denied { append } for pid=8607 comm="syz.3.2413" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 237.523320][ T8619] device syzkaller0 entered promiscuous mode [ 239.619058][ T8676] device syzkaller0 entered promiscuous mode [ 246.970561][ T8951] device pim6reg1 entered promiscuous mode [ 247.143299][ T8973] device sit0 left promiscuous mode [ 247.656642][ T8993] device syzkaller0 entered promiscuous mode [ 248.603729][ T9059] device veth0_vlan left promiscuous mode [ 248.621952][ T9059] device veth0_vlan entered promiscuous mode [ 248.638156][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.646595][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.659049][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.741016][ T9078] lo: mtu less than device minimum [ 248.765073][ T9078] bridge0: port 3(dummy0) entered blocking state [ 248.771828][ T9078] bridge0: port 3(dummy0) entered disabled state [ 248.789694][ T9078] device dummy0 entered promiscuous mode [ 248.799242][ T9078] bridge0: port 3(dummy0) entered blocking state [ 248.805693][ T9078] bridge0: port 3(dummy0) entered forwarding state [ 248.817713][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.274244][ T9123] device wg2 entered promiscuous mode [ 250.308340][ T9123] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 252.269290][ T9209] device syzkaller0 entered promiscuous mode [ 252.627261][ T9228] device veth1_macvtap entered promiscuous mode [ 252.653735][ T9228] device macsec0 entered promiscuous mode [ 252.680914][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.935793][ T9282] device syzkaller0 entered promiscuous mode [ 255.036872][ T9377] GPL: port 1(vlan0) entered blocking state [ 255.043811][ T9377] GPL: port 1(vlan0) entered disabled state [ 255.050397][ T9377] device vlan0 entered promiscuous mode [ 259.970218][ T9612] device pim6reg1 entered promiscuous mode [ 259.997558][ T9621] device macsec0 left promiscuous mode [ 261.794083][ T9692] device syzkaller0 entered promiscuous mode [ 262.227911][ T9714] device wg2 entered promiscuous mode [ 262.240273][ T9714] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 263.070570][ T9759] device dummy0 left promiscuous mode [ 263.077735][ T9759] bridge0: port 3(dummy0) entered disabled state [ 265.238410][ T9872] device sit0 entered promiscuous mode [ 267.776584][ T9973] device pim6reg1 entered promiscuous mode [ 268.724865][T10019] device sit0 left promiscuous mode [ 269.043494][T10022] device sit0 entered promiscuous mode [ 269.376504][T10020] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.385305][T10020] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.392962][T10020] device bridge_slave_0 entered promiscuous mode [ 269.427300][T10020] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.435294][T10020] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.519924][T10020] device bridge_slave_1 entered promiscuous mode [ 269.783020][T10048] FAULT_INJECTION: forcing a failure. [ 269.783020][T10048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 269.814398][T10048] CPU: 0 PID: 10048 Comm: syz.2.2830 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 269.824145][T10048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 269.834039][T10048] Call Trace: [ 269.837161][T10048] [ 269.839950][T10048] dump_stack_lvl+0x151/0x1b7 [ 269.844647][T10048] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 269.849880][T10048] ? __kasan_check_write+0x14/0x20 [ 269.854829][T10048] dump_stack+0x15/0x18 [ 269.858846][T10048] should_fail_ex+0x3d0/0x520 [ 269.863335][T10048] should_fail+0xb/0x10 [ 269.867325][T10048] should_fail_usercopy+0x1a/0x20 [ 269.872184][T10048] _copy_from_user+0x1e/0xc0 [ 269.876610][T10048] perf_copy_attr+0x163/0x880 [ 269.881131][T10048] __se_sys_perf_event_open+0xd7/0x3d60 [ 269.886508][T10048] ? __kasan_check_write+0x14/0x20 [ 269.891876][T10048] ? mutex_unlock+0xb2/0x260 [ 269.896294][T10048] ? __mutex_lock_slowpath+0x10/0x10 [ 269.901430][T10048] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 269.906887][T10048] ? fput+0x15b/0x1b0 [ 269.910706][T10048] ? __ia32_sys_read+0x90/0x90 [ 269.915304][T10048] ? debug_smp_processor_id+0x17/0x20 [ 269.920508][T10048] __x64_sys_perf_event_open+0xbf/0xd0 [ 269.925805][T10048] x64_sys_call+0x7de/0x9a0 [ 269.930140][T10048] do_syscall_64+0x3b/0xb0 [ 269.934392][T10048] ? clear_bhb_loop+0x55/0xb0 [ 269.938908][T10048] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 269.944634][T10048] RIP: 0033:0x7f0e62f8d169 [ 269.948887][T10048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 269.968332][T10048] RSP: 002b:00007f0e63e2a038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 269.976573][T10048] RAX: ffffffffffffffda RBX: 00007f0e631a5fa0 RCX: 00007f0e62f8d169 [ 269.984384][T10048] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 269.992195][T10048] RBP: 00007f0e63e2a090 R08: 0000000000000000 R09: 0000000000000000 [ 270.000023][T10048] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 270.007818][T10048] R13: 0000000000000000 R14: 00007f0e631a5fa0 R15: 00007ffec6e42ff8 [ 270.015635][T10048] [ 270.065326][ T28] audit: type=1400 audit(1743819433.108:169): avc: denied { create } for pid=10054 comm="syz.2.2833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 270.222348][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.249005][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.306882][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.323013][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.335209][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.342174][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.376407][ T407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.423558][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.439013][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.458940][ T1783] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.465857][ T1783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.550798][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.578507][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.649832][ T10] device bridge_slave_1 left promiscuous mode [ 270.655826][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.664301][ T10] device bridge_slave_0 left promiscuous mode [ 270.670346][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.028836][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 271.041011][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 271.062648][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 271.070697][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.088510][T10020] device veth0_vlan entered promiscuous mode [ 271.134631][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.179231][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.276761][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 271.289633][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 271.300046][T10085] FAULT_INJECTION: forcing a failure. [ 271.300046][T10085] name failslab, interval 1, probability 0, space 0, times 0 [ 271.313309][T10020] device veth1_macvtap entered promiscuous mode [ 271.325075][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 271.333452][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 271.341803][T10085] CPU: 1 PID: 10085 Comm: syz.2.2843 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 271.351531][T10085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 271.361425][T10085] Call Trace: [ 271.364545][T10085] [ 271.367322][T10085] dump_stack_lvl+0x151/0x1b7 [ 271.371848][T10085] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 271.377135][T10085] ? expand_files+0xd3/0x700 [ 271.381562][T10085] dump_stack+0x15/0x18 [ 271.385548][T10085] should_fail_ex+0x3d0/0x520 [ 271.390062][T10085] __should_failslab+0xaf/0xf0 [ 271.394661][T10085] should_failslab+0x9/0x20 [ 271.399002][T10085] kmem_cache_alloc_node+0x42/0x330 [ 271.404035][T10085] ? perf_event_alloc+0x11b/0x1840 [ 271.409071][T10085] perf_event_alloc+0x11b/0x1840 [ 271.413853][T10085] __se_sys_perf_event_open+0xb27/0x3d60 [ 271.419324][T10085] ? __mutex_lock_slowpath+0x1/0x10 [ 271.424349][T10085] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 271.429813][T10085] ? fput+0x15b/0x1b0 [ 271.433637][T10085] ? __ia32_sys_read+0x90/0x90 [ 271.438231][T10085] ? debug_smp_processor_id+0x17/0x20 [ 271.443443][T10085] __x64_sys_perf_event_open+0xbf/0xd0 [ 271.448746][T10085] x64_sys_call+0x7de/0x9a0 [ 271.453073][T10085] do_syscall_64+0x3b/0xb0 [ 271.457323][T10085] ? clear_bhb_loop+0x55/0xb0 [ 271.461852][T10085] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 271.467566][T10085] RIP: 0033:0x7f0e62f8d169 [ 271.471837][T10085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.491275][T10085] RSP: 002b:00007f0e63e2a038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 271.499518][T10085] RAX: ffffffffffffffda RBX: 00007f0e631a5fa0 RCX: 00007f0e62f8d169 [ 271.507326][T10085] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 271.515135][T10085] RBP: 00007f0e63e2a090 R08: 0000000000000000 R09: 0000000000000000 [ 271.522948][T10085] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 271.530757][T10085] R13: 0000000000000000 R14: 00007f0e631a5fa0 R15: 00007ffec6e42ff8 [ 271.538574][T10085] [ 271.546742][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 271.568731][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 271.592277][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.621187][ T28] audit: type=1400 audit(1743819434.668:170): avc: denied { mounton } for pid=10020 comm="syz-executor" path="/root/syzkaller.cvcK8d/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 271.669371][ T28] audit: type=1400 audit(1743819434.668:171): avc: denied { mount } for pid=10020 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 271.691841][ T28] audit: type=1400 audit(1743819434.688:172): avc: denied { mounton } for pid=10020 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 273.192548][T10144] device bridge_slave_1 left promiscuous mode [ 273.204831][T10144] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.250971][T10144] device bridge_slave_0 left promiscuous mode [ 273.339723][T10144] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.852348][T10171] FAULT_INJECTION: forcing a failure. [ 273.852348][T10171] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 273.878666][T10171] CPU: 1 PID: 10171 Comm: syz.2.2869 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 273.888410][T10171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 273.898302][T10171] Call Trace: [ 273.901425][T10171] [ 273.904202][T10171] dump_stack_lvl+0x151/0x1b7 [ 273.908716][T10171] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 273.914016][T10171] dump_stack+0x15/0x18 [ 273.918003][T10171] should_fail_ex+0x3d0/0x520 [ 273.922523][T10171] should_fail+0xb/0x10 [ 273.926506][T10171] should_fail_usercopy+0x1a/0x20 [ 273.931367][T10171] _copy_from_user+0x1e/0xc0 [ 273.935795][T10171] memdup_user+0x63/0xc0 [ 273.939882][T10171] strndup_user+0x68/0xc0 [ 273.944041][T10171] perf_uprobe_init+0x66/0x1a0 [ 273.948644][T10171] perf_uprobe_event_init+0x106/0x190 [ 273.953849][T10171] perf_try_init_event+0x143/0x410 [ 273.958798][T10171] perf_event_alloc+0x1029/0x1840 [ 273.963659][T10171] __se_sys_perf_event_open+0xb27/0x3d60 [ 273.969126][T10171] ? __mutex_lock_slowpath+0x1/0x10 [ 273.974158][T10171] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 273.979626][T10171] ? fput+0x15b/0x1b0 [ 273.983450][T10171] ? __ia32_sys_read+0x90/0x90 [ 273.988046][T10171] ? debug_smp_processor_id+0x17/0x20 [ 273.993251][T10171] __x64_sys_perf_event_open+0xbf/0xd0 [ 273.998544][T10171] x64_sys_call+0x7de/0x9a0 [ 274.002886][T10171] do_syscall_64+0x3b/0xb0 [ 274.007133][T10171] ? clear_bhb_loop+0x55/0xb0 [ 274.011647][T10171] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 274.017377][T10171] RIP: 0033:0x7f0e62f8d169 [ 274.021631][T10171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.041073][T10171] RSP: 002b:00007f0e63e2a038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 274.049317][T10171] RAX: ffffffffffffffda RBX: 00007f0e631a5fa0 RCX: 00007f0e62f8d169 [ 274.057128][T10171] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 274.065213][T10171] RBP: 00007f0e63e2a090 R08: 0000000000000000 R09: 0000000000000000 [ 274.073116][T10171] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 274.080998][T10171] R13: 0000000000000000 R14: 00007f0e631a5fa0 R15: 00007ffec6e42ff8 [ 274.088742][T10171] [ 274.513166][T10199] device wg2 entered promiscuous mode [ 274.527597][T10199] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 274.682504][T10218] FAULT_INJECTION: forcing a failure. [ 274.682504][T10218] name failslab, interval 1, probability 0, space 0, times 0 [ 274.778871][T10218] CPU: 1 PID: 10218 Comm: syz.4.2886 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 274.788632][T10218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 274.798631][T10218] Call Trace: [ 274.801742][T10218] [ 274.804519][T10218] dump_stack_lvl+0x151/0x1b7 [ 274.809047][T10218] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 274.814329][T10218] ? perf_uprobe_event_init+0x106/0x190 [ 274.819743][T10218] ? __x64_sys_perf_event_open+0xbf/0xd0 [ 274.825197][T10218] ? do_syscall_64+0x3b/0xb0 [ 274.829600][T10218] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 274.835515][T10218] dump_stack+0x15/0x18 [ 274.839496][T10218] should_fail_ex+0x3d0/0x520 [ 274.844013][T10218] ? getname_kernel+0x59/0x2e0 [ 274.848782][T10218] __should_failslab+0xaf/0xf0 [ 274.853496][T10218] should_failslab+0x9/0x20 [ 274.857832][T10218] kmem_cache_alloc+0x3b/0x320 [ 274.862438][T10218] getname_kernel+0x59/0x2e0 [ 274.866871][T10218] kern_path+0x23/0x1a0 [ 274.870928][T10218] create_local_trace_uprobe+0xa2/0x710 [ 274.876239][T10218] ? bpf_get_uprobe_info+0x540/0x540 [ 274.881358][T10218] perf_uprobe_init+0xfa/0x1a0 [ 274.885954][T10218] perf_uprobe_event_init+0x106/0x190 [ 274.891158][T10218] perf_try_init_event+0x143/0x410 [ 274.896104][T10218] perf_event_alloc+0x1029/0x1840 [ 274.900967][T10218] __se_sys_perf_event_open+0xb27/0x3d60 [ 274.906437][T10218] ? __mutex_lock_slowpath+0x1/0x10 [ 274.911466][T10218] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 274.916934][T10218] ? fput+0x15b/0x1b0 [ 274.920842][T10218] ? __ia32_sys_read+0x90/0x90 [ 274.925438][T10218] ? debug_smp_processor_id+0x17/0x20 [ 274.930651][T10218] __x64_sys_perf_event_open+0xbf/0xd0 [ 274.935947][T10218] x64_sys_call+0x7de/0x9a0 [ 274.940280][T10218] do_syscall_64+0x3b/0xb0 [ 274.944532][T10218] ? clear_bhb_loop+0x55/0xb0 [ 274.949047][T10218] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 274.954778][T10218] RIP: 0033:0x7ff7d438d169 [ 274.959029][T10218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.978473][T10218] RSP: 002b:00007ff7d5273038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 274.986713][T10218] RAX: ffffffffffffffda RBX: 00007ff7d45a5fa0 RCX: 00007ff7d438d169 [ 274.994524][T10218] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 275.002784][T10218] RBP: 00007ff7d5273090 R08: 0000000000000000 R09: 0000000000000000 [ 275.010597][T10218] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 275.018414][T10218] R13: 0000000000000000 R14: 00007ff7d45a5fa0 R15: 00007fffedfa17e8 [ 275.026226][T10218] [ 276.280792][T10264] FAULT_INJECTION: forcing a failure. [ 276.280792][T10264] name failslab, interval 1, probability 0, space 0, times 0 [ 276.322404][T10264] CPU: 0 PID: 10264 Comm: syz.2.2899 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 276.332150][T10264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 276.342209][T10264] Call Trace: [ 276.345255][T10264] [ 276.348029][T10264] dump_stack_lvl+0x151/0x1b7 [ 276.352544][T10264] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 276.357842][T10264] dump_stack+0x15/0x18 [ 276.361831][T10264] should_fail_ex+0x3d0/0x520 [ 276.366345][T10264] __should_failslab+0xaf/0xf0 [ 276.370946][T10264] ? create_local_trace_uprobe+0x161/0x710 [ 276.376585][T10264] should_failslab+0x9/0x20 [ 276.380924][T10264] __kmem_cache_alloc_node+0x3d/0x2a0 [ 276.386133][T10264] ? kern_path+0x147/0x1a0 [ 276.390385][T10264] ? create_local_trace_uprobe+0x161/0x710 [ 276.396030][T10264] kmalloc_trace+0x2a/0xa0 [ 276.400367][T10264] create_local_trace_uprobe+0x161/0x710 [ 276.405835][T10264] ? bpf_get_uprobe_info+0x540/0x540 [ 276.410959][T10264] perf_uprobe_init+0xfa/0x1a0 [ 276.415557][T10264] perf_uprobe_event_init+0x106/0x190 [ 276.420769][T10264] perf_try_init_event+0x143/0x410 [ 276.425868][T10264] perf_event_alloc+0x1029/0x1840 [ 276.431158][T10264] __se_sys_perf_event_open+0xb27/0x3d60 [ 276.436631][T10264] ? __mutex_lock_slowpath+0x1/0x10 [ 276.441659][T10264] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 276.447120][T10264] ? fput+0x15b/0x1b0 [ 276.450944][T10264] ? __ia32_sys_read+0x90/0x90 [ 276.455542][T10264] ? debug_smp_processor_id+0x17/0x20 [ 276.460752][T10264] __x64_sys_perf_event_open+0xbf/0xd0 [ 276.466042][T10264] x64_sys_call+0x7de/0x9a0 [ 276.470381][T10264] do_syscall_64+0x3b/0xb0 [ 276.474638][T10264] ? clear_bhb_loop+0x55/0xb0 [ 276.479149][T10264] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 276.484878][T10264] RIP: 0033:0x7f0e62f8d169 [ 276.489282][T10264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 276.508722][T10264] RSP: 002b:00007f0e63e2a038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 276.516974][T10264] RAX: ffffffffffffffda RBX: 00007f0e631a5fa0 RCX: 00007f0e62f8d169 [ 276.524776][T10264] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 276.532586][T10264] RBP: 00007f0e63e2a090 R08: 0000000000000000 R09: 0000000000000000 [ 276.540400][T10264] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 276.548212][T10264] R13: 0000000000000000 R14: 00007f0e631a5fa0 R15: 00007ffec6e42ff8 [ 276.556130][T10264] [ 276.559677][T10264] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 277.383176][T10325] FAULT_INJECTION: forcing a failure. [ 277.383176][T10325] name failslab, interval 1, probability 0, space 0, times 0 [ 277.412207][T10325] CPU: 1 PID: 10325 Comm: syz.1.2913 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 277.421953][T10325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 277.431847][T10325] Call Trace: [ 277.434972][T10325] [ 277.437749][T10325] dump_stack_lvl+0x151/0x1b7 [ 277.442398][T10325] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 277.447781][T10325] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 277.453721][T10325] dump_stack+0x15/0x18 [ 277.457677][T10325] should_fail_ex+0x3d0/0x520 [ 277.462197][T10325] __should_failslab+0xaf/0xf0 [ 277.466789][T10325] ? trace_probe_init+0x58/0x390 [ 277.471568][T10325] should_failslab+0x9/0x20 [ 277.475903][T10325] __kmem_cache_alloc_node+0x3d/0x2a0 [ 277.481112][T10325] ? trace_probe_init+0x58/0x390 [ 277.485885][T10325] __kmalloc+0xa3/0x1e0 [ 277.489881][T10325] trace_probe_init+0x58/0x390 [ 277.494476][T10325] ? __kasan_kmalloc+0x9c/0xb0 [ 277.499078][T10325] ? kmalloc_trace+0x44/0xa0 [ 277.503503][T10325] create_local_trace_uprobe+0x18c/0x710 [ 277.509059][T10325] ? bpf_get_uprobe_info+0x540/0x540 [ 277.514346][T10325] perf_uprobe_init+0xfa/0x1a0 [ 277.518939][T10325] perf_uprobe_event_init+0x106/0x190 [ 277.524145][T10325] perf_try_init_event+0x143/0x410 [ 277.529098][T10325] perf_event_alloc+0x1029/0x1840 [ 277.534066][T10325] __se_sys_perf_event_open+0xb27/0x3d60 [ 277.539635][T10325] ? __mutex_lock_slowpath+0x1/0x10 [ 277.544667][T10325] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 277.550133][T10325] ? fput+0x15b/0x1b0 [ 277.553953][T10325] ? __ia32_sys_read+0x90/0x90 [ 277.558550][T10325] ? debug_smp_processor_id+0x17/0x20 [ 277.563762][T10325] __x64_sys_perf_event_open+0xbf/0xd0 [ 277.569055][T10325] x64_sys_call+0x7de/0x9a0 [ 277.573391][T10325] do_syscall_64+0x3b/0xb0 [ 277.577819][T10325] ? clear_bhb_loop+0x55/0xb0 [ 277.582332][T10325] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 277.588062][T10325] RIP: 0033:0x7f101d38d169 [ 277.592316][T10325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.611759][T10325] RSP: 002b:00007f101d1ff038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 277.620000][T10325] RAX: ffffffffffffffda RBX: 00007f101d5a5fa0 RCX: 00007f101d38d169 [ 277.627810][T10325] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 277.635622][T10325] RBP: 00007f101d1ff090 R08: 0000000000000000 R09: 0000000000000000 [ 277.643557][T10325] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 277.651363][T10325] R13: 0000000000000000 R14: 00007f101d5a5fa0 R15: 00007ffdae481018 [ 277.659184][T10325] [ 277.677242][T10325] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 278.471926][T10370] FAULT_INJECTION: forcing a failure. [ 278.471926][T10370] name failslab, interval 1, probability 0, space 0, times 0 [ 278.518635][T10370] CPU: 1 PID: 10370 Comm: syz.4.2926 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 278.528390][T10370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 278.538276][T10370] Call Trace: [ 278.541401][T10370] [ 278.544175][T10370] dump_stack_lvl+0x151/0x1b7 [ 278.548690][T10370] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 278.553991][T10370] dump_stack+0x15/0x18 [ 278.557981][T10370] should_fail_ex+0x3d0/0x520 [ 278.562493][T10370] __should_failslab+0xaf/0xf0 [ 278.567089][T10370] ? trace_probe_init+0x2c1/0x390 [ 278.571949][T10370] should_failslab+0x9/0x20 [ 278.576292][T10370] __kmem_cache_alloc_node+0x3d/0x2a0 [ 278.581499][T10370] ? trace_probe_init+0x58/0x390 [ 278.586270][T10370] ? trace_probe_init+0x2c1/0x390 [ 278.591134][T10370] __kmalloc_node_track_caller+0xa2/0x1e0 [ 278.596688][T10370] kstrdup+0x39/0x70 [ 278.600523][T10370] trace_probe_init+0x2c1/0x390 [ 278.605213][T10370] create_local_trace_uprobe+0x18c/0x710 [ 278.610689][T10370] ? bpf_get_uprobe_info+0x540/0x540 [ 278.615799][T10370] perf_uprobe_init+0xfa/0x1a0 [ 278.620399][T10370] perf_uprobe_event_init+0x106/0x190 [ 278.625601][T10370] perf_try_init_event+0x143/0x410 [ 278.630554][T10370] perf_event_alloc+0x1029/0x1840 [ 278.635417][T10370] __se_sys_perf_event_open+0xb27/0x3d60 [ 278.640884][T10370] ? __mutex_lock_slowpath+0x1/0x10 [ 278.645916][T10370] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 278.651380][T10370] ? fput+0x15b/0x1b0 [ 278.655201][T10370] ? __ia32_sys_read+0x90/0x90 [ 278.659799][T10370] ? debug_smp_processor_id+0x17/0x20 [ 278.665012][T10370] __x64_sys_perf_event_open+0xbf/0xd0 [ 278.670313][T10370] x64_sys_call+0x7de/0x9a0 [ 278.674644][T10370] do_syscall_64+0x3b/0xb0 [ 278.678893][T10370] ? clear_bhb_loop+0x55/0xb0 [ 278.683406][T10370] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 278.689139][T10370] RIP: 0033:0x7ff7d438d169 [ 278.693386][T10370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.713365][T10370] RSP: 002b:00007ff7d5273038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 278.721609][T10370] RAX: ffffffffffffffda RBX: 00007ff7d45a5fa0 RCX: 00007ff7d438d169 [ 278.729423][T10370] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 278.737231][T10370] RBP: 00007ff7d5273090 R08: 0000000000000000 R09: 0000000000000000 [ 278.745045][T10370] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 278.752854][T10370] R13: 0000000000000000 R14: 00007ff7d45a5fa0 R15: 00007fffedfa17e8 [ 278.760671][T10370] [ 279.018671][T10370] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 279.468665][T10391] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.525447][T10391] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.570432][T10391] device bridge_slave_0 entered promiscuous mode [ 279.626520][T10391] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.683391][T10391] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.745695][T10391] device bridge_slave_1 entered promiscuous mode [ 280.309502][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.317095][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.331262][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.362343][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.387422][T10304] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.394371][T10304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.481241][T10424] FAULT_INJECTION: forcing a failure. [ 280.481241][T10424] name failslab, interval 1, probability 0, space 0, times 0 [ 280.493557][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 280.509288][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.518182][T10424] CPU: 1 PID: 10424 Comm: syz.4.2940 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 280.523116][T10304] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.528000][T10424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 280.534931][T10304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.544750][T10424] Call Trace: [ 280.544760][T10424] [ 280.544770][T10424] dump_stack_lvl+0x151/0x1b7 [ 280.562204][T10424] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 280.567499][T10424] dump_stack+0x15/0x18 [ 280.571486][T10424] should_fail_ex+0x3d0/0x520 [ 280.576003][T10424] __should_failslab+0xaf/0xf0 [ 280.580597][T10424] ? trace_probe_init+0x2f4/0x390 [ 280.585456][T10424] should_failslab+0x9/0x20 [ 280.589798][T10424] __kmem_cache_alloc_node+0x3d/0x2a0 [ 280.595009][T10424] ? kasan_save_alloc_info+0x1f/0x30 [ 280.600126][T10424] ? trace_probe_init+0x2f4/0x390 [ 280.604994][T10424] __kmalloc_node_track_caller+0xa2/0x1e0 [ 280.610541][T10424] ? memcpy+0x56/0x70 [ 280.614364][T10424] kstrdup+0x39/0x70 [ 280.618096][T10424] trace_probe_init+0x2f4/0x390 [ 280.622783][T10424] create_local_trace_uprobe+0x18c/0x710 [ 280.628248][T10424] ? bpf_get_uprobe_info+0x540/0x540 [ 280.633376][T10424] perf_uprobe_init+0xfa/0x1a0 [ 280.637969][T10424] perf_uprobe_event_init+0x106/0x190 [ 280.643182][T10424] perf_try_init_event+0x143/0x410 [ 280.648129][T10424] perf_event_alloc+0x1029/0x1840 [ 280.652990][T10424] __se_sys_perf_event_open+0xb27/0x3d60 [ 280.658458][T10424] ? __mutex_lock_slowpath+0x1/0x10 [ 280.663487][T10424] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 280.668956][T10424] ? fput+0x15b/0x1b0 [ 280.672779][T10424] ? __ia32_sys_read+0x90/0x90 [ 280.677372][T10424] ? debug_smp_processor_id+0x17/0x20 [ 280.682704][T10424] __x64_sys_perf_event_open+0xbf/0xd0 [ 280.687997][T10424] x64_sys_call+0x7de/0x9a0 [ 280.692334][T10424] do_syscall_64+0x3b/0xb0 [ 280.696581][T10424] ? clear_bhb_loop+0x55/0xb0 [ 280.701125][T10424] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 280.706824][T10424] RIP: 0033:0x7ff7d438d169 [ 280.711078][T10424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.730526][T10424] RSP: 002b:00007ff7d5273038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 280.738773][T10424] RAX: ffffffffffffffda RBX: 00007ff7d45a5fa0 RCX: 00007ff7d438d169 [ 280.746578][T10424] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 280.754395][T10424] RBP: 00007ff7d5273090 R08: 0000000000000000 R09: 0000000000000000 [ 280.762200][T10424] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 280.770014][T10424] R13: 0000000000000000 R14: 00007ff7d45a5fa0 R15: 00007fffedfa17e8 [ 280.777830][T10424] [ 280.782327][T10424] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 280.833048][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 280.867272][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 280.878943][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.147004][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 281.165525][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.227454][T10442] device pim6reg1 entered promiscuous mode [ 281.238341][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 281.263168][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.276784][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.291025][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.376804][T10391] device veth0_vlan entered promiscuous mode [ 281.520757][T10391] device veth1_macvtap entered promiscuous mode [ 281.553761][ T407] device vlan0 left promiscuous mode [ 281.559620][ T407] GPL: port 1(vlan0) entered disabled state [ 281.577091][ T407] device bridge_slave_1 left promiscuous mode [ 281.586487][ T407] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.596237][ T407] device bridge_slave_0 left promiscuous mode [ 281.604465][ T407] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.616246][ T407] device veth0_vlan left promiscuous mode [ 281.802241][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 281.810408][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.818889][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 281.846507][T10455] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.856271][T10455] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.889660][T10458] device bridge_slave_1 left promiscuous mode [ 281.895738][T10458] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.903374][T10458] device bridge_slave_0 left promiscuous mode [ 281.909509][T10458] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.032197][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 282.045959][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 282.056641][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 282.073609][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 283.078210][T10498] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.085588][T10498] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.094025][T10498] device bridge_slave_0 entered promiscuous mode [ 283.101624][T10498] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.108840][T10498] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.117148][T10498] device bridge_slave_1 entered promiscuous mode [ 283.523410][T10533] lo: mtu less than device minimum [ 283.558340][T10533] bridge0: port 3(dummy0) entered blocking state [ 283.575959][T10533] bridge0: port 3(dummy0) entered disabled state [ 283.603314][T10533] device dummy0 entered promiscuous mode [ 283.613911][T10533] bridge0: port 3(dummy0) entered blocking state [ 283.620264][T10533] bridge0: port 3(dummy0) entered forwarding state [ 283.629136][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.636544][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.659028][T10539] device veth1_macvtap left promiscuous mode [ 283.670092][T10539] device macsec0 entered promiscuous mode [ 283.695648][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.721769][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.739395][T10304] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.746288][T10304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.813002][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.821323][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.830020][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.838121][T10304] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.845004][T10304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.875441][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 283.920104][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.986486][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 283.995359][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.004682][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 284.013712][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.068294][T10498] device veth0_vlan entered promiscuous mode [ 284.123111][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.131556][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.139999][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.147902][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.163098][T10498] device veth1_macvtap entered promiscuous mode [ 284.289892][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.298252][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.306437][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.524656][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.533586][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.542411][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.553132][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.296239][ T407] device veth1_macvtap left promiscuous mode [ 286.145144][T10595] device veth1_macvtap left promiscuous mode [ 287.691419][T10663] device syzkaller0 entered promiscuous mode [ 287.759129][T10663] syzkaller0: tun_net_xmit 1280 [ 287.792665][T10663] syzkaller0: create flow: hash 3728886823 index 3 [ 287.817410][T10663] syzkaller0: create flow: hash 2570743694 index 1 [ 287.833911][T10662] syzkaller0: delete flow: hash 3728886823 index 3 [ 287.844450][T10662] syzkaller0: delete flow: hash 2570743694 index 1 [ 288.652648][T10687] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.659603][T10687] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.667139][T10687] device bridge_slave_0 entered promiscuous mode [ 288.716581][T10687] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.730940][T10687] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.738364][T10687] device bridge_slave_1 entered promiscuous mode [ 289.257531][T10728] device syzkaller0 entered promiscuous mode [ 289.438868][ T6] syzkaller0: tun_net_xmit 48 [ 289.537771][T10727] syzkaller0: tun_net_xmit 1280 [ 289.542734][T10727] syzkaller0: create flow: hash 3728886823 index 3 [ 289.551457][T10727] syzkaller0: create flow: hash 2570743694 index 1 [ 289.583291][T10725] syzkaller0: delete flow: hash 3728886823 index 3 [ 289.632074][T10725] syzkaller0: delete flow: hash 2570743694 index 1 [ 289.710283][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.728100][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.795126][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.809304][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.817464][ T848] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.824355][ T848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.831885][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.840412][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.848530][ T848] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.855438][ T848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.863891][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 289.934945][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 289.945306][ T1771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.271022][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 290.289085][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.299059][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 290.316746][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.325402][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.335661][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.343875][T10687] device veth0_vlan entered promiscuous mode [ 290.492437][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.500780][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.548349][T10687] device veth1_macvtap entered promiscuous mode [ 290.661370][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 290.671258][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.679942][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.688375][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 290.729403][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.917143][T10796] device syzkaller0 entered promiscuous mode [ 292.150852][ T19] syzkaller0: tun_net_xmit 48 [ 292.166068][T10796] syzkaller0: tun_net_xmit 1280 [ 292.188648][T10796] syzkaller0: create flow: hash 3728886823 index 3 [ 292.257831][T10795] syzkaller0: create flow: hash 2570743694 index 1 [ 292.307675][T10794] syzkaller0: delete flow: hash 3728886823 index 3 [ 292.413430][T10794] syzkaller0: delete flow: hash 2570743694 index 1 [ 295.971262][T10887] device pim6reg1 entered promiscuous mode [ 296.627427][T10922] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.635509][T10922] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.678513][T10922] device bridge_slave_1 left promiscuous mode [ 296.686843][T10922] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.712455][T10922] device bridge_slave_0 left promiscuous mode [ 296.729790][T10922] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.430639][T10953] device pim6reg1 entered promiscuous mode [ 299.122230][T11008] FAULT_INJECTION: forcing a failure. [ 299.122230][T11008] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 299.178761][T11008] CPU: 0 PID: 11008 Comm: syz.3.3099 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 299.188504][T11008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 299.198396][T11008] Call Trace: [ 299.201512][T11008] [ 299.204293][T11008] dump_stack_lvl+0x151/0x1b7 [ 299.208809][T11008] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 299.214101][T11008] dump_stack+0x15/0x18 [ 299.218093][T11008] should_fail_ex+0x3d0/0x520 [ 299.222609][T11008] should_fail+0xb/0x10 [ 299.226605][T11008] should_fail_usercopy+0x1a/0x20 [ 299.231459][T11008] _copy_from_user+0x1e/0xc0 [ 299.235890][T11008] get_user_ifreq+0xd5/0x230 [ 299.240317][T11008] sock_ioctl+0x60d/0x740 [ 299.244478][T11008] ? sock_poll+0x400/0x400 [ 299.248730][T11008] ? __fget_files+0x2cb/0x330 [ 299.253247][T11008] ? security_file_ioctl+0x84/0xb0 [ 299.258191][T11008] ? sock_poll+0x400/0x400 [ 299.262444][T11008] __se_sys_ioctl+0x114/0x190 [ 299.266959][T11008] __x64_sys_ioctl+0x7b/0x90 [ 299.271398][T11008] x64_sys_call+0x98/0x9a0 [ 299.275636][T11008] do_syscall_64+0x3b/0xb0 [ 299.279892][T11008] ? clear_bhb_loop+0x55/0xb0 [ 299.284403][T11008] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 299.290133][T11008] RIP: 0033:0x7f564a38d169 [ 299.294388][T11008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.313919][T11008] RSP: 002b:00007f564b268038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 299.322158][T11008] RAX: ffffffffffffffda RBX: 00007f564a5a5fa0 RCX: 00007f564a38d169 [ 299.329971][T11008] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000004 [ 299.337788][T11008] RBP: 00007f564b268090 R08: 0000000000000000 R09: 0000000000000000 [ 299.345593][T11008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.353404][T11008] R13: 0000000000000000 R14: 00007f564a5a5fa0 R15: 00007fff304e1e58 [ 299.361222][T11008] [ 300.418927][T11058] FAULT_INJECTION: forcing a failure. [ 300.418927][T11058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 300.452532][T11058] CPU: 0 PID: 11058 Comm: syz.4.3113 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 300.462282][T11058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 300.472171][T11058] Call Trace: [ 300.475295][T11058] [ 300.478078][T11058] dump_stack_lvl+0x151/0x1b7 [ 300.482596][T11058] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 300.487891][T11058] ? __schedule+0xcbd/0x1560 [ 300.492308][T11058] ? avc_has_extended_perms+0x90b/0x10f0 [ 300.497781][T11058] dump_stack+0x15/0x18 [ 300.501767][T11058] should_fail_ex+0x3d0/0x520 [ 300.506282][T11058] should_fail+0xb/0x10 [ 300.510270][T11058] should_fail_usercopy+0x1a/0x20 [ 300.515134][T11058] _copy_from_user+0x1e/0xc0 [ 300.519560][T11058] ip_tunnel_siocdevprivate+0xa3/0x1c0 [ 300.524856][T11058] ? ip_tunnel_update+0xc40/0xc40 [ 300.529713][T11058] ? __mutex_lock+0x6c8/0x1ca0 [ 300.534316][T11058] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 300.539960][T11058] ? sit_tunnel_xmit+0x26f0/0x26f0 [ 300.544904][T11058] ? full_name_hash+0x9d/0xf0 [ 300.549420][T11058] dev_ifsioc+0xd40/0x1150 [ 300.553668][T11058] ? ioctl_has_perm+0x3f0/0x560 [ 300.558356][T11058] ? dev_ioctl+0xe60/0xe60 [ 300.562609][T11058] ? __mutex_lock_slowpath+0xe/0x10 [ 300.567640][T11058] ? mutex_lock+0x130/0x1e0 [ 300.571981][T11058] ? bit_wait_io_timeout+0x120/0x120 [ 300.577107][T11058] dev_ioctl+0x5e9/0xe60 [ 300.581293][T11058] sock_ioctl+0x665/0x740 [ 300.585463][T11058] ? sock_poll+0x400/0x400 [ 300.589786][T11058] ? __fget_files+0x2cb/0x330 [ 300.594302][T11058] ? security_file_ioctl+0x84/0xb0 [ 300.599249][T11058] ? sock_poll+0x400/0x400 [ 300.603504][T11058] __se_sys_ioctl+0x114/0x190 [ 300.608025][T11058] __x64_sys_ioctl+0x7b/0x90 [ 300.612444][T11058] x64_sys_call+0x98/0x9a0 [ 300.616947][T11058] do_syscall_64+0x3b/0xb0 [ 300.621196][T11058] ? clear_bhb_loop+0x55/0xb0 [ 300.625704][T11058] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 300.631451][T11058] RIP: 0033:0x7ff7d438d169 [ 300.635719][T11058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 300.655125][T11058] RSP: 002b:00007ff7d5273038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 300.663373][T11058] RAX: ffffffffffffffda RBX: 00007ff7d45a5fa0 RCX: 00007ff7d438d169 [ 300.671199][T11058] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000004 [ 300.678994][T11058] RBP: 00007ff7d5273090 R08: 0000000000000000 R09: 0000000000000000 [ 300.686804][T11058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.694617][T11058] R13: 0000000000000000 R14: 00007ff7d45a5fa0 R15: 00007fffedfa17e8 [ 300.702446][T11058] [ 300.778159][T11064] device sit0 entered promiscuous mode [ 301.853962][T11113] FAULT_INJECTION: forcing a failure. [ 301.853962][T11113] name failslab, interval 1, probability 0, space 0, times 0 [ 301.872178][T11113] CPU: 1 PID: 11113 Comm: syz.1.3128 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 301.881939][T11113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 301.891813][T11113] Call Trace: [ 301.894934][T11113] [ 301.897711][T11113] dump_stack_lvl+0x151/0x1b7 [ 301.902227][T11113] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 301.907518][T11113] dump_stack+0x15/0x18 [ 301.911510][T11113] should_fail_ex+0x3d0/0x520 [ 301.916033][T11113] __should_failslab+0xaf/0xf0 [ 301.920622][T11113] should_failslab+0x9/0x20 [ 301.924962][T11113] kmem_cache_alloc_node+0x42/0x330 [ 301.929993][T11113] ? __alloc_skb+0xcc/0x2d0 [ 301.934345][T11113] ? ____kasan_slab_free+0x13c/0x180 [ 301.939457][T11113] __alloc_skb+0xcc/0x2d0 [ 301.943626][T11113] ? inetdev_event+0x7f7/0x1110 [ 301.948313][T11113] inet_netconf_notify_devconf+0x173/0x230 [ 301.953957][T11113] inetdev_event+0x823/0x1110 [ 301.958469][T11113] ? devinet_exit_net+0x230/0x230 [ 301.963327][T11113] ? arp_netdev_event+0xd4/0x2a0 [ 301.968099][T11113] raw_notifier_call_chain+0x8c/0xf0 [ 301.973224][T11113] unregister_netdevice_many+0xe25/0x1730 [ 301.978777][T11113] ? alloc_netdev_mqs+0xf90/0xf90 [ 301.983637][T11113] ? selinux_capable+0x2f1/0x430 [ 301.988410][T11113] ? selinux_capset+0xf0/0xf0 [ 301.992922][T11113] ? __kasan_check_read+0x11/0x20 [ 301.997786][T11113] unregister_netdevice_queue+0x2e6/0x350 [ 302.003340][T11113] ? list_netdevice+0x710/0x710 [ 302.008025][T11113] ? ns_capable+0x89/0xe0 [ 302.012191][T11113] ipip6_tunnel_ctl+0x2d1/0x15c0 [ 302.016973][T11113] ip_tunnel_siocdevprivate+0x126/0x1c0 [ 302.022352][T11113] ? ip_tunnel_update+0xc40/0xc40 [ 302.027307][T11113] ? do_vfs_ioctl+0xba7/0x29a0 [ 302.031900][T11113] ? kstrtouint_from_user+0x124/0x180 [ 302.037112][T11113] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 302.042754][T11113] ? sit_tunnel_xmit+0x26f0/0x26f0 [ 302.047698][T11113] ? full_name_hash+0x9d/0xf0 [ 302.052226][T11113] dev_ifsioc+0xd40/0x1150 [ 302.056472][T11113] ? ioctl_has_perm+0x3f0/0x560 [ 302.061150][T11113] ? dev_ioctl+0xe60/0xe60 [ 302.065403][T11113] ? __kasan_check_write+0x14/0x20 [ 302.070353][T11113] ? mutex_lock+0xb1/0x1e0 [ 302.074605][T11113] ? bit_wait_io_timeout+0x120/0x120 [ 302.079727][T11113] dev_ioctl+0x5e9/0xe60 [ 302.083812][T11113] sock_ioctl+0x665/0x740 [ 302.087971][T11113] ? sock_poll+0x400/0x400 [ 302.092225][T11113] ? __fget_files+0x2cb/0x330 [ 302.096739][T11113] ? security_file_ioctl+0x84/0xb0 [ 302.101684][T11113] ? sock_poll+0x400/0x400 [ 302.105935][T11113] __se_sys_ioctl+0x114/0x190 [ 302.110451][T11113] __x64_sys_ioctl+0x7b/0x90 [ 302.114874][T11113] x64_sys_call+0x98/0x9a0 [ 302.119128][T11113] do_syscall_64+0x3b/0xb0 [ 302.123378][T11113] ? clear_bhb_loop+0x55/0xb0 [ 302.127894][T11113] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 302.133624][T11113] RIP: 0033:0x7fad5758d169 [ 302.138308][T11113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 302.157761][T11113] RSP: 002b:00007fad5838e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.165997][T11113] RAX: ffffffffffffffda RBX: 00007fad577a5fa0 RCX: 00007fad5758d169 [ 302.173804][T11113] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000004 [ 302.181625][T11113] RBP: 00007fad5838e090 R08: 0000000000000000 R09: 0000000000000000 [ 302.189425][T11113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.197254][T11113] R13: 0000000000000000 R14: 00007fad577a5fa0 R15: 00007ffc384539f8 [ 302.205058][T11113] [ 302.325386][T11126] device pim6reg1 entered promiscuous mode [ 302.703872][T11149] FAULT_INJECTION: forcing a failure. [ 302.703872][T11149] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 302.717857][T11149] CPU: 0 PID: 11149 Comm: syz.4.3141 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 302.727588][T11149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 302.737482][T11149] Call Trace: [ 302.740605][T11149] [ 302.743384][T11149] dump_stack_lvl+0x151/0x1b7 [ 302.747893][T11149] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 302.753199][T11149] ? pcpu_block_update+0x45f/0x940 [ 302.758137][T11149] ? _find_next_bit+0x126/0x130 [ 302.762823][T11149] dump_stack+0x15/0x18 [ 302.766811][T11149] should_fail_ex+0x3d0/0x520 [ 302.771330][T11149] should_fail_alloc_page+0x68/0x90 [ 302.776362][T11149] prepare_alloc_pages+0x13b/0x6d0 [ 302.781311][T11149] ? pcpu_chunk_relocate+0x20a/0x430 [ 302.786431][T11149] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 302.791479][T11149] ? mutex_unlock+0xb2/0x260 [ 302.795892][T11149] ? pcpu_memcg_post_alloc_hook+0x1c0/0x2c0 [ 302.801618][T11149] __alloc_pages+0x162/0x610 [ 302.806056][T11149] ? prep_new_page+0x110/0x110 [ 302.810648][T11149] ? _find_next_bit+0x88/0x130 [ 302.815335][T11149] probe_event_enable+0x50d/0xb60 [ 302.820188][T11149] ? __uprobe_trace_func+0x3d0/0x3d0 [ 302.825308][T11149] trace_uprobe_register+0x90/0x590 [ 302.830345][T11149] ? _find_next_bit+0x126/0x130 [ 302.835029][T11149] perf_trace_event_init+0x43b/0x940 [ 302.840151][T11149] perf_uprobe_init+0x132/0x1a0 [ 302.844841][T11149] perf_uprobe_event_init+0x106/0x190 [ 302.850043][T11149] perf_try_init_event+0x143/0x410 [ 302.855006][T11149] perf_event_alloc+0x1029/0x1840 [ 302.859854][T11149] __se_sys_perf_event_open+0xb27/0x3d60 [ 302.865323][T11149] ? __mutex_lock_slowpath+0x1/0x10 [ 302.870352][T11149] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 302.875819][T11149] ? fput+0x15b/0x1b0 [ 302.879731][T11149] ? __ia32_sys_read+0x90/0x90 [ 302.884326][T11149] ? debug_smp_processor_id+0x17/0x20 [ 302.889538][T11149] __x64_sys_perf_event_open+0xbf/0xd0 [ 302.894854][T11149] x64_sys_call+0x7de/0x9a0 [ 302.899175][T11149] do_syscall_64+0x3b/0xb0 [ 302.903421][T11149] ? clear_bhb_loop+0x55/0xb0 [ 302.907935][T11149] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 302.913661][T11149] RIP: 0033:0x7ff7d438d169 [ 302.917919][T11149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 302.937365][T11149] RSP: 002b:00007ff7d5273038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 302.945600][T11149] RAX: ffffffffffffffda RBX: 00007ff7d45a5fa0 RCX: 00007ff7d438d169 [ 302.953419][T11149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 302.961229][T11149] RBP: 00007ff7d5273090 R08: 0000000000000000 R09: 0000000000000000 [ 302.969035][T11149] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 302.976850][T11149] R13: 0000000000000000 R14: 00007ff7d45a5fa0 R15: 00007fffedfa17e8 [ 302.984667][T11149] [ 303.004975][ T28] audit: type=1400 audit(1743819466.048:173): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 303.047444][ T28] audit: type=1400 audit(1743819466.048:174): avc: denied { unlink } for pid=84 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 303.079754][ T28] audit: type=1400 audit(1743819466.048:175): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 303.701402][T11189] device veth0_vlan left promiscuous mode [ 303.707838][T11189] device veth0_vlan entered promiscuous mode [ 303.738640][T11206] device veth1_macvtap left promiscuous mode [ 303.744875][T11206] device macsec0 entered promiscuous mode [ 303.770202][ T1769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.791038][ T1769] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.814898][T11212] FAULT_INJECTION: forcing a failure. [ 303.814898][T11212] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 303.828144][T11212] CPU: 0 PID: 11212 Comm: syz.3.3155 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 303.837869][T11212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 303.847757][T11212] Call Trace: [ 303.850880][T11212] [ 303.853654][T11212] dump_stack_lvl+0x151/0x1b7 [ 303.858171][T11212] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 303.863465][T11212] ? __this_cpu_preempt_check+0x13/0x20 [ 303.868937][T11212] dump_stack+0x15/0x18 [ 303.872923][T11212] should_fail_ex+0x3d0/0x520 [ 303.877440][T11212] should_fail_alloc_page+0x68/0x90 [ 303.882470][T11212] prepare_alloc_pages+0x13b/0x6d0 [ 303.887423][T11212] ? __alloc_pages_bulk+0xcd0/0xcd0 [ 303.892461][T11212] ? __schedule+0xcbd/0x1560 [ 303.897108][T11212] __alloc_pages+0x162/0x610 [ 303.901527][T11212] ? prep_new_page+0x110/0x110 [ 303.906135][T11212] ? preempt_schedule_common+0xbe/0xf0 [ 303.911422][T11212] ? preempt_schedule+0xd9/0xe0 [ 303.916101][T11212] ? schedule_preempt_disabled+0x20/0x20 [ 303.921573][T11212] ? _find_next_bit+0x88/0x130 [ 303.926173][T11212] pcpu_populate_chunk+0x19f/0xc00 [ 303.931126][T11212] pcpu_alloc+0xa24/0x1440 [ 303.935375][T11212] __alloc_percpu+0x24/0x30 [ 303.939710][T11212] perf_trace_event_init+0x615/0x940 [ 303.944835][T11212] perf_uprobe_init+0x132/0x1a0 [ 303.949516][T11212] perf_uprobe_event_init+0x106/0x190 [ 303.954724][T11212] perf_try_init_event+0x143/0x410 [ 303.959673][T11212] perf_event_alloc+0x1029/0x1840 [ 303.964537][T11212] __se_sys_perf_event_open+0xb27/0x3d60 [ 303.970014][T11212] ? __mutex_lock_slowpath+0x1/0x10 [ 303.975036][T11212] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 303.980503][T11212] ? fput+0x15b/0x1b0 [ 303.984524][T11212] ? __ia32_sys_read+0x90/0x90 [ 303.989119][T11212] ? debug_smp_processor_id+0x17/0x20 [ 303.994343][T11212] __x64_sys_perf_event_open+0xbf/0xd0 [ 303.999655][T11212] x64_sys_call+0x7de/0x9a0 [ 304.003960][T11212] do_syscall_64+0x3b/0xb0 [ 304.008212][T11212] ? clear_bhb_loop+0x55/0xb0 [ 304.012724][T11212] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 304.018449][T11212] RIP: 0033:0x7f564a38d169 [ 304.022707][T11212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.042144][T11212] RSP: 002b:00007f564b268038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 304.050387][T11212] RAX: ffffffffffffffda RBX: 00007f564a5a5fa0 RCX: 00007f564a38d169 [ 304.058201][T11212] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 304.066014][T11212] RBP: 00007f564b268090 R08: 0000000000000000 R09: 0000000000000000 [ 304.073835][T11212] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 304.081635][T11212] R13: 0000000000000000 R14: 00007f564a5a5fa0 R15: 00007fff304e1e58 [ 304.089450][T11212] [ 304.093174][T11212] percpu: allocation failed, size=8192 align=8 atomic=0, failed to populate [ 304.103512][T11212] CPU: 0 PID: 11212 Comm: syz.3.3155 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 304.113246][T11212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 304.123929][T11212] Call Trace: [ 304.127050][T11212] [ 304.129827][T11212] dump_stack_lvl+0x151/0x1b7 [ 304.134342][T11212] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 304.139633][T11212] ? pcpu_free_area+0x893/0xa50 [ 304.144324][T11212] dump_stack+0x15/0x18 [ 304.148315][T11212] pcpu_alloc+0xf44/0x1440 [ 304.152570][T11212] __alloc_percpu+0x24/0x30 [ 304.156912][T11212] perf_trace_event_init+0x615/0x940 [ 304.162036][T11212] perf_uprobe_init+0x132/0x1a0 [ 304.166715][T11212] perf_uprobe_event_init+0x106/0x190 [ 304.171923][T11212] perf_try_init_event+0x143/0x410 [ 304.176872][T11212] perf_event_alloc+0x1029/0x1840 [ 304.181733][T11212] __se_sys_perf_event_open+0xb27/0x3d60 [ 304.187230][T11212] ? __mutex_lock_slowpath+0x1/0x10 [ 304.192236][T11212] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 304.197701][T11212] ? fput+0x15b/0x1b0 [ 304.201531][T11212] ? __ia32_sys_read+0x90/0x90 [ 304.206138][T11212] ? debug_smp_processor_id+0x17/0x20 [ 304.211332][T11212] __x64_sys_perf_event_open+0xbf/0xd0 [ 304.216622][T11212] x64_sys_call+0x7de/0x9a0 [ 304.220960][T11212] do_syscall_64+0x3b/0xb0 [ 304.225215][T11212] ? clear_bhb_loop+0x55/0xb0 [ 304.229727][T11212] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 304.235458][T11212] RIP: 0033:0x7f564a38d169 [ 304.239707][T11212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.259158][T11212] RSP: 002b:00007f564b268038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 304.267398][T11212] RAX: ffffffffffffffda RBX: 00007f564a5a5fa0 RCX: 00007f564a38d169 [ 304.275209][T11212] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 304.283027][T11212] RBP: 00007f564b268090 R08: 0000000000000000 R09: 0000000000000000 [ 304.290835][T11212] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 304.298748][T11212] R13: 0000000000000000 R14: 00007f564a5a5fa0 R15: 00007fff304e1e58 [ 304.306568][T11212] [ 304.323959][ T1769] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.353983][T11223] FAULT_INJECTION: forcing a failure. [ 304.353983][T11223] name failslab, interval 1, probability 0, space 0, times 0 [ 304.396861][T11223] CPU: 1 PID: 11223 Comm: syz.0.3156 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 304.406621][T11223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 304.416506][T11223] Call Trace: [ 304.419623][T11223] [ 304.422400][T11223] dump_stack_lvl+0x151/0x1b7 [ 304.426917][T11223] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 304.432214][T11223] dump_stack+0x15/0x18 [ 304.436201][T11223] should_fail_ex+0x3d0/0x520 [ 304.440717][T11223] __should_failslab+0xaf/0xf0 [ 304.445319][T11223] should_failslab+0x9/0x20 [ 304.449652][T11223] kmem_cache_alloc_node+0x42/0x330 [ 304.454696][T11223] ? __alloc_skb+0xcc/0x2d0 [ 304.459025][T11223] ? ____kasan_slab_free+0x13c/0x180 [ 304.464153][T11223] __alloc_skb+0xcc/0x2d0 [ 304.468312][T11223] ? addrconf_ifdown+0x1791/0x1ab0 [ 304.473265][T11223] inet6_netconf_notify_devconf+0x10f/0x1c0 [ 304.478991][T11223] addrconf_ifdown+0x17a7/0x1ab0 [ 304.483768][T11223] ? addrconf_cleanup+0x140/0x140 [ 304.488619][T11223] ? mutex_unlock+0xb2/0x260 [ 304.493049][T11223] ? __kasan_check_write+0x14/0x20 [ 304.497996][T11223] ? __mutex_lock_slowpath+0x10/0x10 [ 304.503117][T11223] ? macsec_notify+0x101/0x4c0 [ 304.507722][T11223] ? __mutex_lock_slowpath+0x10/0x10 [ 304.512841][T11223] addrconf_notify+0x32f/0xe10 [ 304.517613][T11223] ? ip6mr_device_event+0x1ea/0x210 [ 304.522641][T11223] raw_notifier_call_chain+0x8c/0xf0 [ 304.527849][T11223] unregister_netdevice_many+0xe25/0x1730 [ 304.533410][T11223] ? alloc_netdev_mqs+0xf90/0xf90 [ 304.538257][T11223] ? selinux_capable+0x2f1/0x430 [ 304.543120][T11223] ? selinux_capset+0xf0/0xf0 [ 304.547638][T11223] ? __kasan_check_read+0x11/0x20 [ 304.552501][T11223] unregister_netdevice_queue+0x2e6/0x350 [ 304.558052][T11223] ? list_netdevice+0x710/0x710 [ 304.562738][T11223] ? ns_capable+0x89/0xe0 [ 304.566903][T11223] ipip6_tunnel_ctl+0x2d1/0x15c0 [ 304.571678][T11223] ip_tunnel_siocdevprivate+0x126/0x1c0 [ 304.577070][T11223] ? ip_tunnel_update+0xc40/0xc40 [ 304.581919][T11223] ? __mutex_lock+0x6c8/0x1ca0 [ 304.586529][T11223] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 304.592165][T11223] ? sit_tunnel_xmit+0x26f0/0x26f0 [ 304.597107][T11223] ? full_name_hash+0x9d/0xf0 [ 304.601622][T11223] dev_ifsioc+0xd40/0x1150 [ 304.605872][T11223] ? ioctl_has_perm+0x3f0/0x560 [ 304.610563][T11223] ? dev_ioctl+0xe60/0xe60 [ 304.614813][T11223] ? __mutex_lock_slowpath+0xe/0x10 [ 304.619848][T11223] ? mutex_lock+0x130/0x1e0 [ 304.624183][T11223] ? bit_wait_io_timeout+0x120/0x120 [ 304.629311][T11223] dev_ioctl+0x5e9/0xe60 [ 304.633385][T11223] sock_ioctl+0x665/0x740 [ 304.637555][T11223] ? sock_poll+0x400/0x400 [ 304.641805][T11223] ? __fget_files+0x2cb/0x330 [ 304.646340][T11223] ? security_file_ioctl+0x84/0xb0 [ 304.651270][T11223] ? sock_poll+0x400/0x400 [ 304.655521][T11223] __se_sys_ioctl+0x114/0x190 [ 304.660037][T11223] __x64_sys_ioctl+0x7b/0x90 [ 304.664460][T11223] x64_sys_call+0x98/0x9a0 [ 304.668708][T11223] do_syscall_64+0x3b/0xb0 [ 304.672961][T11223] ? clear_bhb_loop+0x55/0xb0 [ 304.677479][T11223] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 304.683206][T11223] RIP: 0033:0x7fbb2598d169 [ 304.687458][T11223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.706900][T11223] RSP: 002b:00007fbb257ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.715147][T11223] RAX: ffffffffffffffda RBX: 00007fbb25ba6160 RCX: 00007fbb2598d169 [ 304.722952][T11223] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000004 [ 304.730765][T11223] RBP: 00007fbb257ff090 R08: 0000000000000000 R09: 0000000000000000 [ 304.738574][T11223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.746391][T11223] R13: 0000000000000001 R14: 00007fbb25ba6160 R15: 00007ffc9cf6dcf8 [ 304.754208][T11223] [ 304.876626][T11233] device veth0_vlan left promiscuous mode [ 304.898790][T11233] device veth0_vlan entered promiscuous mode [ 304.923736][T11236] device pim6reg1 entered promiscuous mode [ 304.936741][T11246] ================================================================== [ 304.944656][T11246] BUG: KASAN: use-after-free in dev_map_enqueue+0x40/0x340 [ 304.951695][T11246] Read of size 8 at addr ffff88811c821100 by task syz.2.3165/11246 [ 304.959407][T11246] [ 304.961577][T11246] CPU: 0 PID: 11246 Comm: syz.2.3165 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 304.971296][T11246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 304.981197][T11246] Call Trace: [ 304.984318][T11246] [ 304.987112][T11246] dump_stack_lvl+0x151/0x1b7 [ 304.991609][T11246] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 304.996898][T11246] ? _printk+0xd1/0x111 [ 305.000890][T11246] ? __virt_addr_valid+0x242/0x2f0 [ 305.005842][T11246] print_report+0x158/0x4e0 [ 305.010180][T11246] ? __virt_addr_valid+0x242/0x2f0 [ 305.015131][T11246] ? kasan_complete_mode_report_info+0x57/0x1b0 [ 305.021204][T11246] ? dev_map_enqueue+0x40/0x340 [ 305.025974][T11246] kasan_report+0x13c/0x170 [ 305.030316][T11246] ? dev_map_enqueue+0x40/0x340 [ 305.035008][T11246] ? __page_pool_alloc_pages_slow+0x81f/0x9f0 [ 305.040907][T11246] __asan_report_load8_noabort+0x14/0x20 [ 305.046373][T11246] dev_map_enqueue+0x40/0x340 [ 305.050891][T11246] xdp_do_redirect_frame+0x2b5/0x800 [ 305.056008][T11246] bpf_test_run_xdp_live+0xc30/0x1f70 [ 305.061221][T11246] ? bpf_test_run_xdp_live+0x7ae/0x1f70 [ 305.066593][T11246] ? xdp_convert_md_to_buff+0x360/0x360 [ 305.071976][T11246] ? bpf_dispatcher_change_prog+0xd86/0xf10 [ 305.077707][T11246] ? 0xffffffffa0003b40 [ 305.081702][T11246] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 305.087775][T11246] ? __kasan_check_write+0x14/0x20 [ 305.092718][T11246] ? _copy_from_user+0x90/0xc0 [ 305.097324][T11246] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 305.102534][T11246] ? dev_put+0x80/0x80 [ 305.106437][T11246] ? __kasan_check_write+0x14/0x20 [ 305.111379][T11246] ? fput+0x15b/0x1b0 [ 305.115201][T11246] ? dev_put+0x80/0x80 [ 305.119109][T11246] bpf_prog_test_run+0x3b0/0x630 [ 305.123876][T11246] ? bpf_prog_query+0x260/0x260 [ 305.128561][T11246] ? selinux_bpf+0xd2/0x100 [ 305.132907][T11246] ? security_bpf+0x82/0xb0 [ 305.137247][T11246] __sys_bpf+0x59f/0x7f0 [ 305.141328][T11246] ? bpf_link_show_fdinfo+0x300/0x300 [ 305.146540][T11246] ? fpregs_restore_userregs+0x130/0x290 [ 305.152001][T11246] __x64_sys_bpf+0x7c/0x90 [ 305.156256][T11246] x64_sys_call+0x87f/0x9a0 [ 305.160588][T11246] do_syscall_64+0x3b/0xb0 [ 305.164845][T11246] ? clear_bhb_loop+0x55/0xb0 [ 305.169358][T11246] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 305.175090][T11246] RIP: 0033:0x7f785fb8d169 [ 305.179341][T11246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 305.198925][T11246] RSP: 002b:00007f78609eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 305.207148][T11246] RAX: ffffffffffffffda RBX: 00007f785fda5fa0 RCX: 00007f785fb8d169 [ 305.215063][T11246] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 305.222874][T11246] RBP: 00007f785fc0e2a0 R08: 0000000000000000 R09: 0000000000000000 [ 305.230685][T11246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 305.238495][T11246] R13: 0000000000000000 R14: 00007f785fda5fa0 R15: 00007ffcddbd1c48 [ 305.246314][T11246] [ 305.249167][T11246] [ 305.251335][T11246] Allocated by task 10505: [ 305.255598][T11246] kasan_set_track+0x4b/0x70 [ 305.260021][T11246] kasan_save_alloc_info+0x1f/0x30 [ 305.264962][T11246] __kasan_kmalloc+0x9c/0xb0 [ 305.269395][T11246] __kmalloc_node_track_caller+0xb3/0x1e0 [ 305.274945][T11246] krealloc+0x74/0x110 [ 305.278848][T11246] copy_verifier_state+0x301/0xab0 [ 305.283797][T11246] push_stack+0x19d/0x4f0 [ 305.287962][T11246] do_check+0x9369/0xe040 [ 305.292126][T11246] do_check_common+0x6ca/0xca0 [ 305.296728][T11246] bpf_check+0x6d12/0x17ed0 [ 305.301066][T11246] bpf_prog_load+0x1304/0x1bf0 [ 305.305667][T11246] __sys_bpf+0x52c/0x7f0 [ 305.309744][T11246] __x64_sys_bpf+0x7c/0x90 [ 305.313998][T11246] x64_sys_call+0x87f/0x9a0 [ 305.318338][T11246] do_syscall_64+0x3b/0xb0 [ 305.322591][T11246] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 305.328322][T11246] [ 305.330486][T11246] Last potentially related work creation: [ 305.336046][T11246] kasan_save_stack+0x3b/0x60 [ 305.340556][T11246] __kasan_record_aux_stack+0xb4/0xc0 [ 305.345765][T11246] kasan_record_aux_stack_noalloc+0xb/0x10 [ 305.351415][T11246] kvfree_call_rcu+0x9f/0x800 [ 305.355921][T11246] kernfs_unlink_open_file+0x327/0x3d0 [ 305.361215][T11246] kernfs_fop_release+0x253/0x310 [ 305.366077][T11246] __fput+0x1e5/0x870 [ 305.369894][T11246] ____fput+0x15/0x20 [ 305.373711][T11246] task_work_run+0x24d/0x2e0 [ 305.378137][T11246] exit_to_user_mode_loop+0x94/0xa0 [ 305.383323][T11246] exit_to_user_mode_prepare+0x5a/0xa0 [ 305.388614][T11246] syscall_exit_to_user_mode+0x26/0x130 [ 305.393997][T11246] do_syscall_64+0x47/0xb0 [ 305.398767][T11246] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 305.404509][T11246] [ 305.406667][T11246] The buggy address belongs to the object at ffff88811c821100 [ 305.406667][T11246] which belongs to the cache kmalloc-96 of size 96 [ 305.420383][T11246] The buggy address is located 0 bytes inside of [ 305.420383][T11246] 96-byte region [ffff88811c821100, ffff88811c821160) [ 305.433223][T11246] [ 305.435394][T11246] The buggy address belongs to the physical page: [ 305.441644][T11246] page:ffffea0004720840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88811c821c00 pfn:0x11c821 [ 305.453014][T11246] flags: 0x4000000000000200(slab|zone=1) [ 305.458614][T11246] raw: 4000000000000200 ffffea0004684608 ffffea000469dfc8 ffff888100042900 [ 305.467027][T11246] raw: ffff88811c821c00 0000000000200012 00000001ffffffff 0000000000000000 [ 305.475441][T11246] page dumped because: kasan: bad access detected [ 305.481704][T11246] page_owner tracks the page as allocated [ 305.487244][T11246] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 140, tgid 140 (dhcpcd), ts 7547891964, free_ts 0 [ 305.503746][T11246] post_alloc_hook+0x213/0x220 [ 305.508334][T11246] prep_new_page+0x1b/0x110 [ 305.512671][T11246] get_page_from_freelist+0x3a98/0x3b10 [ 305.518055][T11246] __alloc_pages+0x234/0x610 [ 305.522481][T11246] alloc_slab_page+0x6c/0xf0 [ 305.526910][T11246] new_slab+0x90/0x3e0 [ 305.530812][T11246] ___slab_alloc+0x6f9/0xb80 [ 305.535238][T11246] __slab_alloc+0x5d/0xa0 [ 305.539404][T11246] __kmem_cache_alloc_node+0x207/0x2a0 [ 305.544698][T11246] kmalloc_trace+0x2a/0xa0 [ 305.548952][T11246] kernfs_fop_open+0x70e/0xb10 [ 305.553551][T11246] do_dentry_open+0x891/0x1250 [ 305.558155][T11246] vfs_open+0x73/0x80 [ 305.561970][T11246] path_openat+0x2532/0x2d60 [ 305.566397][T11246] do_filp_open+0x230/0x480 [ 305.570773][T11246] do_sys_openat2+0x151/0x870 [ 305.575249][T11246] page_owner free stack trace missing [ 305.580461][T11246] [ 305.582627][T11246] Memory state around the buggy address: [ 305.588100][T11246] ffff88811c821000: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 305.596009][T11246] ffff88811c821080: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 305.603900][T11246] >ffff88811c821100: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 305.611789][T11246] ^ [ 305.615784][T11246] ffff88811c821180: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 305.623713][T11246] ffff88811c821200: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 305.631579][T11246] ================================================================== [ 305.639580][T11246] Disabling lock debugging due to kernel taint [ 305.645545][T11246] general protection fault, probably for non-canonical address 0xdffffc0000000044: 0000 [#1] PREEMPT SMP KASAN [ 305.657191][T11246] KASAN: null-ptr-deref in range [0x0000000000000220-0x0000000000000227] [ 305.665435][T11246] CPU: 0 PID: 11246 Comm: syz.2.3165 Tainted: G B 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 305.676630][T11246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 305.686532][T11246] RIP: 0010:dev_map_enqueue+0x91/0x340 [ 305.691816][T11246] Code: d0 00 00 00 4c 89 e8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ef e8 5f a0 25 00 bb 20 02 00 00 49 03 5d 00 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 40 a0 25 00 48 83 3b 00 0f 84 eb [ 305.711969][T11246] RSP: 0018:ffffc90000f4f5f8 EFLAGS: 00010206 [ 305.717856][T11246] RAX: 0000000000000044 RBX: 0000000000000220 RCX: ffffffff8197a441 [ 305.725667][T11246] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88811b00c2d0 [ 305.733479][T11246] RBP: ffffc90000f4f638 R08: ffffffff8144b443 R09: fffffbfff0f6e8fd [ 305.741418][T11246] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 305.749229][T11246] R13: ffff88811b00c2d0 R14: ffff88811b00c200 R15: ffff8881316f6070 [ 305.757041][T11246] FS: 00007f78609eb6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 305.765809][T11246] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 305.772230][T11246] CR2: 0000555592a0d4a8 CR3: 000000012f86b000 CR4: 00000000003506b0 [ 305.780052][T11246] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 305.787851][T11246] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 305.795664][T11246] Call Trace: [ 305.798785][T11246] [ 305.801563][T11246] ? __die_body+0x62/0xb0 [ 305.805728][T11246] ? die_addr+0x9f/0xd0 [ 305.809723][T11246] ? exc_general_protection+0x317/0x4c0 [ 305.815113][T11246] ? __kasan_check_write+0x14/0x20 [ 305.820059][T11246] ? dev_map_enqueue+0x40/0x340 [ 305.824737][T11246] ? asm_exc_general_protection+0x27/0x30 [ 305.830295][T11246] ? add_taint+0x93/0xe0 [ 305.834371][T11246] ? dev_map_enqueue+0x81/0x340 [ 305.839069][T11246] ? dev_map_enqueue+0x91/0x340 [ 305.844068][T11246] ? dev_map_enqueue+0x81/0x340 [ 305.848745][T11246] xdp_do_redirect_frame+0x2b5/0x800 [ 305.853865][T11246] bpf_test_run_xdp_live+0xc30/0x1f70 [ 305.859082][T11246] ? bpf_test_run_xdp_live+0x7ae/0x1f70 [ 305.864462][T11246] ? xdp_convert_md_to_buff+0x360/0x360 [ 305.869929][T11246] ? bpf_dispatcher_change_prog+0xd86/0xf10 [ 305.875647][T11246] ? 0xffffffffa0003b40 [ 305.879649][T11246] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 305.885722][T11246] ? __kasan_check_write+0x14/0x20 [ 305.890662][T11246] ? _copy_from_user+0x90/0xc0 [ 305.895268][T11246] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 305.900478][T11246] ? dev_put+0x80/0x80 [ 305.904378][T11246] ? __kasan_check_write+0x14/0x20 [ 305.909328][T11246] ? fput+0x15b/0x1b0 [ 305.913139][T11246] ? dev_put+0x80/0x80 [ 305.917054][T11246] bpf_prog_test_run+0x3b0/0x630 [ 305.921827][T11246] ? bpf_prog_query+0x260/0x260 [ 305.926516][T11246] ? selinux_bpf+0xd2/0x100 [ 305.930852][T11246] ? security_bpf+0x82/0xb0 [ 305.935187][T11246] __sys_bpf+0x59f/0x7f0 [ 305.939266][T11246] ? bpf_link_show_fdinfo+0x300/0x300 [ 305.944477][T11246] ? fpregs_restore_userregs+0x130/0x290 [ 305.949948][T11246] __x64_sys_bpf+0x7c/0x90 [ 305.954201][T11246] x64_sys_call+0x87f/0x9a0 [ 305.958531][T11246] do_syscall_64+0x3b/0xb0 [ 305.962786][T11246] ? clear_bhb_loop+0x55/0xb0 [ 305.967302][T11246] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 305.973031][T11246] RIP: 0033:0x7f785fb8d169 [ 305.977284][T11246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 305.997938][T11246] RSP: 002b:00007f78609eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 306.006186][T11246] RAX: ffffffffffffffda RBX: 00007f785fda5fa0 RCX: 00007f785fb8d169 [ 306.013998][T11246] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 306.021807][T11246] RBP: 00007f785fc0e2a0 R08: 0000000000000000 R09: 0000000000000000 [ 306.029618][T11246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 306.037433][T11246] R13: 0000000000000000 R14: 00007f785fda5fa0 R15: 00007ffcddbd1c48 [ 306.045245][T11246] [ 306.048190][T11246] Modules linked in: [ 306.051991][T11246] ---[ end trace 0000000000000000 ]--- [ 306.057222][T11246] RIP: 0010:dev_map_enqueue+0x91/0x340 [ 306.062555][T11246] Code: d0 00 00 00 4c 89 e8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ef e8 5f a0 25 00 bb 20 02 00 00 49 03 5d 00 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 40 a0 25 00 48 83 3b 00 0f 84 eb [ 306.081992][T11246] RSP: 0018:ffffc90000f4f5f8 EFLAGS: 00010206 [ 306.087859][T11246] RAX: 0000000000000044 RBX: 0000000000000220 RCX: ffffffff8197a441 [ 306.095703][T11246] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88811b00c2d0 [ 306.103510][T11246] RBP: ffffc90000f4f638 R08: ffffffff8144b443 R09: fffffbfff0f6e8fd [ 306.111409][T11246] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 306.119208][T11246] R13: ffff88811b00c2d0 R14: ffff88811b00c200 R15: ffff8881316f6070 [ 306.127004][T11246] FS: 00007f78609eb6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 306.135837][T11246] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 306.142213][T11246] CR2: 0000555592a0d4a8 CR3: 000000012f86b000 CR4: 00000000003506b0 [ 306.150300][T11246] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 306.158073][T11246] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 306.165932][T11246] Kernel panic - not syncing: Fatal exception in interrupt [ 306.173199][T11246] Kernel Offset: disabled [ 306.177339][T11246] Rebooting in 86400 seconds..