last executing test programs: 3.274071384s ago: executing program 0 (id=4093): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008}, r0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x3, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0xdfe5f8c0b7881a54}) 3.124327336s ago: executing program 0 (id=4094): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000c8, 0x0, 0x1, 0x8000000000000, 0x2ab5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) 1.848778054s ago: executing program 2 (id=4112): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="d405000000000000611014000000000025"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000f0ffffff0000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x82c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x19, 0x4, 0x4, 0x10002, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r6], 0x48) 1.548102969s ago: executing program 3 (id=4117): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1, 0x0, 0x3b98}, 0x18) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r3}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x9, 0x6f32c3e5, 0x6, 0x5, 0x4680, r0, 0xb916, '\x00', 0x0, r2, 0x5, 0x3, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x72bd1de2ad10b2b3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8940, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x103040, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000200)={0x6, &(0x7f0000000180)=[{0x6, 0x4, 0x5, 0x40}, {0xf, 0xa, 0x72, 0x7f}, {0x100, 0x37, 0x4, 0x4}, {0x100, 0x9, 0x42, 0x9}, {0x101, 0xb, 0x5, 0x5}, {0x1, 0x0, 0x6, 0x5}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x3) 1.360736022s ago: executing program 1 (id=4119): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000ec00ec2a00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xb}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xf, 0x3}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x1ffffd, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(0x4) 1.261325612s ago: executing program 4 (id=4120): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf26, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000001f95"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) 1.228904473s ago: executing program 2 (id=4121): bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff000085ffbfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.159849524s ago: executing program 2 (id=4122): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000e00)={r1, 0x0, &(0x7f0000001780)=""/4088}, 0x20) 1.040964056s ago: executing program 3 (id=4123): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xfd, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000540)) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000ddff00850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r5}, 0x10) (async, rerun: 32) unlink(&(0x7f0000000140)='./cgroup\x00') (async, rerun: 32) r6 = syz_clone(0x9008300, &(0x7f0000000380)="a4ded9b40f1bbdcf3d223605632accee78979a22bd758fc82e9f2e220f619e1519917ea04db7c625331d053f5ac5f14f21b29fe316f8e649ccc732bd3f3261d1a161028a3e1f1cc596140c1d96d4081501312baf6583e296b69c1c5ebbb0e05ff1e79f9aa653e8884d404c3d313b0420d1db16e1bdecf74bc95dc00e28ef03deadf2918681f529bc091150e98abfa8d3e0d8227c8ed578616f2947763836a5adf7ce6ed001bd21417de68652abe834b9fef3e8cf89bd560b1b9df9225e7d998460d858c544c95fd1473e11960451b38390cfdebb8a65cd95f5", 0xd9, &(0x7f00000001c0), &(0x7f00000002c0), &(0x7f0000000580)) perf_event_open$cgroup(&(0x7f0000000640)={0x2, 0x80, 0x0, 0x8, 0x40, 0x3, 0x0, 0x9, 0x40400, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000300), 0x6}, 0x1000, 0x3, 0x7, 0x2, 0x80000000, 0x4, 0x1, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0x4, r3, 0xa) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0xf9, 0x0, 0x0, 0xffffffffffffff80, 0x4c00, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x3ff, 0x68}, 0x100, 0x9, 0xba, 0x1, 0x1, 0x39540, 0x6298, 0x0, 0xdc9c}, r6, 0xb, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x9, 0xe9, 0x7, 0x8, 0x0, 0x0, 0xc8001, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x7, 0x2}, 0x4, 0x2, 0xffff, 0x8, 0x1, 0x3, 0x55, 0x0, 0x1, 0x0, 0x480}, r6, 0x7, 0xffffffffffffffff, 0x2) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x20f42, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0x6132}) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfe3a) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061107a00000000009500000000000040"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 995.376847ms ago: executing program 1 (id=4124): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, r0, 0x0, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x1, {0x4e21, 0x2}}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000140)="89dd74142644d60151f15f7f9ccad5d009d94d0ae4bbc983cc3ba3d86e79676889c5d1184ceef685b87c8f2c9237bfa194dc72f841f6c67ad24bd93361f48ccc64e7e8e637eb6f8c92fe6fe1ee9d153c54130ede187604664a4af19e9634b091d84343a16772c74fa321560403b3cf4f7cd094340e55d6a4c20f4907fd8da91cabbf9f32c95ff8ae6fd004e7d381e3a3baf2e2e67331b0529d93bb6ae2ab415e50e54a2e78e7e26eb14c50ad", 0xac}, {&(0x7f0000000200)="0491c8bdcf7250200075a615aeafbd654a8b916e348189bc2f43e4e047aa79017b20713640dcf4d856429971253c8c0882764986529e8bffe9a143c30dbc594219657125c8c1f43f0f33fdcaba0c2a2c1bc6659f39855837f0ad980cbfa16ce489cc075c84e70d94422ec5eeb6e6db2d4d49bbbb28958d3b1f9eccf908475eb68f9138d717d8d61c3c1431a33695761e1ad0097756d4367c17d25cae1e5dea9856808acdce0bd2c0c16bdacaf4fd3b917f6c6ab9d906c86efd56a9de7906a1130d58a304f4689409c2d5ba21eeba6371fb7ecacabd927ae02d23cf6d6868913cc8", 0xe1}], 0x2, &(0x7f0000000340)="4807d5590113fb698c47e0d435fbf09020cc7b234dca9f52e99ea9ddc2279934a03afc0387c04346f5d51b7ca21ff011f94e793cd0c62f4ef86444bb38ebe01c894549f1e30aa1ca38b742e88234344eb96bb744be39b20f60a622d95927a37966ef24e0d5c34a296b7d2b58cff8332c4566d4c62dbcc0acd787c37d19298d5b7db14dee9aa3d6c933e7", 0x8a, 0x4}, 0xf2c77e76c86974ee) syz_clone(0x20020900, &(0x7f0000000440)="cadf6c3acb9903bf680bbfecf11f422974c11774b79bfbf0b57a652bc2c60325703f962134f59ff412e2d311b2ca5a67", 0x30, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="b9749e95d04b3b38f9814cf26d0a9cd32abc51e25f1ac23e64e6b325790506d7f0c20cb359f4b279fc03cf5cf45da0af930d9676b893685771f4e907a28434e744d908062533c66e3f6936869930812106c900a7678aa025") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r1, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000640), 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000880)={r1, 0xffffffffffffffff}, 0x4) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0x6, 0x0, r1, 0x0, '\x00', 0x0, r0, 0x3, 0x1, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x15, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000740)='syzkaller\x00', 0x1000, 0x7a, &(0x7f0000000780)=""/122, 0x40f00, 0x0, '\x00', r2, @fallback=0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000940)=[r5, r1, r1, r1, r6, r1, r1, r1, r1], 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{r3, 0xffffffffffffffff}, &(0x7f0000000a40), &(0x7f0000000a80)=r3}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000cc0)={0x6, 0xc, &(0x7f0000000b00)=@raw=[@call={0x85, 0x0, 0x0, 0x81}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb05b}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffff}], &(0x7f0000000b80)='syzkaller\x00', 0x81, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000bc0)={0xa, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000c00)=[{0x2, 0x5, 0xa, 0x2}, {0x2, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x9, 0x4}, {0x2, 0x2, 0x4, 0x5}, {0x2, 0x3, 0x7, 0x1}, {0x1, 0x4, 0x8, 0x2}, {0x0, 0x4, 0x7, 0x8}, {0x3, 0x4, 0xd, 0x3}, {0x4, 0x1, 0xf, 0xa}], 0x10, 0x401, @void, @value}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x20, &(0x7f0000000ec0)={&(0x7f0000000d80)=""/2, 0x2, 0x0, &(0x7f0000000dc0)=""/222, 0xde}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000f40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, r3, 0x2, 0x3, 0x3, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000fc0)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000001040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x4, [@int={0xe, 0x0, 0x0, 0x1, 0x0, 0xf, 0x0, 0x16, 0x6}, @func={0xa, 0x0, 0x0, 0xc, 0x1}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x22, 0x0, 0x2e}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x5}}, @decl_tag={0xb, 0x0, 0x0, 0x11, 0x4, 0x5}, @ptr={0x9, 0x0, 0x0, 0x2, 0x2}, @typedef={0x5, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000001100)=""/138, 0x88, 0x8a, 0x1, 0x0, 0x0, @void, @value}, 0x28) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@base={0x7, 0x42, 0xdf4, 0xc2, 0x0, r7, 0x3, '\x00', r2, r3, 0x2, 0x4, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x8, 0x1b, &(0x7f0000001280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x7, 0x6, 0x1, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x8}], &(0x7f0000001380)='syzkaller\x00', 0x5, 0xd2, &(0x7f00000013c0)=""/210, 0x41000, 0x2, '\x00', r2, @fallback=0x25, r0, 0x8, &(0x7f00000014c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000001500)={0x4, 0x6, 0xe00, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000001540)=[r5], &(0x7f0000001580)=[{0x2, 0x1, 0x10, 0x3}, {0x5, 0x5, 0x5, 0x6}], 0x10, 0x899e, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001780)={@cgroup=r3, 0x24, 0x0, 0x280000, &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f00000016c0)=[0x0], &(0x7f0000001700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001740)=[0x0, 0x0, 0x0, 0x0]}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000017c0)='\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001800)={0xffffffffffffffff}) openat$cgroup_type(r3, &(0x7f0000001840), 0x2, 0x0) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001880)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x280, '\x00', 0x0, r9, 0x5, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001900)={0x3, 0x4, 0x4, 0xa, 0x0, r13, 0x3, '\x00', r2, r12, 0x2, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x12, &(0x7f0000001980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @ldst={0x2, 0x0, 0x4, 0xa, 0x5, 0x6, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001a40)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41100, 0x4a, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000001a80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ac0)={0x5, 0x4, 0x100, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001b00)=[r6, 0xffffffffffffffff], 0x0, 0x10, 0x9, @void, @value}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000001e40)={0x7, 0xe, &(0x7f0000001c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @alu={0x7, 0x0, 0xc, 0x0, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xa4}, @map_val={0x18, 0x7, 0x2, 0x0, r13, 0x0, 0x0, 0x0, 0x800}, @alu={0x7, 0x1, 0x3, 0x0, 0x4, 0x8, 0xfffffffffffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x5}, @exit, @jmp={0x5, 0x1, 0xa, 0x9, 0x2, 0x40, 0x8}]}, &(0x7f0000001c80)='syzkaller\x00', 0x1, 0xb9, &(0x7f0000001cc0)=""/185, 0x41000, 0xa, '\x00', r2, @fallback, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d80)={0x4, 0xd, 0x6, 0x4}, 0x10, 0xffffffffffffffff, r11, 0x8, 0x0, &(0x7f0000001dc0)=[{0x5, 0x5, 0xb, 0x3}, {0x4, 0x4, 0x4, 0x9}, {0x3, 0x2, 0x9, 0x9}, {0x0, 0x5, 0xe, 0x1}, {0x5, 0x4, 0x0, 0x7}, {0x1, 0x5, 0x7, 0x6}, {0x5, 0x1, 0xb}, {0x4, 0x1, 0xf}], 0x10, 0x1, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000001f00)=r14, 0x4) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f0000001f40)) 995.065407ms ago: executing program 3 (id=4125): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000080000000d"], 0x48) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) (async, rerun: 32) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async, rerun: 32) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000005c0), 0x12) close(0x3) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x8, 0x0, 0x0}}, 0x10) (rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000abe32c98569e2d31fae2cf9f5b968169f022f4c57a6e69022becbc2e07ce6e9948985de7e6a73067e78ee5aad20806314b61dcc0f65e5001f14823e41288d5b8f900910df48812b95e686d93f52b6f54cf10fa953a7e9ca1097534afdd56131be36cc3ddad942e31b94527419e3f01a9ea6a95c45e8d8258275bf7c577f9a98719d03d59e111bc458495db971e2214ad43414b69f052ed428152d91bf71f9eb45f075d950270cad1477e785df1d5a41100c92741a053cb7c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000580), &(0x7f0000000200)=""/159}, 0x20) (async) gettid() (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5}, 0x0, 0x0}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r5, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r5}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000700000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) 906.178458ms ago: executing program 1 (id=4126): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) socketpair(0x18, 0x5, 0xfffffff9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x8, [@var={0xf, 0x0, 0x0, 0xe, 0x1}, @enum={0xf, 0x4, 0x0, 0x6, 0x4, [{0x1, 0xfffffffc}, {0xc, 0x1ff}, {0xc, 0xa}, {0x9, 0x4}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x2, 0x5}, {0xc, 0x3}, {0xd, 0x5}, {0x5, 0x5}, {0x6, 0x4}, {0x8, 0x2}, {0x1}]}, @type_tag={0xc, 0x0, 0x0, 0x12, 0x2}, @union={0x3, 0x4, 0x0, 0x5, 0x0, 0x92a, [{0xd, 0x2, 0x541dc36d}, {0x4, 0x1, 0x6}, {0x5, 0x0, 0x3}, {0x4, 0x5, 0x6}]}]}, {0x0, [0x61, 0x61, 0x5f, 0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/122, 0xe8, 0x7a, 0x1, 0x1, 0x10000, @value}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0xfffffffd, 0x15ce5b76, 0x7, 0x4000, 0x1, 0x2, '\x00', r2, r3, 0x5, 0x1, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xa, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x0, 0x5, 0x3, 0x0, 0x4074ad75ada62366}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @alu={0x7, 0x0, 0x9, 0x7, 0x4, 0x0, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x9, 0x64, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r4], 0x0, 0x10, 0x52, @void, @value}, 0x94) openat$cgroup_int(r0, &(0x7f0000000600)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) r6 = getpid() syz_open_procfs$namespace(r6, &(0x7f0000000640)='ns/user\x00') write$cgroup_pid(r3, &(0x7f0000000680)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@fallback=r1, 0x0, 0x0, 0x9, &(0x7f00000006c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) ioctl$TUNSETVNETBE(r7, 0x400454de, &(0x7f0000000800)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000940)={@map=r7, 0x37, 0x1, 0xc, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000880)=[0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000980)={@map=r4, 0xffffffffffffffff, 0x26, 0x2038, 0x0, @void, @void, @value=0xffffffffffffffff, @void, r8}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000009c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x5, [@func={0x6, 0x0, 0x0, 0xc, 0x4}, @enum={0x2, 0x7, 0x0, 0x6, 0x4, [{0xc, 0x5}, {0x1, 0x2}, {0x4, 0xffff}, {0x10, 0xffffff01}, {0x1, 0x3231}, {0x3, 0x80000001}, {0x1, 0x5}]}]}, {0x0, [0x4f, 0x0, 0x0]}}, &(0x7f0000000a40)=""/57, 0x6d, 0x39, 0x1, 0x39e3, 0x0, @void, @value}, 0x28) write$cgroup_subtree(r7, &(0x7f0000000ac0)={[{0x2d, 'blkio'}, {0x2b, 'devices'}, {0x2d, 'devices'}, {0x2b, 'devices'}, {0x2b, 'rlimit'}]}, 0x2a) r9 = perf_event_open$cgroup(&(0x7f0000000bc0)={0x3, 0x80, 0x8, 0x6, 0x8a, 0xb, 0x0, 0x4, 0x9243, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000b80), 0x6}, 0x6, 0x9, 0x9, 0x1, 0x2, 0x20, 0x6, 0x0, 0x5, 0x0, 0x27fe}, r7, 0x2, r7, 0xb) perf_event_open$cgroup(&(0x7f0000000b00)={0x3, 0x80, 0x9, 0x0, 0x4, 0x8, 0x0, 0x4, 0x40000, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7bb, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x4000, 0x0, 0x8, 0x1, 0x8, 0x7, 0x0, 0x0, 0x8, 0x0, 0xe}, r0, 0xc, r9, 0xe) syz_open_procfs$namespace(r6, &(0x7f0000000c40)='ns/time\x00') r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000c80)='qgroup_update_reserve\x00', r7, 0x0, 0xfffffffffffffffb}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000d00), 0x3a080, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000d80)={r6, r10, 0x0, 0x2, &(0x7f0000000d40)='*\x00'}, 0x30) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x65722aca6356c379) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x5, 0x709c, 0xffffeaca, 0xf, 0x40, r7, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000e40)={0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f00000010c0)={&(0x7f0000000e80)=@name={0x1e, 0x2, 0x2, {{0x1, 0x4}, 0x2}}, 0x10, &(0x7f0000001040)=[{&(0x7f0000000ec0)="df434c0ebe13174b80a61298aedabb676e1218eab1ef7bfa8a478493495304e0b2ca2378baf0e55db51f100bd7807ba6f111b0792afa206a1b75e42982e8d6397ab782495b4185ffc01eedc9816f99973ca66a5703caeddf", 0x58}, {&(0x7f0000000f40)="d14a5d52afc4424e66bcb6384defeb393ed6ef40881664f2ff9c24b709e090cf87d4145a5fc745613ee0737c95c906033e4c0c8f04fea492c70105551fc489ae201db0cbfd953b810f036d07df3941b66bdb6a239b5c0799369178f597e60a3f81bed0fb4b024d3225a0dd1a561cf5b9979a0505b7f326d3eac2a12a339c8d7ba44fa9604197cade5fd2fd3508fa175e5ec4ead473bf91", 0x97}, {&(0x7f0000001000)="95026e89227ec2", 0x7}], 0x3, &(0x7f0000001080)="ca", 0x1, 0x40}, 0x0) mkdir(&(0x7f0000001100)='./file0\x00', 0x12) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001140)={r4}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001480)={r5, 0x0, 0x91, 0x9, &(0x7f0000001180)="63db4cce7bfb0bb5bdbcee5d6080ca3ad9067eaa26c84f979448d873b92ff160bccbcca155a21d3258db74682776559382d11637826571775fadc16afcb85675ab141013a6402e7d444139095e85f171e5d8d85a8ac202febdde758e89cfe98c031a928826168cde3b820b13dba096f87271f7c0099e1d6cb84db6df7261dd9708e63d91b022dd13c0de26aaced53abd6a", &(0x7f0000001240)=""/9, 0xf0, 0x0, 0xd8, 0xf3, &(0x7f0000001280)="9503901c5556174b28487022e9288250ece8b01896544beadad3258a1dcfeff2c740d65ef03c0e9a9e7eca6dabfaef165456831ad4691fb3a21f87b4126e83631002e6f6c46bbdd19bfb1084f6bbe2f7cc3fda935f92c3251f1bba60f799ca1c0ffe5d8161d2c9be22d793dc1370010327667c9de97ca5aebf471973d1d339dd069362e8b4c1e51938e0394884c4d2fe00b485a910cfad5420c596ec49c1d11e4787606b034cbc299316eaa259cd2c86729d7ff894eb498d5dc378d986c739ca7c73baf355717096302d590288cb55ef2f67bbd6606c424d", &(0x7f0000001380)="9bf2bb5903c7d9d4cf61b180d66d901c08dc04c0c00331646c1d409c58f5831bf3335bbb73d5d9780a76807e08067a8019ed994546624324adcc2054ac86aa58748ff108bb92a2548c82b9f0a7f2730ab6031266d5fd07c1952eeb8810e8d0a46b4ac6500b0c0dee1e1fd92112d9750a4a563da220f08ca636a025ac559b795be3822cc4dd0e2a9e9e7e340583b75367c1f6f907533f8ec0e68c56d39498f490c882cb664af440a88b4784d73353e4a9257c47303b182351e345dcde7a0c65d6a546cab6337b5ba687523b14fed292652f0748bec07aed8a7a129165efeb8347ed7d5fd64b3c03005a4463674599128035c7e3", 0x5, 0x0, 0x2}, 0x50) 905.768228ms ago: executing program 3 (id=4127): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) socketpair(0x10, 0x5, 0xc, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000202000000000000000000000b030000000000000000000002"], 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x100000001, 0x27ca}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, 0x0, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 894.306538ms ago: executing program 1 (id=4128): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000003c0)=@file={0x1, './cgroup\x00'}, 0x6e, &(0x7f0000000840)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x4000004}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800efffad8c979be8047acc", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3}, &(0x7f0000000000), 0x0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) unlink(&(0x7f0000000140)='./cgroup\x00') socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 883.446348ms ago: executing program 2 (id=4129): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000c8f140a0aad331ff6754696f74e1762653685eb8aa6fdc977fd66da5e2d388ee253e3714255e2b", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000003000000000000000000000000000000e6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="038a00000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000680)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r0, &(0x7f0000000400)="cf03a3d5ca8b076d28afb6b4a5a0eb449229c57fff9501767b0e74549a0faac4b0d5f5eb49068d7c2c00697df9072c", &(0x7f00000004c0)=""/38}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, &(0x7f0000000580), &(0x7f0000000640)=r5}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000218100000", @ANYRES32=r3, @ANYBLOB="000000000000000018100000", @ANYRES32=r4, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="f200000000000000b7043569353e43dd45cf9a0800000000ff00938af8ff00000000bfa24988f56d29360ea7eb409de3b1bc3f00000000000007029037caecc9eed98f5103d4f544d462040000000000f085000000210000e0a63f6469ea45daa843d752b6dc97dcdf6787b7ce44e7d46779a4272318a81fdd48f2a9cf36fd72c227e2014baacb9280112c74654c21948e62fd8bca60299334cd2bdde72ef721c0b4f52ef71ecb92b6cbbb"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r7) 695.609321ms ago: executing program 4 (id=4130): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5d, 0x1, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc46}, 0x10a824}, 0x0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x61251300, 0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xa8}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0xb, 0x5, 0x5, 0x8, 0x1, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000180), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r5}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x1ff) close(r1) close(r0) 694.989711ms ago: executing program 0 (id=4131): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async, rerun: 64) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000400), 0x12) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x9) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000711020000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (rerun: 32) 624.826602ms ago: executing program 0 (id=4132): bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff000090ffbfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 605.542082ms ago: executing program 0 (id=4133): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) 377.917545ms ago: executing program 3 (id=4134): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000000)="76389e147583ddd0569ba56a888e", 0x0, 0xff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 377.443195ms ago: executing program 1 (id=4135): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="d405000000000000611014000000000025"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000f0ffffff0000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x82c}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x19, 0x4, 0x4, 0x10002, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r6], 0x48) 369.365005ms ago: executing program 0 (id=4136): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='cq_reschedule\x00', r1, 0x0, 0x3b98}, 0x18) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r3}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x9, 0x6f32c3e5, 0x6, 0x5, 0x4680, r0, 0xb916, '\x00', 0x0, r2, 0x5, 0x3, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x72bd1de2ad10b2b3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8940, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x103040, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000200)={0x6, &(0x7f0000000180)=[{0x6, 0x4, 0x5, 0x40}, {0xf, 0xa, 0x72, 0x7f}, {0x100, 0x37, 0x4, 0x4}, {0x100, 0x9, 0x42, 0x9}, {0x101, 0xb, 0x5, 0x5}, {0x1, 0x0, 0x6, 0x5}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x3) 343.496455ms ago: executing program 3 (id=4137): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='cq_reschedule\x00', r1, 0x0, 0x3b98}, 0x18) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r3}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x9, 0x6f32c3e5, 0x6, 0x5, 0x4680, r0, 0xb916, '\x00', 0x0, r2, 0x5, 0x3, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x72bd1de2ad10b2b3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8940, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x103040, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000200)={0x6, &(0x7f0000000180)=[{0x6, 0x4, 0x5, 0x40}, {0xf, 0xa, 0x72, 0x7f}, {0x100, 0x37, 0x4, 0x4}, {0x100, 0x9, 0x42, 0x9}, {0x101, 0xb, 0x5, 0x5}, {0x1, 0x0, 0x6, 0x5}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x3) 312.089836ms ago: executing program 4 (id=4138): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x5, 0x0, &(0x7f00000002c0)="e02742e86c", 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x7, 0x9, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a5181100", @ANYRES32=r2], 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='.\x00', r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 308.995586ms ago: executing program 2 (id=4139): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000e00)={r1, 0x0, &(0x7f0000001780)=""/4088}, 0x20) 206.447428ms ago: executing program 2 (id=4140): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETOFFLOAD(r0, 0x400454ce, 0xa) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x2, 0x1, 0x3, 0x7, 0x0, 0x5, 0x200, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140)}, 0x0, 0x6, 0xd5d9, 0x6, 0x8001, 0x0, 0x400, 0x0, 0x7, 0x0, 0x80000001}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) (async) close(r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x300, 0x0, 0xdb0, 0xf5ffffff}, 0x0) (async) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) (async) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0xe, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async) socketpair(0x1, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x12c0, 0x0, 0x0, 0x0, 0x40001ff, 0x10000000, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETLINK(r6, 0x400454cc, 0x0) 162.587378ms ago: executing program 1 (id=4141): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000002000)=ANY=[@ANYBLOB="16000008000000000200000001000000000000008470d6122bebb81908747ab1b7b90f3d2642c633c0bdda3a2d142c9aa6403586954edcdc0d7ce9bfa0c2191de2c62385c8c670d1d12727bd04d747e12aff496ae5ec0940d8620bf8be10d275af787ac8521a0b47a1361e6561b4c8a3a148cb", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) (async) syz_open_procfs$namespace(0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r6, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0], &(0x7f0000000740), 0x0, 0x2d, &(0x7f0000000780)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x39, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r6, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0], &(0x7f0000000740), 0x0, 0x2d, &(0x7f0000000780)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x39, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d00)=r8, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x2a979d) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e00)=@bpf_ext={0x1c, 0x10, &(0x7f0000000b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, {}, {}, [@exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000700)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x6e, '\x00', r7, 0x0, r9, 0x8, &(0x7f0000000a40)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x3, 0x10, 0x7, 0x5}, 0x10, 0x304df, r9, 0xa, &(0x7f0000002180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5], &(0x7f00000021c0)=[{0x5, 0x5, 0x1, 0x1}, {0x4, 0x2, 0x8, 0xb}, {0x4, 0x1, 0xe}, {0x1, 0x1, 0xfff, 0x7}, {0x2, 0x1, 0x7, 0x2}, {0x2, 0x1, 0x4, 0x7}, {0x2, 0x5, 0x1, 0x3}, {0x0, 0x3, 0xb, 0x2}, {0x0, 0x1, 0xf, 0x3}, {0x1, 0x4, 0x9, 0x3}], 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r10}, &(0x7f0000000540), &(0x7f0000000580)=r11}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r10, &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x10, 0x18, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x31d5f615}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x3a, &(0x7f00000001c0)=""/58, 0x41000, 0x8, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x2, 0x7, 0x4}, 0x10, r8, r0, 0x2, &(0x7f0000000a40), &(0x7f0000000a80)=[{0x5, 0x4, 0x3, 0x3}, {0x4, 0x4, 0x7, 0x4}], 0x10, 0x7, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x10, 0x18, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x31d5f615}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x3a, &(0x7f00000001c0)=""/58, 0x41000, 0x8, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x2, 0x7, 0x4}, 0x10, r8, r0, 0x2, &(0x7f0000000a40), &(0x7f0000000a80)=[{0x5, 0x4, 0x3, 0x3}, {0x4, 0x4, 0x7, 0x4}], 0x10, 0x7, @void, @value}, 0x94) syz_clone(0x1000100, &(0x7f0000000ec0)="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", 0x1000, &(0x7f0000001ec0), &(0x7f0000001f00), &(0x7f0000001f40)="7baa1024474deac843a09974a5de658ef1bb9f56d5a462f2a3ad091632ab01e3fcd7d684aec5696ed180ed0819832484f065d3a1df322bd877982975fed66483709ff81adb5f9ddf9b8ca9c8c4e4b69e49596c947297bce04d0146037e276cd89303175a28fa32b9819b346babb3d06c3a7ac48699a52c5ab175c8c530969c4db637daf1fa55ae2631c71aad1d31d83f1e9b8bb7e0422302fc28b8e365f1c9e7bc93eac9486b48127a65ae69c0d3") socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r12) setsockopt$sock_attach_bpf(r13, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r14, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6971100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 117.259059ms ago: executing program 4 (id=4142): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x15, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@cb_func={0x18, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0x7f, 0x87, &(0x7f0000000180)=""/135, 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x10, 0x6ccffcaf}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x1, 0xa, 0x3}, {0x0, 0x5, 0x9, 0x1}, {0x4, 0x4, 0xf, 0xa}, {0x5, 0x3, 0x7, 0x5}, {0x2, 0x1, 0xc, 0x2}, {0x3, 0x2, 0x1, 0x1}, {0x0, 0x2, 0x5, 0x5}, {0x4, 0x5, 0xa, 0x8}, {0x4, 0x5, 0xc}], 0x10, 0x1, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='inet_sk_error_report\x00', r0, 0x0, 0x8001}, 0x18) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={0x1, 0x58, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880)=0xffffffffffffffff, 0x4) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x27, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ldst={0x2, 0x3, 0x0, 0x8, 0x4, 0x40, 0xffffffffffffffff}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x6}, @generic={0xbd, 0x7, 0x9, 0x64, 0x6}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000780)='GPL\x00', 0x100, 0x0, 0x0, 0x41100, 0x41, '\x00', r5, 0x25, r6, 0x8, &(0x7f00000008c0)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000900)=[{0x5, 0x4, 0x0, 0x5}, {0x0, 0x2, 0x6, 0x5}, {0x5, 0x2, 0x2, 0x7}, {0x5, 0x5, 0x7, 0x3}, {0x5, 0x3, 0xa, 0x9}, {0x0, 0x4, 0x9, 0x7}, {0x2, 0x4, 0x2, 0x5}, {0x3, 0x4, 0x4, 0x9}], 0x10, 0x10, @void, @value}, 0x94) openat$cgroup_procs(r3, &(0x7f0000000a40)='tasks\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000b80)={@cgroup=r3, 0x2b, 0x1, 0x1, &(0x7f0000000a80)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r10 = openat$cgroup_ro(r3, &(0x7f0000000c00)='freezer.state\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000bc0)={@fallback=r10, r0, 0xb, 0x30, 0x0, @void, @void, @void, @value, r9}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000c40)='./cgroup/syz1\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@bloom_filter={0x1e, 0x9, 0xffffff25, 0x6881, 0x23, r2, 0xee7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3, 0x5, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000f40)={&(0x7f0000000d00)="e363d4e2442799ba3cda35ca401acffa9b8e8cc91f9d1f7d829def851b6bbc4f45cd05d7ac34660df5e0d4dda48411daaacaa0bded95886dd64a3816852b6854422a0dd7d8459276a5c04adfa375cddb86eafab8a44bac14647d5ebe14711e7a61e7208e6b08e70c6d7af8c2c1", &(0x7f0000000d80)=""/133, &(0x7f0000000e40)="f587a4ff40915e6f47d2544b6517c8f39c1088f3f504c6", &(0x7f0000000e80)="a4d0a0bbb5574a1a6b7e99a3dd9f1114a313384d830fa6c53c52b697e004dd45de865fe414fd0a272eb0016c061d72b2f9c8cf40ecd839ed939ef293f22265e76b334994bdd006d4e255a35648e7b42682eb16056159f4ae49bc7d675a7c7581fe4ba11b22ddb701e3bab260df5369636bb180fadf29c0a889815283a234273c9339c2571654386820269643d1e4fdb5742cf4c40fa5ed29736a0ca488669ebac83d5fd0f94fc2b7b9a1a89195231ab910965a31ab16307449864e", 0x7f, r2}, 0x38) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x20, 0x2, &(0x7f0000000f80)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000fc0)='syzkaller\x00', 0x8000, 0xe5, &(0x7f0000001000)=""/229, 0x40f00, 0x41, '\x00', 0x0, @netfilter, r10, 0x8, &(0x7f0000001100)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000001140)={0x3, 0x2, 0x1, 0x7fff}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000001180)=[r10], 0x0, 0x10, 0x1000, @void, @value}, 0x94) gettid() openat$ppp(0xffffffffffffff9c, &(0x7f0000001280), 0x4000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001340)={{r10, 0xffffffffffffffff}, &(0x7f00000012c0), &(0x7f0000001300)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{r3, 0xffffffffffffffff}, &(0x7f0000001380), &(0x7f00000013c0)=r0}, 0x20) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001640)={&(0x7f00000015c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xb, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x42dc4d7d}}]}, {0x0, [0x5f, 0x0, 0x30, 0x30, 0x30, 0x30, 0x5f, 0x0, 0x5f]}}, &(0x7f0000001600)=""/17, 0x3b, 0x11, 0x1, 0x200, 0x10000, @value=r3}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001740)={0x6, 0x26, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3cd, 0x0, 0x0, 0x0, 0xf}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r12}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000001580)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', r5, 0x25, r14, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001680)=[0x1], &(0x7f00000016c0)=[{0x0, 0x2, 0x5, 0x7}, {0x2, 0x4, 0x1, 0x2}, {0x5, 0x4, 0xb, 0x2}, {0x4, 0x4, 0xd, 0x1c99bcb1b3504110}, {0x1, 0x2, 0x9, 0x3}, {0x0, 0x2, 0x6, 0xb}], 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001840)={&(0x7f0000001800)='vnet_rx_one\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) r15 = syz_clone(0x800, &(0x7f0000001880)="e4", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="cbee5abf820ee8c64eba31143fec194cabdd85e01d5a94358ce4c9064074f590c036d451d3baa33bbb131254c0cb9f1db0dbec297227c38a415b9eea21908fb3c074b209d430bfa9710ea4e98b55a34f064ddf0146dd9c066da8eb08c3e95d41ffe951d5dfdcbbf5476bcfc9e8c7490e03c0a058fd1e2809320c9473425171c9678deda69fde02dd206ad6d29c") r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001c00)=@o_path={&(0x7f0000001bc0)='./file0\x00', 0x0, 0x10, r8}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c40)=@bpf_ext={0x1c, 0xf, &(0x7f0000001a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x7}, [@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x617}}, @generic={0x40, 0x2, 0x3, 0x1, 0x5}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000001a80)='syzkaller\x00', 0x3, 0xbe, &(0x7f0000001ac0)=""/190, 0x40f00, 0xa, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001b80)={0x0, 0x4, 0x23, 0x4a}, 0x10, 0x18919, r16, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) close(r11) r17 = perf_event_open(&(0x7f0000001d40)={0x1, 0x80, 0xb, 0x6b, 0x2, 0x7, 0x0, 0x7, 0xc0026, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x788b50f2, 0x0, @perf_bp={&(0x7f0000001d00), 0x4}, 0x0, 0xec, 0x9, 0x7, 0x0, 0x9, 0x1, 0x0, 0xfffffffd, 0x0, 0x5}, r15, 0xe, r1, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r17, 0x40082404, &(0x7f0000001dc0)=0x2) 12.79128ms ago: executing program 4 (id=4143): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000009d000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 0s ago: executing program 4 (id=4144): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='cq_reschedule\x00', r1, 0x0, 0x3b98}, 0x18) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r3}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x9, 0x6f32c3e5, 0x6, 0x5, 0x4680, r0, 0xb916, '\x00', 0x0, r2, 0x5, 0x3, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x72bd1de2ad10b2b3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8940, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x103040, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000200)={0x6, &(0x7f0000000180)=[{0x6, 0x4, 0x5, 0x40}, {0xf, 0xa, 0x72, 0x7f}, {0x100, 0x37, 0x4, 0x4}, {0x100, 0x9, 0x42, 0x9}, {0x101, 0xb, 0x5, 0x5}, {0x1, 0x0, 0x6, 0x5}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x3) kernel console output (not intermixed with test programs): 868][ T5891] should_fail+0x3c1/0x510 [ 198.652285][ T5891] should_fail_usercopy+0x1a/0x20 [ 198.657305][ T5891] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 198.663371][ T5891] generic_perform_write+0x326/0x510 [ 198.668659][ T5891] ? grab_cache_page_write_begin+0xb0/0xb0 [ 198.674467][ T5891] ? file_remove_privs+0x580/0x580 [ 198.679570][ T5891] ? __fsnotify_parent+0x5f5/0x6c0 [ 198.684674][ T5891] ? __kasan_check_write+0x14/0x20 [ 198.689778][ T5891] ? down_write+0xac/0x110 [ 198.694184][ T5891] __generic_file_write_iter+0x24b/0x480 [ 198.699805][ T5891] ? generic_write_checks+0x3d4/0x480 [ 198.705163][ T5891] generic_file_write_iter+0xa9/0x1d0 [ 198.710520][ T5891] vfs_write+0x725/0xd60 [ 198.714777][ T5891] ? __kasan_slab_free+0x11/0x20 [ 198.719699][ T5891] ? kernel_write+0x3c0/0x3c0 [ 198.724361][ T5891] ? mutex_trylock+0xa0/0xa0 [ 198.728939][ T5891] ? __fget_files+0x2c4/0x320 [ 198.733601][ T5891] ? __fdget_pos+0x2d2/0x380 [ 198.738180][ T5891] ? ksys_write+0x71/0x240 [ 198.742583][ T5891] ksys_write+0x140/0x240 [ 198.746903][ T5891] ? __ia32_sys_read+0x90/0x90 [ 198.751753][ T5891] ? fpu__clear_all+0x20/0x20 [ 198.756425][ T5891] __x64_sys_write+0x7b/0x90 [ 198.761000][ T5891] do_syscall_64+0x31/0x40 [ 198.765415][ T5891] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 198.771297][ T5891] RIP: 0033:0x7f317aeba929 [ 198.775703][ T5891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.795471][ T5891] RSP: 002b:00007f3179523038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 198.803875][ T5891] RAX: ffffffffffffffda RBX: 00007f317b0e1fa0 RCX: 00007f317aeba929 [ 198.811834][ T5891] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 198.819792][ T5891] RBP: 00007f3179523090 R08: 0000000000000000 R09: 0000000000000000 [ 198.827749][ T5891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.835709][ T5891] R13: 0000000000000000 R14: 00007f317b0e1fa0 R15: 00007fffe4b48188 [ 199.740127][ T5919] device syzkaller0 entered promiscuous mode [ 200.302693][ T5943] device wg2 left promiscuous mode [ 200.355700][ T5952] device wg2 entered promiscuous mode [ 201.635930][ T6004] device syzkaller0 left promiscuous mode [ 201.988158][ T6026] device wg2 entered promiscuous mode [ 202.967903][ T6062] device syzkaller0 entered promiscuous mode [ 203.017061][ T6065] device wg2 left promiscuous mode [ 203.078655][ T6065] device wg2 entered promiscuous mode [ 203.297352][ T6075] device veth1_macvtap left promiscuous mode [ 203.999987][ T6100] device wg2 left promiscuous mode [ 204.125661][ T6100] device wg2 entered promiscuous mode [ 204.605395][ T24] audit: type=1400 audit(1749217954.260:154): avc: denied { create } for pid=6126 comm="syz.3.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 204.781952][ T6134] device wg2 left promiscuous mode [ 204.865250][ T6134] device wg2 entered promiscuous mode [ 205.865050][ T6179] FAULT_INJECTION: forcing a failure. [ 205.865050][ T6179] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 205.878155][ T6179] CPU: 0 PID: 6179 Comm: syz.0.1737 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 205.889437][ T6179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 205.899501][ T6179] Call Trace: [ 205.902817][ T6179] __dump_stack+0x21/0x24 [ 205.907153][ T6179] dump_stack_lvl+0x169/0x1d8 [ 205.911833][ T6179] ? thaw_kernel_threads+0x220/0x220 [ 205.917116][ T6179] ? show_regs_print_info+0x18/0x18 [ 205.922321][ T6179] dump_stack+0x15/0x1c [ 205.926482][ T6179] should_fail+0x3c1/0x510 [ 205.930900][ T6179] should_fail_usercopy+0x1a/0x20 [ 205.935932][ T6179] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 205.941999][ T6179] generic_perform_write+0x326/0x510 [ 205.947295][ T6179] ? grab_cache_page_write_begin+0xb0/0xb0 [ 205.953107][ T6179] ? file_remove_privs+0x580/0x580 [ 205.958225][ T6179] ? __fsnotify_parent+0x5f5/0x6c0 [ 205.963346][ T6179] ? __kasan_check_write+0x14/0x20 [ 205.968459][ T6179] ? down_write+0xac/0x110 [ 205.972879][ T6179] __generic_file_write_iter+0x24b/0x480 [ 205.978499][ T6179] ? generic_write_checks+0x3d4/0x480 [ 205.983965][ T6179] generic_file_write_iter+0xa9/0x1d0 [ 205.989325][ T6179] vfs_write+0x725/0xd60 [ 205.993555][ T6179] ? __kasan_slab_free+0x11/0x20 [ 205.998485][ T6179] ? kernel_write+0x3c0/0x3c0 [ 206.003155][ T6179] ? mutex_trylock+0xa0/0xa0 [ 206.007923][ T6179] ? __fget_files+0x2c4/0x320 [ 206.012595][ T6179] ? __fdget_pos+0x2d2/0x380 [ 206.017170][ T6179] ? ksys_write+0x71/0x240 [ 206.021831][ T6179] ksys_write+0x140/0x240 [ 206.026150][ T6179] ? __ia32_sys_read+0x90/0x90 [ 206.030909][ T6179] ? fpu__clear_all+0x20/0x20 [ 206.035599][ T6179] __x64_sys_write+0x7b/0x90 [ 206.040197][ T6179] do_syscall_64+0x31/0x40 [ 206.044621][ T6179] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 206.050512][ T6179] RIP: 0033:0x7f439948e929 [ 206.054936][ T6179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.074530][ T6179] RSP: 002b:00007f4397af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 206.082937][ T6179] RAX: ffffffffffffffda RBX: 00007f43996b5fa0 RCX: 00007f439948e929 [ 206.090900][ T6179] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 206.098874][ T6179] RBP: 00007f4397af7090 R08: 0000000000000000 R09: 0000000000000000 [ 206.106844][ T6179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 206.114814][ T6179] R13: 0000000000000000 R14: 00007f43996b5fa0 R15: 00007ffe1fc185f8 [ 206.283427][ T6181] device wg2 left promiscuous mode [ 206.365075][ T6181] device wg2 entered promiscuous mode [ 206.443605][ T6184] device sit0 left promiscuous mode [ 206.600459][ T6187] device sit0 entered promiscuous mode [ 207.546744][ T6239] FAULT_INJECTION: forcing a failure. [ 207.546744][ T6239] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 207.559914][ T6239] CPU: 1 PID: 6239 Comm: syz.3.1758 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 207.571195][ T6239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 207.581265][ T6239] Call Trace: [ 207.584650][ T6239] __dump_stack+0x21/0x24 [ 207.589248][ T6239] dump_stack_lvl+0x169/0x1d8 [ 207.593927][ T6239] ? thaw_kernel_threads+0x220/0x220 [ 207.599210][ T6239] ? show_regs_print_info+0x18/0x18 [ 207.604412][ T6239] dump_stack+0x15/0x1c [ 207.608572][ T6239] should_fail+0x3c1/0x510 [ 207.613006][ T6239] should_fail_usercopy+0x1a/0x20 [ 207.618033][ T6239] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 207.624103][ T6239] generic_perform_write+0x326/0x510 [ 207.629398][ T6239] ? grab_cache_page_write_begin+0xb0/0xb0 [ 207.635207][ T6239] ? file_remove_privs+0x580/0x580 [ 207.640323][ T6239] ? __fsnotify_parent+0x5f5/0x6c0 [ 207.645444][ T6239] ? __kasan_check_write+0x14/0x20 [ 207.650664][ T6239] ? down_write+0xac/0x110 [ 207.655169][ T6239] __generic_file_write_iter+0x24b/0x480 [ 207.660888][ T6239] ? generic_write_checks+0x3d4/0x480 [ 207.666261][ T6239] generic_file_write_iter+0xa9/0x1d0 [ 207.671634][ T6239] vfs_write+0x725/0xd60 [ 207.675878][ T6239] ? __kasan_slab_free+0x11/0x20 [ 207.680815][ T6239] ? kernel_write+0x3c0/0x3c0 [ 207.685493][ T6239] ? mutex_trylock+0xa0/0xa0 [ 207.690083][ T6239] ? __fget_files+0x2c4/0x320 [ 207.694764][ T6239] ? __fdget_pos+0x2d2/0x380 [ 207.699357][ T6239] ? ksys_write+0x71/0x240 [ 207.703861][ T6239] ksys_write+0x140/0x240 [ 207.708191][ T6239] ? __ia32_sys_read+0x90/0x90 [ 207.712956][ T6239] ? fpu__clear_all+0x20/0x20 [ 207.717642][ T6239] __x64_sys_write+0x7b/0x90 [ 207.722232][ T6239] do_syscall_64+0x31/0x40 [ 207.726654][ T6239] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 207.732543][ T6239] RIP: 0033:0x7f173103f929 [ 207.736967][ T6239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 207.756662][ T6239] RSP: 002b:00007f172f6a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 207.765084][ T6239] RAX: ffffffffffffffda RBX: 00007f1731266fa0 RCX: 00007f173103f929 [ 207.773065][ T6239] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 207.781043][ T6239] RBP: 00007f172f6a8090 R08: 0000000000000000 R09: 0000000000000000 [ 207.789017][ T6239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 207.796987][ T6239] R13: 0000000000000000 R14: 00007f1731266fa0 R15: 00007ffc54bdfed8 [ 208.176049][ T6256] device syzkaller0 entered promiscuous mode [ 208.802228][ T6288] device wg2 left promiscuous mode [ 208.891542][ T6291] device wg2 entered promiscuous mode [ 209.104794][ T6298] FAULT_INJECTION: forcing a failure. [ 209.104794][ T6298] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 209.117915][ T6298] CPU: 1 PID: 6298 Comm: syz.3.1780 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 209.129203][ T6298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 209.139265][ T6298] Call Trace: [ 209.142571][ T6298] __dump_stack+0x21/0x24 [ 209.146911][ T6298] dump_stack_lvl+0x169/0x1d8 [ 209.151598][ T6298] ? thaw_kernel_threads+0x220/0x220 [ 209.156889][ T6298] ? show_regs_print_info+0x18/0x18 [ 209.162089][ T6298] dump_stack+0x15/0x1c [ 209.166257][ T6298] should_fail+0x3c1/0x510 [ 209.170676][ T6298] should_fail_usercopy+0x1a/0x20 [ 209.175709][ T6298] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 209.181783][ T6298] generic_perform_write+0x326/0x510 [ 209.187074][ T6298] ? grab_cache_page_write_begin+0xb0/0xb0 [ 209.192888][ T6298] ? file_remove_privs+0x580/0x580 [ 209.198005][ T6298] ? __fsnotify_parent+0x5f5/0x6c0 [ 209.203129][ T6298] ? __kasan_check_write+0x14/0x20 [ 209.208245][ T6298] ? down_write+0xac/0x110 [ 209.212756][ T6298] __generic_file_write_iter+0x24b/0x480 [ 209.218387][ T6298] ? generic_write_checks+0x3d4/0x480 [ 209.223766][ T6298] generic_file_write_iter+0xa9/0x1d0 [ 209.229141][ T6298] vfs_write+0x725/0xd60 [ 209.233514][ T6298] ? __kasan_slab_free+0x11/0x20 [ 209.238461][ T6298] ? kernel_write+0x3c0/0x3c0 [ 209.243145][ T6298] ? mutex_trylock+0xa0/0xa0 [ 209.247739][ T6298] ? __fget_files+0x2c4/0x320 [ 209.252545][ T6298] ? __fdget_pos+0x2d2/0x380 [ 209.257139][ T6298] ? ksys_write+0x71/0x240 [ 209.261557][ T6298] ksys_write+0x140/0x240 [ 209.265895][ T6298] ? __ia32_sys_read+0x90/0x90 [ 209.270664][ T6298] ? fpu__clear_all+0x20/0x20 [ 209.275347][ T6298] __x64_sys_write+0x7b/0x90 [ 209.280036][ T6298] do_syscall_64+0x31/0x40 [ 209.284463][ T6298] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 209.290361][ T6298] RIP: 0033:0x7f173103f929 [ 209.294786][ T6298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 209.314403][ T6298] RSP: 002b:00007f172f687038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 209.322827][ T6298] RAX: ffffffffffffffda RBX: 00007f1731267080 RCX: 00007f173103f929 [ 209.330809][ T6298] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 209.338969][ T6298] RBP: 00007f172f687090 R08: 0000000000000000 R09: 0000000000000000 [ 209.346950][ T6298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 209.354938][ T6298] R13: 0000000000000000 R14: 00007f1731267080 R15: 00007ffc54bdfed8 [ 209.569100][ T6304] device syzkaller0 entered promiscuous mode [ 210.117024][ T6332] device pim6reg1 entered promiscuous mode [ 210.153635][ T6331] device wg2 left promiscuous mode [ 210.241436][ T6337] device wg2 left promiscuous mode [ 210.281886][ T6334] device wg2 entered promiscuous mode [ 210.353866][ T6337] device wg2 entered promiscuous mode [ 210.986378][ T6356] device syzkaller0 entered promiscuous mode [ 211.310067][ T6382] device wg2 left promiscuous mode [ 211.553552][ T6389] FAULT_INJECTION: forcing a failure. [ 211.553552][ T6389] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 211.566676][ T6389] CPU: 1 PID: 6389 Comm: syz.2.1807 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 211.577950][ T6389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 211.588011][ T6389] Call Trace: [ 211.591310][ T6389] __dump_stack+0x21/0x24 [ 211.595643][ T6389] dump_stack_lvl+0x169/0x1d8 [ 211.600318][ T6389] ? thaw_kernel_threads+0x220/0x220 [ 211.605611][ T6389] ? show_regs_print_info+0x18/0x18 [ 211.610808][ T6389] dump_stack+0x15/0x1c [ 211.614963][ T6389] should_fail+0x3c1/0x510 [ 211.619379][ T6389] should_fail_usercopy+0x1a/0x20 [ 211.624407][ T6389] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 211.630466][ T6389] generic_perform_write+0x326/0x510 [ 211.635746][ T6389] ? grab_cache_page_write_begin+0xb0/0xb0 [ 211.641541][ T6389] ? file_remove_privs+0x580/0x580 [ 211.646637][ T6389] ? __fsnotify_parent+0x5f5/0x6c0 [ 211.651735][ T6389] ? __kasan_check_write+0x14/0x20 [ 211.656830][ T6389] ? down_write+0xac/0x110 [ 211.661231][ T6389] __generic_file_write_iter+0x24b/0x480 [ 211.666847][ T6389] ? generic_write_checks+0x3d4/0x480 [ 211.672207][ T6389] generic_file_write_iter+0xa9/0x1d0 [ 211.677564][ T6389] vfs_write+0x725/0xd60 [ 211.681789][ T6389] ? __kasan_slab_free+0x11/0x20 [ 211.686729][ T6389] ? kernel_write+0x3c0/0x3c0 [ 211.691403][ T6389] ? mutex_trylock+0xa0/0xa0 [ 211.695981][ T6389] ? __fget_files+0x2c4/0x320 [ 211.700642][ T6389] ? __fdget_pos+0x2d2/0x380 [ 211.705214][ T6389] ? ksys_write+0x71/0x240 [ 211.709618][ T6389] ksys_write+0x140/0x240 [ 211.713933][ T6389] ? __ia32_sys_read+0x90/0x90 [ 211.718682][ T6389] ? fpu__clear_all+0x20/0x20 [ 211.723346][ T6389] __x64_sys_write+0x7b/0x90 [ 211.727922][ T6389] do_syscall_64+0x31/0x40 [ 211.732325][ T6389] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 211.738203][ T6389] RIP: 0033:0x7f317aeba929 [ 211.742610][ T6389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.762298][ T6389] RSP: 002b:00007f3179523038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 211.770702][ T6389] RAX: ffffffffffffffda RBX: 00007f317b0e1fa0 RCX: 00007f317aeba929 [ 211.778660][ T6389] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 211.786623][ T6389] RBP: 00007f3179523090 R08: 0000000000000000 R09: 0000000000000000 [ 211.794587][ T6389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 211.802555][ T6389] R13: 0000000000000000 R14: 00007f317b0e1fa0 R15: 00007fffe4b48188 [ 212.519438][ T6421] device syzkaller0 entered promiscuous mode [ 212.846128][ T6424] device wg2 left promiscuous mode [ 213.181589][ T6444] FAULT_INJECTION: forcing a failure. [ 213.181589][ T6444] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 213.195172][ T6444] CPU: 1 PID: 6444 Comm: syz.2.1824 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 213.206459][ T6444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 213.216526][ T6444] Call Trace: [ 213.219835][ T6444] __dump_stack+0x21/0x24 [ 213.224171][ T6444] dump_stack_lvl+0x169/0x1d8 [ 213.229040][ T6444] ? thaw_kernel_threads+0x220/0x220 [ 213.234328][ T6444] ? show_regs_print_info+0x18/0x18 [ 213.239621][ T6444] dump_stack+0x15/0x1c [ 213.244302][ T6444] should_fail+0x3c1/0x510 [ 213.248721][ T6444] should_fail_usercopy+0x1a/0x20 [ 213.253747][ T6444] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 213.259822][ T6444] generic_perform_write+0x326/0x510 [ 213.265208][ T6444] ? grab_cache_page_write_begin+0xb0/0xb0 [ 213.271022][ T6444] ? file_remove_privs+0x580/0x580 [ 213.276244][ T6444] ? irq_exit_rcu+0x9/0x10 [ 213.280671][ T6444] ? __kasan_check_write+0x14/0x20 [ 213.285783][ T6444] ? down_write+0xac/0x110 [ 213.290215][ T6444] __generic_file_write_iter+0x24b/0x480 [ 213.295854][ T6444] ? generic_write_checks+0x3d4/0x480 [ 213.301234][ T6444] generic_file_write_iter+0xa9/0x1d0 [ 213.306687][ T6444] vfs_write+0x725/0xd60 [ 213.310932][ T6444] ? kernel_write+0x3c0/0x3c0 [ 213.315618][ T6444] ? bpf_send_signal_common+0x2b2/0x420 [ 213.321172][ T6444] ? mutex_trylock+0xa0/0xa0 [ 213.325763][ T6444] ? __fget_files+0x2c4/0x320 [ 213.330442][ T6444] ? __fdget_pos+0x2d2/0x380 [ 213.335037][ T6444] ? ksys_write+0x71/0x240 [ 213.339458][ T6444] ksys_write+0x140/0x240 [ 213.343787][ T6444] ? __ia32_sys_read+0x90/0x90 [ 213.348558][ T6444] __x64_sys_write+0x7b/0x90 [ 213.353151][ T6444] do_syscall_64+0x31/0x40 [ 213.357571][ T6444] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 213.363466][ T6444] RIP: 0033:0x7f317aeba929 [ 213.367919][ T6444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.387529][ T6444] RSP: 002b:00007f3179523038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 213.395947][ T6444] RAX: ffffffffffffffda RBX: 00007f317b0e1fa0 RCX: 00007f317aeba929 [ 213.403922][ T6444] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 213.411899][ T6444] RBP: 00007f3179523090 R08: 0000000000000000 R09: 0000000000000000 [ 213.419869][ T6444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.427842][ T6444] R13: 0000000000000000 R14: 00007f317b0e1fa0 R15: 00007fffe4b48188 [ 213.785788][ T6458] device pim6reg1 entered promiscuous mode [ 213.980858][ T6461] device sit0 left promiscuous mode [ 214.676781][ T6493] FAULT_INJECTION: forcing a failure. [ 214.676781][ T6493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.689954][ T6493] CPU: 0 PID: 6493 Comm: syz.1.1839 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 214.701343][ T6493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 214.711412][ T6493] Call Trace: [ 214.714719][ T6493] __dump_stack+0x21/0x24 [ 214.719056][ T6493] dump_stack_lvl+0x169/0x1d8 [ 214.723830][ T6493] ? thaw_kernel_threads+0x220/0x220 [ 214.729123][ T6493] ? show_regs_print_info+0x18/0x18 [ 214.734332][ T6493] dump_stack+0x15/0x1c [ 214.738501][ T6493] should_fail+0x3c1/0x510 [ 214.742923][ T6493] should_fail_usercopy+0x1a/0x20 [ 214.747942][ T6493] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 214.754002][ T6493] generic_perform_write+0x326/0x510 [ 214.759284][ T6493] ? atime_needs_update+0x5b0/0x5b0 [ 214.764485][ T6493] ? grab_cache_page_write_begin+0xb0/0xb0 [ 214.770290][ T6493] ? file_remove_privs+0x580/0x580 [ 214.775400][ T6493] ? __fsnotify_parent+0x5f5/0x6c0 [ 214.780508][ T6493] ? __kasan_check_write+0x14/0x20 [ 214.785611][ T6493] ? down_write+0xac/0x110 [ 214.790019][ T6493] __generic_file_write_iter+0x24b/0x480 [ 214.795646][ T6493] ? generic_write_checks+0x3d4/0x480 [ 214.801032][ T6493] generic_file_write_iter+0xa9/0x1d0 [ 214.806408][ T6493] vfs_write+0x725/0xd60 [ 214.810638][ T6493] ? __kasan_slab_free+0x11/0x20 [ 214.815581][ T6493] ? kernel_write+0x3c0/0x3c0 [ 214.820251][ T6493] ? mutex_trylock+0xa0/0xa0 [ 214.824836][ T6493] ? __fget_files+0x2c4/0x320 [ 214.829501][ T6493] ? __fdget_pos+0x2d2/0x380 [ 214.834078][ T6493] ? ksys_write+0x71/0x240 [ 214.838490][ T6493] ksys_write+0x140/0x240 [ 214.842805][ T6493] ? __ia32_sys_read+0x90/0x90 [ 214.847559][ T6493] ? fpu__clear_all+0x20/0x20 [ 214.852229][ T6493] __x64_sys_write+0x7b/0x90 [ 214.856813][ T6493] do_syscall_64+0x31/0x40 [ 214.861216][ T6493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 214.867097][ T6493] RIP: 0033:0x7f0522f04929 [ 214.871513][ T6493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.891205][ T6493] RSP: 002b:00007f052156d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 214.899611][ T6493] RAX: ffffffffffffffda RBX: 00007f052312bfa0 RCX: 00007f0522f04929 [ 214.907573][ T6493] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 214.915540][ T6493] RBP: 00007f052156d090 R08: 0000000000000000 R09: 0000000000000000 [ 214.923505][ T6493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 214.931466][ T6493] R13: 0000000000000000 R14: 00007f052312bfa0 R15: 00007ffd51f4e1a8 [ 215.193122][ T6505] device syzkaller0 entered promiscuous mode [ 215.604321][ T6555] FAULT_INJECTION: forcing a failure. [ 215.604321][ T6555] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.617524][ T6555] CPU: 1 PID: 6555 Comm: syz.3.1859 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 215.628796][ T6555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 215.638854][ T6555] Call Trace: [ 215.642271][ T6555] __dump_stack+0x21/0x24 [ 215.646594][ T6555] dump_stack_lvl+0x169/0x1d8 [ 215.651279][ T6555] ? thaw_kernel_threads+0x220/0x220 [ 215.656554][ T6555] ? show_regs_print_info+0x18/0x18 [ 215.661745][ T6555] dump_stack+0x15/0x1c [ 215.665893][ T6555] should_fail+0x3c1/0x510 [ 215.670297][ T6555] should_fail_usercopy+0x1a/0x20 [ 215.675311][ T6555] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 215.681365][ T6555] generic_perform_write+0x326/0x510 [ 215.686672][ T6555] ? grab_cache_page_write_begin+0xb0/0xb0 [ 215.692473][ T6555] ? file_remove_privs+0x580/0x580 [ 215.697581][ T6555] ? __fsnotify_parent+0x5f5/0x6c0 [ 215.702693][ T6555] ? __kasan_check_write+0x14/0x20 [ 215.707790][ T6555] ? down_write+0xac/0x110 [ 215.712193][ T6555] __generic_file_write_iter+0x24b/0x480 [ 215.717903][ T6555] ? generic_write_checks+0x3d4/0x480 [ 215.723262][ T6555] generic_file_write_iter+0xa9/0x1d0 [ 215.728650][ T6555] vfs_write+0x725/0xd60 [ 215.732881][ T6555] ? __kasan_slab_free+0x11/0x20 [ 215.737805][ T6555] ? kernel_write+0x3c0/0x3c0 [ 215.742466][ T6555] ? mutex_trylock+0xa0/0xa0 [ 215.747044][ T6555] ? __fget_files+0x2c4/0x320 [ 215.751707][ T6555] ? __fdget_pos+0x2d2/0x380 [ 215.756285][ T6555] ? ksys_write+0x71/0x240 [ 215.760691][ T6555] ksys_write+0x140/0x240 [ 215.765007][ T6555] ? __ia32_sys_read+0x90/0x90 [ 215.769762][ T6555] ? fpu__clear_all+0x20/0x20 [ 215.774441][ T6555] __x64_sys_write+0x7b/0x90 [ 215.779111][ T6555] do_syscall_64+0x31/0x40 [ 215.783516][ T6555] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 215.789395][ T6555] RIP: 0033:0x7f173103f929 [ 215.793804][ T6555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.813395][ T6555] RSP: 002b:00007f172f6a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 215.821796][ T6555] RAX: ffffffffffffffda RBX: 00007f1731266fa0 RCX: 00007f173103f929 [ 215.829758][ T6555] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 215.837803][ T6555] RBP: 00007f172f6a8090 R08: 0000000000000000 R09: 0000000000000000 [ 215.845763][ T6555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 215.853721][ T6555] R13: 0000000000000000 R14: 00007f1731266fa0 R15: 00007ffc54bdfed8 [ 216.096807][ T6570] device wg2 left promiscuous mode [ 216.205611][ T6571] device syzkaller0 entered promiscuous mode [ 216.996864][ T6608] device wg2 left promiscuous mode [ 217.626664][ T6626] device syzkaller0 entered promiscuous mode [ 218.163413][ T6629] device syzkaller0 entered promiscuous mode [ 218.492751][ T6648] device wg2 entered promiscuous mode [ 219.559513][ T6690] device wg2 entered promiscuous mode [ 220.775801][ T6725] FAULT_INJECTION: forcing a failure. [ 220.775801][ T6725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 220.788926][ T6725] CPU: 0 PID: 6725 Comm: syz.2.1914 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 220.800209][ T6725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 220.810269][ T6725] Call Trace: [ 220.813568][ T6725] __dump_stack+0x21/0x24 [ 220.817908][ T6725] dump_stack_lvl+0x169/0x1d8 [ 220.822597][ T6725] ? thaw_kernel_threads+0x220/0x220 [ 220.827890][ T6725] ? show_regs_print_info+0x18/0x18 [ 220.833099][ T6725] dump_stack+0x15/0x1c [ 220.837259][ T6725] should_fail+0x3c1/0x510 [ 220.841677][ T6725] should_fail_usercopy+0x1a/0x20 [ 220.846693][ T6725] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 220.852749][ T6725] generic_perform_write+0x326/0x510 [ 220.858025][ T6725] ? grab_cache_page_write_begin+0xb0/0xb0 [ 220.863818][ T6725] ? file_remove_privs+0x580/0x580 [ 220.868917][ T6725] ? __fsnotify_parent+0x5f5/0x6c0 [ 220.874018][ T6725] ? __kasan_check_write+0x14/0x20 [ 220.879120][ T6725] ? down_write+0xac/0x110 [ 220.883531][ T6725] __generic_file_write_iter+0x24b/0x480 [ 220.889148][ T6725] ? generic_write_checks+0x3d4/0x480 [ 220.894506][ T6725] generic_file_write_iter+0xa9/0x1d0 [ 220.899868][ T6725] vfs_write+0x725/0xd60 [ 220.904100][ T6725] ? kernel_write+0x3c0/0x3c0 [ 220.908762][ T6725] ? mutex_trylock+0xa0/0xa0 [ 220.913336][ T6725] ? __fget_files+0x2c4/0x320 [ 220.918003][ T6725] ? __fdget_pos+0x2d2/0x380 [ 220.922579][ T6725] ? ksys_write+0x71/0x240 [ 220.926983][ T6725] ksys_write+0x140/0x240 [ 220.931298][ T6725] ? __ia32_sys_read+0x90/0x90 [ 220.936085][ T6725] ? fpu__clear_all+0x20/0x20 [ 220.940753][ T6725] __x64_sys_write+0x7b/0x90 [ 220.945333][ T6725] do_syscall_64+0x31/0x40 [ 220.949737][ T6725] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 220.955627][ T6725] RIP: 0033:0x7f317aeba929 [ 220.960031][ T6725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.979624][ T6725] RSP: 002b:00007f3179523038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 220.988036][ T6725] RAX: ffffffffffffffda RBX: 00007f317b0e1fa0 RCX: 00007f317aeba929 [ 220.996006][ T6725] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 221.003976][ T6725] RBP: 00007f3179523090 R08: 0000000000000000 R09: 0000000000000000 [ 221.011947][ T6725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 221.019911][ T6725] R13: 0000000000000000 R14: 00007f317b0e1fa0 R15: 00007fffe4b48188 [ 221.366370][ T6729] device pim6reg1 entered promiscuous mode [ 221.446021][ T6737] device wg2 entered promiscuous mode [ 221.828608][ T6751] device pim6reg1 entered promiscuous mode [ 222.206162][ T6769] device wg2 entered promiscuous mode [ 222.413597][ T6785] FAULT_INJECTION: forcing a failure. [ 222.413597][ T6785] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 222.426702][ T6785] CPU: 0 PID: 6785 Comm: syz.0.1933 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 222.437980][ T6785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 222.448038][ T6785] Call Trace: [ 222.451345][ T6785] __dump_stack+0x21/0x24 [ 222.455683][ T6785] dump_stack_lvl+0x169/0x1d8 [ 222.460363][ T6785] ? thaw_kernel_threads+0x220/0x220 [ 222.465643][ T6785] ? show_regs_print_info+0x18/0x18 [ 222.470838][ T6785] dump_stack+0x15/0x1c [ 222.474992][ T6785] should_fail+0x3c1/0x510 [ 222.479410][ T6785] should_fail_usercopy+0x1a/0x20 [ 222.484432][ T6785] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 222.490498][ T6785] generic_perform_write+0x326/0x510 [ 222.495784][ T6785] ? grab_cache_page_write_begin+0xb0/0xb0 [ 222.501593][ T6785] ? file_remove_privs+0x580/0x580 [ 222.506705][ T6785] ? __fsnotify_parent+0x5f5/0x6c0 [ 222.511813][ T6785] ? __kasan_check_write+0x14/0x20 [ 222.516923][ T6785] ? down_write+0xac/0x110 [ 222.521358][ T6785] __generic_file_write_iter+0x24b/0x480 [ 222.526997][ T6785] ? generic_write_checks+0x3d4/0x480 [ 222.532378][ T6785] generic_file_write_iter+0xa9/0x1d0 [ 222.537757][ T6785] vfs_write+0x725/0xd60 [ 222.542122][ T6785] ? kernel_write+0x3c0/0x3c0 [ 222.546801][ T6785] ? mutex_trylock+0xa0/0xa0 [ 222.551397][ T6785] ? __fget_files+0x2c4/0x320 [ 222.556069][ T6785] ? __fdget_pos+0x2d2/0x380 [ 222.560656][ T6785] ? ksys_write+0x71/0x240 [ 222.565071][ T6785] ksys_write+0x140/0x240 [ 222.569417][ T6785] ? __ia32_sys_read+0x90/0x90 [ 222.574178][ T6785] ? fpu__clear_all+0x20/0x20 [ 222.578852][ T6785] __x64_sys_write+0x7b/0x90 [ 222.583448][ T6785] do_syscall_64+0x31/0x40 [ 222.587950][ T6785] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 222.593838][ T6785] RIP: 0033:0x7f439948e929 [ 222.598249][ T6785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 222.617860][ T6785] RSP: 002b:00007f4397af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 222.626267][ T6785] RAX: ffffffffffffffda RBX: 00007f43996b5fa0 RCX: 00007f439948e929 [ 222.634255][ T6785] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 222.642334][ T6785] RBP: 00007f4397af7090 R08: 0000000000000000 R09: 0000000000000000 [ 222.650308][ T6785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 222.658280][ T6785] R13: 0000000000000000 R14: 00007f43996b5fa0 R15: 00007ffe1fc185f8 [ 222.837619][ T6794] device pim6reg1 entered promiscuous mode [ 223.736610][ T6841] FAULT_INJECTION: forcing a failure. [ 223.736610][ T6841] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.749762][ T6841] CPU: 0 PID: 6841 Comm: syz.4.1952 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 223.761045][ T6841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 223.771097][ T6841] Call Trace: [ 223.774400][ T6841] __dump_stack+0x21/0x24 [ 223.778731][ T6841] dump_stack_lvl+0x169/0x1d8 [ 223.783406][ T6841] ? thaw_kernel_threads+0x220/0x220 [ 223.788695][ T6841] ? show_regs_print_info+0x18/0x18 [ 223.793899][ T6841] dump_stack+0x15/0x1c [ 223.798053][ T6841] should_fail+0x3c1/0x510 [ 223.802654][ T6841] should_fail_usercopy+0x1a/0x20 [ 223.807683][ T6841] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 223.813754][ T6841] generic_perform_write+0x326/0x510 [ 223.819042][ T6841] ? grab_cache_page_write_begin+0xb0/0xb0 [ 223.824849][ T6841] ? file_remove_privs+0x580/0x580 [ 223.829956][ T6841] ? __fsnotify_parent+0x5f5/0x6c0 [ 223.835072][ T6841] ? __kasan_check_write+0x14/0x20 [ 223.840268][ T6841] ? down_write+0xac/0x110 [ 223.844694][ T6841] __generic_file_write_iter+0x24b/0x480 [ 223.850324][ T6841] ? generic_write_checks+0x3d4/0x480 [ 223.855699][ T6841] generic_file_write_iter+0xa9/0x1d0 [ 223.861069][ T6841] vfs_write+0x725/0xd60 [ 223.865313][ T6841] ? __bpf_trace_kmem_free+0x6f/0x90 [ 223.870600][ T6841] ? kernel_write+0x3c0/0x3c0 [ 223.875289][ T6841] ? mutex_trylock+0xa0/0xa0 [ 223.879873][ T6841] ? __fget_files+0x2c4/0x320 [ 223.884559][ T6841] ? __fdget_pos+0x2d2/0x380 [ 223.889147][ T6841] ? ksys_write+0x71/0x240 [ 223.893563][ T6841] ksys_write+0x140/0x240 [ 223.897895][ T6841] ? __ia32_sys_read+0x90/0x90 [ 223.902658][ T6841] ? fpu__clear_all+0x20/0x20 [ 223.907333][ T6841] __x64_sys_write+0x7b/0x90 [ 223.911926][ T6841] do_syscall_64+0x31/0x40 [ 223.916352][ T6841] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 223.922234][ T6841] RIP: 0033:0x7f6408341929 [ 223.926636][ T6841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.946233][ T6841] RSP: 002b:00007f64069aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 223.954638][ T6841] RAX: ffffffffffffffda RBX: 00007f6408568fa0 RCX: 00007f6408341929 [ 223.962615][ T6841] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 223.970576][ T6841] RBP: 00007f64069aa090 R08: 0000000000000000 R09: 0000000000000000 [ 223.978536][ T6841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 223.986497][ T6841] R13: 0000000000000000 R14: 00007f6408568fa0 R15: 00007ffd24ddf898 [ 224.224654][ T6860] device pim6reg1 left promiscuous mode [ 224.951758][ T6884] FAULT_INJECTION: forcing a failure. [ 224.951758][ T6884] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.964982][ T6884] CPU: 0 PID: 6884 Comm: syz.1.1966 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 224.976274][ T6884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 224.986415][ T6884] Call Trace: [ 224.989704][ T6884] __dump_stack+0x21/0x24 [ 224.994022][ T6884] dump_stack_lvl+0x169/0x1d8 [ 224.998688][ T6884] ? thaw_kernel_threads+0x220/0x220 [ 225.003962][ T6884] ? show_regs_print_info+0x18/0x18 [ 225.009411][ T6884] dump_stack+0x15/0x1c [ 225.013569][ T6884] should_fail+0x3c1/0x510 [ 225.017971][ T6884] should_fail_usercopy+0x1a/0x20 [ 225.022985][ T6884] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 225.029129][ T6884] generic_perform_write+0x326/0x510 [ 225.034404][ T6884] ? atime_needs_update+0x5b0/0x5b0 [ 225.039737][ T6884] ? grab_cache_page_write_begin+0xb0/0xb0 [ 225.045554][ T6884] ? file_remove_privs+0x580/0x580 [ 225.050661][ T6884] ? __fsnotify_parent+0x5f5/0x6c0 [ 225.055763][ T6884] ? __kasan_check_write+0x14/0x20 [ 225.060865][ T6884] ? down_write+0xac/0x110 [ 225.065276][ T6884] __generic_file_write_iter+0x24b/0x480 [ 225.070900][ T6884] ? generic_write_checks+0x3d4/0x480 [ 225.076259][ T6884] generic_file_write_iter+0xa9/0x1d0 [ 225.081618][ T6884] vfs_write+0x725/0xd60 [ 225.085848][ T6884] ? kernel_write+0x3c0/0x3c0 [ 225.090509][ T6884] ? mutex_trylock+0xa0/0xa0 [ 225.095086][ T6884] ? __fget_files+0x2c4/0x320 [ 225.099751][ T6884] ? __fdget_pos+0x2d2/0x380 [ 225.104501][ T6884] ? ksys_write+0x71/0x240 [ 225.108904][ T6884] ksys_write+0x140/0x240 [ 225.113217][ T6884] ? __ia32_sys_read+0x90/0x90 [ 225.117968][ T6884] ? fpu__clear_all+0x20/0x20 [ 225.122630][ T6884] __x64_sys_write+0x7b/0x90 [ 225.127209][ T6884] do_syscall_64+0x31/0x40 [ 225.131611][ T6884] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 225.137492][ T6884] RIP: 0033:0x7f0522f04929 [ 225.141899][ T6884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.161489][ T6884] RSP: 002b:00007f052156d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 225.169898][ T6884] RAX: ffffffffffffffda RBX: 00007f052312bfa0 RCX: 00007f0522f04929 [ 225.177858][ T6884] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 225.185817][ T6884] RBP: 00007f052156d090 R08: 0000000000000000 R09: 0000000000000000 [ 225.193779][ T6884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 225.201736][ T6884] R13: 0000000000000000 R14: 00007f052312bfa0 R15: 00007ffd51f4e1a8 [ 226.167986][ T24] audit: type=1400 audit(1749217975.820:155): avc: denied { attach_queue } for pid=6900 comm="syz.4.1973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 226.454391][ T6928] FAULT_INJECTION: forcing a failure. [ 226.454391][ T6928] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.467529][ T6928] CPU: 1 PID: 6928 Comm: syz.2.1980 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 226.478826][ T6928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 226.488890][ T6928] Call Trace: [ 226.492204][ T6928] __dump_stack+0x21/0x24 [ 226.496550][ T6928] dump_stack_lvl+0x169/0x1d8 [ 226.501244][ T6928] ? thaw_kernel_threads+0x220/0x220 [ 226.506625][ T6928] ? show_regs_print_info+0x18/0x18 [ 226.511836][ T6928] ? do_user_addr_fault+0xa18/0xc80 [ 226.517052][ T6928] dump_stack+0x15/0x1c [ 226.521219][ T6928] should_fail+0x3c1/0x510 [ 226.525649][ T6928] should_fail_usercopy+0x1a/0x20 [ 226.530679][ T6928] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 226.536750][ T6928] generic_perform_write+0x326/0x510 [ 226.542042][ T6928] ? grab_cache_page_write_begin+0xb0/0xb0 [ 226.547850][ T6928] ? file_remove_privs+0x580/0x580 [ 226.552964][ T6928] ? irq_exit_rcu+0x9/0x10 [ 226.557385][ T6928] ? __kasan_check_write+0x14/0x20 [ 226.562507][ T6928] ? down_write+0xac/0x110 [ 226.566925][ T6928] __generic_file_write_iter+0x24b/0x480 [ 226.572559][ T6928] ? generic_write_checks+0x3d4/0x480 [ 226.577932][ T6928] generic_file_write_iter+0xa9/0x1d0 [ 226.583310][ T6928] vfs_write+0x725/0xd60 [ 226.587557][ T6928] ? kernel_write+0x3c0/0x3c0 [ 226.592235][ T6928] ? bpf_send_signal_common+0x2b2/0x420 [ 226.597783][ T6928] ? mutex_trylock+0xa0/0xa0 [ 226.602379][ T6928] ? __fget_files+0x2c4/0x320 [ 226.607059][ T6928] ? __fdget_pos+0x2d2/0x380 [ 226.611648][ T6928] ? ksys_write+0x71/0x240 [ 226.616066][ T6928] ksys_write+0x140/0x240 [ 226.620398][ T6928] ? __ia32_sys_read+0x90/0x90 [ 226.625165][ T6928] __x64_sys_write+0x7b/0x90 [ 226.629756][ T6928] do_syscall_64+0x31/0x40 [ 226.634174][ T6928] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 226.640222][ T6928] RIP: 0033:0x7f317aeba929 [ 226.644646][ T6928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.664260][ T6928] RSP: 002b:00007f3179523038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 226.672683][ T6928] RAX: ffffffffffffffda RBX: 00007f317b0e1fa0 RCX: 00007f317aeba929 [ 226.680669][ T6928] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 226.688647][ T6928] RBP: 00007f3179523090 R08: 0000000000000000 R09: 0000000000000000 [ 226.696639][ T6928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 226.704619][ T6928] R13: 0000000000000000 R14: 00007f317b0e1fa0 R15: 00007fffe4b48188 [ 226.973504][ T6936] syz.3.1983[6936] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.973560][ T6936] syz.3.1983[6936] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.949443][ T6988] device sit0 left promiscuous mode [ 228.061711][ T6985] device sit0 entered promiscuous mode [ 228.193211][ T7020] device syzkaller0 left promiscuous mode [ 228.385802][ T7027] device wg2 left promiscuous mode [ 228.429606][ T7028] device syzkaller0 entered promiscuous mode [ 228.474053][ T7030] device wg2 entered promiscuous mode [ 229.423818][ T7071] FAULT_INJECTION: forcing a failure. [ 229.423818][ T7071] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 229.436998][ T7071] CPU: 0 PID: 7071 Comm: syz.3.2026 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 229.448404][ T7071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 229.458467][ T7071] Call Trace: [ 229.461767][ T7071] __dump_stack+0x21/0x24 [ 229.466102][ T7071] dump_stack_lvl+0x169/0x1d8 [ 229.470932][ T7071] ? thaw_kernel_threads+0x220/0x220 [ 229.476218][ T7071] ? show_regs_print_info+0x18/0x18 [ 229.481427][ T7071] dump_stack+0x15/0x1c [ 229.485592][ T7071] should_fail+0x3c1/0x510 [ 229.490020][ T7071] should_fail_usercopy+0x1a/0x20 [ 229.495049][ T7071] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 229.501144][ T7071] generic_perform_write+0x326/0x510 [ 229.506916][ T7071] ? grab_cache_page_write_begin+0xb0/0xb0 [ 229.512728][ T7071] ? file_remove_privs+0x580/0x580 [ 229.517842][ T7071] ? __fsnotify_parent+0x5f5/0x6c0 [ 229.522963][ T7071] ? __kasan_check_write+0x14/0x20 [ 229.528078][ T7071] ? down_write+0xac/0x110 [ 229.532503][ T7071] __generic_file_write_iter+0x24b/0x480 [ 229.538183][ T7071] ? generic_write_checks+0x3d4/0x480 [ 229.543576][ T7071] generic_file_write_iter+0xa9/0x1d0 [ 229.549042][ T7071] vfs_write+0x725/0xd60 [ 229.553294][ T7071] ? __kasan_slab_free+0x11/0x20 [ 229.558236][ T7071] ? kernel_write+0x3c0/0x3c0 [ 229.562921][ T7071] ? mutex_trylock+0xa0/0xa0 [ 229.567513][ T7071] ? __fget_files+0x2c4/0x320 [ 229.572203][ T7071] ? __fdget_pos+0x2d2/0x380 [ 229.576837][ T7071] ? ksys_write+0x71/0x240 [ 229.581430][ T7071] ksys_write+0x140/0x240 [ 229.585762][ T7071] ? __ia32_sys_read+0x90/0x90 [ 229.590536][ T7071] ? fpu__clear_all+0x20/0x20 [ 229.595214][ T7071] __x64_sys_write+0x7b/0x90 [ 229.599809][ T7071] do_syscall_64+0x31/0x40 [ 229.604230][ T7071] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 229.610132][ T7071] RIP: 0033:0x7f173103f929 [ 229.614542][ T7071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 229.634223][ T7071] RSP: 002b:00007f172f687038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 229.642623][ T7071] RAX: ffffffffffffffda RBX: 00007f1731267080 RCX: 00007f173103f929 [ 229.650586][ T7071] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 229.658546][ T7071] RBP: 00007f172f687090 R08: 0000000000000000 R09: 0000000000000000 [ 229.666506][ T7071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 229.674593][ T7071] R13: 0000000000000000 R14: 00007f1731267080 R15: 00007ffc54bdfed8 [ 229.874011][ T7074] device syzkaller0 entered promiscuous mode [ 230.328478][ T7109] FAULT_INJECTION: forcing a failure. [ 230.328478][ T7109] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 230.341608][ T7109] CPU: 0 PID: 7109 Comm: syz.1.2041 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 230.352893][ T7109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 230.362952][ T7109] Call Trace: [ 230.366251][ T7109] __dump_stack+0x21/0x24 [ 230.370584][ T7109] dump_stack_lvl+0x169/0x1d8 [ 230.375266][ T7109] ? thaw_kernel_threads+0x220/0x220 [ 230.380552][ T7109] ? show_regs_print_info+0x18/0x18 [ 230.385748][ T7109] dump_stack+0x15/0x1c [ 230.389917][ T7109] should_fail+0x3c1/0x510 [ 230.394350][ T7109] should_fail_usercopy+0x1a/0x20 [ 230.399388][ T7109] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 230.405468][ T7109] generic_perform_write+0x326/0x510 [ 230.410757][ T7109] ? grab_cache_page_write_begin+0xb0/0xb0 [ 230.416565][ T7109] ? file_remove_privs+0x580/0x580 [ 230.421762][ T7109] ? __fsnotify_parent+0x5f5/0x6c0 [ 230.426874][ T7109] ? __kasan_check_write+0x14/0x20 [ 230.431980][ T7109] ? down_write+0xac/0x110 [ 230.436392][ T7109] __generic_file_write_iter+0x24b/0x480 [ 230.442018][ T7109] ? generic_write_checks+0x3d4/0x480 [ 230.447392][ T7109] generic_file_write_iter+0xa9/0x1d0 [ 230.452980][ T7109] vfs_write+0x725/0xd60 [ 230.457270][ T7109] ? __kasan_slab_free+0x11/0x20 [ 230.462221][ T7109] ? kernel_write+0x3c0/0x3c0 [ 230.466911][ T7109] ? mutex_trylock+0xa0/0xa0 [ 230.471510][ T7109] ? __fget_files+0x2c4/0x320 [ 230.476188][ T7109] ? __fdget_pos+0x2d2/0x380 [ 230.480777][ T7109] ? ksys_write+0x71/0x240 [ 230.485201][ T7109] ksys_write+0x140/0x240 [ 230.489527][ T7109] ? __ia32_sys_read+0x90/0x90 [ 230.494291][ T7109] ? fpu__clear_all+0x20/0x20 [ 230.498968][ T7109] __x64_sys_write+0x7b/0x90 [ 230.503557][ T7109] do_syscall_64+0x31/0x40 [ 230.507985][ T7109] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 230.513882][ T7109] RIP: 0033:0x7f0522f04929 [ 230.518480][ T7109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.538182][ T7109] RSP: 002b:00007f052156d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 230.546598][ T7109] RAX: ffffffffffffffda RBX: 00007f052312bfa0 RCX: 00007f0522f04929 [ 230.554567][ T7109] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 230.562536][ T7109] RBP: 00007f052156d090 R08: 0000000000000000 R09: 0000000000000000 [ 230.570595][ T7109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 230.578560][ T7109] R13: 0000000000000000 R14: 00007f052312bfa0 R15: 00007ffd51f4e1a8 [ 230.714937][ T7105] €Â0: renamed from pim6reg1 [ 231.090187][ T7131] device pim6reg1 entered promiscuous mode [ 231.142605][ T7142] FAULT_INJECTION: forcing a failure. [ 231.142605][ T7142] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 231.155725][ T7142] CPU: 1 PID: 7142 Comm: syz.4.2052 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 231.166998][ T7142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 231.177050][ T7142] Call Trace: [ 231.180349][ T7142] __dump_stack+0x21/0x24 [ 231.184704][ T7142] dump_stack_lvl+0x169/0x1d8 [ 231.189467][ T7142] ? thaw_kernel_threads+0x220/0x220 [ 231.194751][ T7142] ? show_regs_print_info+0x18/0x18 [ 231.199947][ T7142] dump_stack+0x15/0x1c [ 231.204105][ T7142] should_fail+0x3c1/0x510 [ 231.208531][ T7142] should_fail_usercopy+0x1a/0x20 [ 231.213555][ T7142] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 231.219630][ T7142] generic_perform_write+0x326/0x510 [ 231.224913][ T7142] ? atime_needs_update+0x5b0/0x5b0 [ 231.230204][ T7142] ? grab_cache_page_write_begin+0xb0/0xb0 [ 231.236006][ T7142] ? file_remove_privs+0x580/0x580 [ 231.241114][ T7142] ? __fsnotify_parent+0x5f5/0x6c0 [ 231.246225][ T7142] ? __kasan_check_write+0x14/0x20 [ 231.251345][ T7142] ? down_write+0xac/0x110 [ 231.255770][ T7142] __generic_file_write_iter+0x24b/0x480 [ 231.261410][ T7142] ? generic_write_checks+0x3d4/0x480 [ 231.266787][ T7142] generic_file_write_iter+0xa9/0x1d0 [ 231.272165][ T7142] vfs_write+0x725/0xd60 [ 231.276417][ T7142] ? __kasan_slab_free+0x11/0x20 [ 231.281362][ T7142] ? kernel_write+0x3c0/0x3c0 [ 231.286044][ T7142] ? mutex_trylock+0xa0/0xa0 [ 231.290633][ T7142] ? __fget_files+0x2c4/0x320 [ 231.295303][ T7142] ? __fdget_pos+0x2d2/0x380 [ 231.299959][ T7142] ? ksys_write+0x71/0x240 [ 231.304359][ T7142] ksys_write+0x140/0x240 [ 231.308669][ T7142] ? __ia32_sys_read+0x90/0x90 [ 231.313434][ T7142] ? fpu__clear_all+0x20/0x20 [ 231.318119][ T7142] __x64_sys_write+0x7b/0x90 [ 231.322695][ T7142] do_syscall_64+0x31/0x40 [ 231.327094][ T7142] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 231.332968][ T7142] RIP: 0033:0x7f6408341929 [ 231.337369][ T7142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 231.356957][ T7142] RSP: 002b:00007f64069aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 231.365363][ T7142] RAX: ffffffffffffffda RBX: 00007f6408568fa0 RCX: 00007f6408341929 [ 231.373334][ T7142] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 231.381297][ T7142] RBP: 00007f64069aa090 R08: 0000000000000000 R09: 0000000000000000 [ 231.389260][ T7142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 231.397225][ T7142] R13: 0000000000000000 R14: 00007f6408568fa0 R15: 00007ffd24ddf898 [ 232.240458][ T7188] device sit0 left promiscuous mode [ 232.417389][ T7191] device sit0 entered promiscuous mode [ 232.546887][ T7199] device syzkaller0 entered promiscuous mode [ 233.088885][ T7215] syz.2.2077[7215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.090608][ T7215] syz.2.2077[7215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.487943][ T7308] device syzkaller0 entered promiscuous mode [ 237.665448][ T7341] FAULT_INJECTION: forcing a failure. [ 237.665448][ T7341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 237.678661][ T7341] CPU: 1 PID: 7341 Comm: syz.0.2121 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 237.689959][ T7341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 237.700004][ T7341] Call Trace: [ 237.703290][ T7341] __dump_stack+0x21/0x24 [ 237.707606][ T7341] dump_stack_lvl+0x169/0x1d8 [ 237.712272][ T7341] ? thaw_kernel_threads+0x220/0x220 [ 237.717546][ T7341] ? show_regs_print_info+0x18/0x18 [ 237.722741][ T7341] dump_stack+0x15/0x1c [ 237.726887][ T7341] should_fail+0x3c1/0x510 [ 237.731294][ T7341] should_fail_usercopy+0x1a/0x20 [ 237.736318][ T7341] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 237.742375][ T7341] generic_perform_write+0x326/0x510 [ 237.747658][ T7341] ? grab_cache_page_write_begin+0xb0/0xb0 [ 237.753457][ T7341] ? file_remove_privs+0x580/0x580 [ 237.758561][ T7341] ? __fsnotify_parent+0x5f5/0x6c0 [ 237.763676][ T7341] ? __kasan_check_write+0x14/0x20 [ 237.768777][ T7341] ? down_write+0xac/0x110 [ 237.773193][ T7341] __generic_file_write_iter+0x24b/0x480 [ 237.778814][ T7341] ? generic_write_checks+0x3d4/0x480 [ 237.784349][ T7341] generic_file_write_iter+0xa9/0x1d0 [ 237.789707][ T7341] vfs_write+0x725/0xd60 [ 237.793937][ T7341] ? __kasan_slab_free+0x11/0x20 [ 237.798860][ T7341] ? kernel_write+0x3c0/0x3c0 [ 237.803528][ T7341] ? mutex_trylock+0xa0/0xa0 [ 237.808119][ T7341] ? __fget_files+0x2c4/0x320 [ 237.812792][ T7341] ? __fdget_pos+0x2d2/0x380 [ 237.817376][ T7341] ? ksys_write+0x71/0x240 [ 237.821785][ T7341] ksys_write+0x140/0x240 [ 237.826109][ T7341] ? __ia32_sys_read+0x90/0x90 [ 237.831091][ T7341] ? fpu__clear_all+0x20/0x20 [ 237.835760][ T7341] __x64_sys_write+0x7b/0x90 [ 237.840338][ T7341] do_syscall_64+0x31/0x40 [ 237.844746][ T7341] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 237.850623][ T7341] RIP: 0033:0x7f439948e929 [ 237.855030][ T7341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 237.874620][ T7341] RSP: 002b:00007f4397af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 237.883026][ T7341] RAX: ffffffffffffffda RBX: 00007f43996b5fa0 RCX: 00007f439948e929 [ 237.890983][ T7341] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 237.898942][ T7341] RBP: 00007f4397af7090 R08: 0000000000000000 R09: 0000000000000000 [ 237.906903][ T7341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 237.914860][ T7341] R13: 0000000000000000 R14: 00007f43996b5fa0 R15: 00007ffe1fc185f8 [ 238.367447][ T7377] device syzkaller0 entered promiscuous mode [ 238.585688][ T7398] FAULT_INJECTION: forcing a failure. [ 238.585688][ T7398] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.598822][ T7398] CPU: 0 PID: 7398 Comm: syz.0.2137 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 238.610101][ T7398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 238.620268][ T7398] Call Trace: [ 238.623570][ T7398] __dump_stack+0x21/0x24 [ 238.627901][ T7398] dump_stack_lvl+0x169/0x1d8 [ 238.632583][ T7398] ? thaw_kernel_threads+0x220/0x220 [ 238.637864][ T7398] ? show_regs_print_info+0x18/0x18 [ 238.643076][ T7398] dump_stack+0x15/0x1c [ 238.647253][ T7398] should_fail+0x3c1/0x510 [ 238.651852][ T7398] should_fail_usercopy+0x1a/0x20 [ 238.656881][ T7398] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 238.662956][ T7398] generic_perform_write+0x326/0x510 [ 238.668249][ T7398] ? grab_cache_page_write_begin+0xb0/0xb0 [ 238.674494][ T7398] ? file_remove_privs+0x580/0x580 [ 238.679604][ T7398] ? __fsnotify_parent+0x5f5/0x6c0 [ 238.684717][ T7398] ? __kasan_check_write+0x14/0x20 [ 238.689826][ T7398] ? down_write+0xac/0x110 [ 238.694243][ T7398] __generic_file_write_iter+0x24b/0x480 [ 238.699869][ T7398] ? generic_write_checks+0x3d4/0x480 [ 238.705243][ T7398] generic_file_write_iter+0xa9/0x1d0 [ 238.710609][ T7398] vfs_write+0x725/0xd60 [ 238.714852][ T7398] ? kernel_write+0x3c0/0x3c0 [ 238.719524][ T7398] ? mutex_trylock+0xa0/0xa0 [ 238.724110][ T7398] ? __fget_files+0x2c4/0x320 [ 238.728781][ T7398] ? __fdget_pos+0x2d2/0x380 [ 238.733380][ T7398] ? ksys_write+0x71/0x240 [ 238.737790][ T7398] ksys_write+0x140/0x240 [ 238.742118][ T7398] ? __ia32_sys_read+0x90/0x90 [ 238.746877][ T7398] ? fpu__clear_all+0x20/0x20 [ 238.751550][ T7398] __x64_sys_write+0x7b/0x90 [ 238.756140][ T7398] do_syscall_64+0x31/0x40 [ 238.760551][ T7398] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 238.766443][ T7398] RIP: 0033:0x7f439948e929 [ 238.770858][ T7398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.790469][ T7398] RSP: 002b:00007f4397af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 238.798882][ T7398] RAX: ffffffffffffffda RBX: 00007f43996b5fa0 RCX: 00007f439948e929 [ 238.806850][ T7398] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 238.814821][ T7398] RBP: 00007f4397af7090 R08: 0000000000000000 R09: 0000000000000000 [ 238.822786][ T7398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 238.830750][ T7398] R13: 0000000000000000 R14: 00007f43996b5fa0 R15: 00007ffe1fc185f8 [ 238.995734][ T7408] device wg2 left promiscuous mode [ 239.119096][ T7414] device syzkaller0 entered promiscuous mode [ 239.257678][ T7408] device wg2 entered promiscuous mode [ 240.065904][ T7450] FAULT_INJECTION: forcing a failure. [ 240.065904][ T7450] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 240.079266][ T7450] CPU: 1 PID: 7450 Comm: syz.4.2154 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 240.090570][ T7450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 240.100638][ T7450] Call Trace: [ 240.103945][ T7450] __dump_stack+0x21/0x24 [ 240.108279][ T7450] dump_stack_lvl+0x169/0x1d8 [ 240.112956][ T7450] ? thaw_kernel_threads+0x220/0x220 [ 240.118241][ T7450] ? show_regs_print_info+0x18/0x18 [ 240.123443][ T7450] dump_stack+0x15/0x1c [ 240.127605][ T7450] should_fail+0x3c1/0x510 [ 240.132025][ T7450] should_fail_usercopy+0x1a/0x20 [ 240.137055][ T7450] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 240.143131][ T7450] generic_perform_write+0x326/0x510 [ 240.148420][ T7450] ? atime_needs_update+0x5b0/0x5b0 [ 240.153623][ T7450] ? grab_cache_page_write_begin+0xb0/0xb0 [ 240.159428][ T7450] ? file_remove_privs+0x580/0x580 [ 240.164542][ T7450] ? __fsnotify_parent+0x5f5/0x6c0 [ 240.169656][ T7450] ? __kasan_check_write+0x14/0x20 [ 240.174770][ T7450] ? down_write+0xac/0x110 [ 240.179276][ T7450] __generic_file_write_iter+0x24b/0x480 [ 240.184907][ T7450] ? generic_write_checks+0x3d4/0x480 [ 240.190288][ T7450] generic_file_write_iter+0xa9/0x1d0 [ 240.195676][ T7450] vfs_write+0x725/0xd60 [ 240.199922][ T7450] ? kernel_write+0x3c0/0x3c0 [ 240.204600][ T7450] ? mutex_trylock+0xa0/0xa0 [ 240.209199][ T7450] ? __fget_files+0x2c4/0x320 [ 240.213881][ T7450] ? __fdget_pos+0x2d2/0x380 [ 240.218608][ T7450] ? ksys_write+0x71/0x240 [ 240.223125][ T7450] ksys_write+0x140/0x240 [ 240.227477][ T7450] ? __ia32_sys_read+0x90/0x90 [ 240.232252][ T7450] ? fpu__clear_all+0x20/0x20 [ 240.236946][ T7450] __x64_sys_write+0x7b/0x90 [ 240.241558][ T7450] do_syscall_64+0x31/0x40 [ 240.245978][ T7450] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 240.251870][ T7450] RIP: 0033:0x7f6408341929 [ 240.256295][ T7450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 240.275917][ T7450] RSP: 002b:00007f64069aa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 240.284428][ T7450] RAX: ffffffffffffffda RBX: 00007f6408568fa0 RCX: 00007f6408341929 [ 240.292493][ T7450] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 240.300475][ T7450] RBP: 00007f64069aa090 R08: 0000000000000000 R09: 0000000000000000 [ 240.308457][ T7450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 240.316517][ T7450] R13: 0000000000000000 R14: 00007f6408568fa0 R15: 00007ffd24ddf898 [ 241.234360][ T7467] device syzkaller0 entered promiscuous mode [ 241.746646][ T7491] FAULT_INJECTION: forcing a failure. [ 241.746646][ T7491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 241.759756][ T7491] CPU: 1 PID: 7491 Comm: syz.3.2168 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 241.771041][ T7491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 241.781105][ T7491] Call Trace: [ 241.784420][ T7491] __dump_stack+0x21/0x24 [ 241.788761][ T7491] dump_stack_lvl+0x169/0x1d8 [ 241.793445][ T7491] ? thaw_kernel_threads+0x220/0x220 [ 241.798733][ T7491] ? show_regs_print_info+0x18/0x18 [ 241.803936][ T7491] dump_stack+0x15/0x1c [ 241.808100][ T7491] should_fail+0x3c1/0x510 [ 241.812521][ T7491] should_fail_usercopy+0x1a/0x20 [ 241.817557][ T7491] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 241.823631][ T7491] generic_perform_write+0x326/0x510 [ 241.828925][ T7491] ? grab_cache_page_write_begin+0xb0/0xb0 [ 241.834742][ T7491] ? file_remove_privs+0x580/0x580 [ 241.839856][ T7491] ? __fsnotify_parent+0x5f5/0x6c0 [ 241.844971][ T7491] ? __kasan_check_write+0x14/0x20 [ 241.850088][ T7491] ? down_write+0xac/0x110 [ 241.854511][ T7491] __generic_file_write_iter+0x24b/0x480 [ 241.860147][ T7491] ? generic_write_checks+0x3d4/0x480 [ 241.865521][ T7491] generic_file_write_iter+0xa9/0x1d0 [ 241.870898][ T7491] vfs_write+0x725/0xd60 [ 241.875150][ T7491] ? __kasan_slab_free+0x11/0x20 [ 241.880215][ T7491] ? kernel_write+0x3c0/0x3c0 [ 241.884903][ T7491] ? mutex_trylock+0xa0/0xa0 [ 241.889495][ T7491] ? __fget_files+0x2c4/0x320 [ 241.894167][ T7491] ? __fdget_pos+0x2d2/0x380 [ 241.898750][ T7491] ? ksys_write+0x71/0x240 [ 241.903160][ T7491] ksys_write+0x140/0x240 [ 241.907572][ T7491] ? __ia32_sys_read+0x90/0x90 [ 241.912330][ T7491] ? fpu__clear_all+0x20/0x20 [ 241.917003][ T7491] __x64_sys_write+0x7b/0x90 [ 241.921583][ T7491] do_syscall_64+0x31/0x40 [ 241.925993][ T7491] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 241.931970][ T7491] RIP: 0033:0x7f173103f929 [ 241.936465][ T7491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.956057][ T7491] RSP: 002b:00007f172f6a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 241.964462][ T7491] RAX: ffffffffffffffda RBX: 00007f1731266fa0 RCX: 00007f173103f929 [ 241.972502][ T7491] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 241.980460][ T7491] RBP: 00007f172f6a8090 R08: 0000000000000000 R09: 0000000000000000 [ 241.988420][ T7491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 241.996382][ T7491] R13: 0000000000000000 R14: 00007f1731266fa0 R15: 00007ffc54bdfed8 [ 242.648617][ T7525] device syzkaller0 entered promiscuous mode [ 244.414354][ T7574] device syzkaller0 entered promiscuous mode [ 244.582215][ T7578] device wg2 left promiscuous mode [ 244.653237][ T7585] device wg2 entered promiscuous mode [ 244.769358][ T7607] syz.0.2203[7607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.769413][ T7607] syz.0.2203[7607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.210239][ T7617] device sit0 left promiscuous mode [ 245.302228][ T7618] device sit0 entered promiscuous mode [ 245.766029][ T7646] FAULT_INJECTION: forcing a failure. [ 245.766029][ T7646] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 245.779222][ T7646] CPU: 0 PID: 7646 Comm: syz.2.2216 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 245.790509][ T7646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 245.800571][ T7646] Call Trace: [ 245.803871][ T7646] __dump_stack+0x21/0x24 [ 245.808330][ T7646] dump_stack_lvl+0x169/0x1d8 [ 245.813010][ T7646] ? thaw_kernel_threads+0x220/0x220 [ 245.818299][ T7646] ? show_regs_print_info+0x18/0x18 [ 245.823490][ T7646] dump_stack+0x15/0x1c [ 245.827645][ T7646] should_fail+0x3c1/0x510 [ 245.832197][ T7646] should_fail_usercopy+0x1a/0x20 [ 245.837224][ T7646] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 245.843290][ T7646] generic_perform_write+0x326/0x510 [ 245.848569][ T7646] ? atime_needs_update+0x5b0/0x5b0 [ 245.853775][ T7646] ? grab_cache_page_write_begin+0xb0/0xb0 [ 245.859575][ T7646] ? file_remove_privs+0x580/0x580 [ 245.864676][ T7646] ? __fsnotify_parent+0x5f5/0x6c0 [ 245.869787][ T7646] ? __kasan_check_write+0x14/0x20 [ 245.874883][ T7646] ? down_write+0xac/0x110 [ 245.879285][ T7646] __generic_file_write_iter+0x24b/0x480 [ 245.885081][ T7646] ? generic_write_checks+0x3d4/0x480 [ 245.890456][ T7646] generic_file_write_iter+0xa9/0x1d0 [ 245.895813][ T7646] vfs_write+0x725/0xd60 [ 245.900041][ T7646] ? __kasan_slab_free+0x11/0x20 [ 245.904965][ T7646] ? kernel_write+0x3c0/0x3c0 [ 245.909633][ T7646] ? mutex_trylock+0xa0/0xa0 [ 245.914209][ T7646] ? __fget_files+0x2c4/0x320 [ 245.918877][ T7646] ? __fdget_pos+0x2d2/0x380 [ 245.923453][ T7646] ? ksys_write+0x71/0x240 [ 245.927855][ T7646] ksys_write+0x140/0x240 [ 245.932169][ T7646] ? __ia32_sys_read+0x90/0x90 [ 245.936924][ T7646] ? fpu__clear_all+0x20/0x20 [ 245.941587][ T7646] __x64_sys_write+0x7b/0x90 [ 245.946180][ T7646] do_syscall_64+0x31/0x40 [ 245.950672][ T7646] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.956550][ T7646] RIP: 0033:0x7f317aeba929 [ 245.960953][ T7646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.980545][ T7646] RSP: 002b:00007f3179523038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 245.988949][ T7646] RAX: ffffffffffffffda RBX: 00007f317b0e1fa0 RCX: 00007f317aeba929 [ 245.996916][ T7646] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 246.004875][ T7646] RBP: 00007f3179523090 R08: 0000000000000000 R09: 0000000000000000 [ 246.012926][ T7646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 246.020888][ T7646] R13: 0000000000000000 R14: 00007f317b0e1fa0 R15: 00007fffe4b48188 [ 246.233827][ T7653] device pim6reg1 entered promiscuous mode [ 246.577470][ T7682] FAULT_INJECTION: forcing a failure. [ 246.577470][ T7682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 246.590587][ T7682] CPU: 0 PID: 7682 Comm: syz.0.2229 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 246.601949][ T7682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 246.611999][ T7682] Call Trace: [ 246.615282][ T7682] __dump_stack+0x21/0x24 [ 246.619604][ T7682] dump_stack_lvl+0x169/0x1d8 [ 246.624268][ T7682] ? thaw_kernel_threads+0x220/0x220 [ 246.629802][ T7682] ? show_regs_print_info+0x18/0x18 [ 246.634984][ T7682] ? preempt_schedule+0xa7/0xb0 [ 246.639819][ T7682] dump_stack+0x15/0x1c [ 246.643963][ T7682] should_fail+0x3c1/0x510 [ 246.648375][ T7682] should_fail_usercopy+0x1a/0x20 [ 246.653387][ T7682] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 246.659441][ T7682] generic_perform_write+0x326/0x510 [ 246.664714][ T7682] ? grab_cache_page_write_begin+0xb0/0xb0 [ 246.670509][ T7682] ? file_remove_privs+0x580/0x580 [ 246.675605][ T7682] ? __fsnotify_parent+0x5f5/0x6c0 [ 246.680706][ T7682] ? __kasan_check_write+0x14/0x20 [ 246.685805][ T7682] ? down_write+0xac/0x110 [ 246.690211][ T7682] __generic_file_write_iter+0x24b/0x480 [ 246.695835][ T7682] ? generic_write_checks+0x3d4/0x480 [ 246.701195][ T7682] generic_file_write_iter+0xa9/0x1d0 [ 246.706555][ T7682] vfs_write+0x725/0xd60 [ 246.710787][ T7682] ? __kasan_slab_free+0x11/0x20 [ 246.715708][ T7682] ? kernel_write+0x3c0/0x3c0 [ 246.720369][ T7682] ? mutex_trylock+0xa0/0xa0 [ 246.724970][ T7682] ? __fget_files+0x2c4/0x320 [ 246.729635][ T7682] ? __fdget_pos+0x2d2/0x380 [ 246.734214][ T7682] ? ksys_write+0x71/0x240 [ 246.738624][ T7682] ksys_write+0x140/0x240 [ 246.742944][ T7682] ? __ia32_sys_read+0x90/0x90 [ 246.747694][ T7682] ? fpu__clear_all+0x20/0x20 [ 246.752363][ T7682] __x64_sys_write+0x7b/0x90 [ 246.757649][ T7682] do_syscall_64+0x31/0x40 [ 246.762051][ T7682] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 246.767927][ T7682] RIP: 0033:0x7f439948e929 [ 246.772331][ T7682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.791921][ T7682] RSP: 002b:00007f4397af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 246.800322][ T7682] RAX: ffffffffffffffda RBX: 00007f43996b5fa0 RCX: 00007f439948e929 [ 246.808287][ T7682] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 246.816247][ T7682] RBP: 00007f4397af7090 R08: 0000000000000000 R09: 0000000000000000 [ 246.824207][ T7682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 246.832169][ T7682] R13: 0000000000000000 R14: 00007f43996b5fa0 R15: 00007ffe1fc185f8 [ 246.951020][ T7684] device wg2 left promiscuous mode [ 247.015095][ T7685] device wg2 entered promiscuous mode [ 247.385793][ T7711] device wg2 left promiscuous mode [ 247.443221][ T7711] device wg2 entered promiscuous mode [ 247.827039][ T7728] FAULT_INJECTION: forcing a failure. [ 247.827039][ T7728] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 247.840237][ T7728] CPU: 0 PID: 7728 Comm: syz.1.2244 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 247.851517][ T7728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 247.861575][ T7728] Call Trace: [ 247.864872][ T7728] __dump_stack+0x21/0x24 [ 247.869209][ T7728] dump_stack_lvl+0x169/0x1d8 [ 247.873887][ T7728] ? thaw_kernel_threads+0x220/0x220 [ 247.879187][ T7728] ? show_regs_print_info+0x18/0x18 [ 247.884377][ T7728] dump_stack+0x15/0x1c [ 247.888616][ T7728] should_fail+0x3c1/0x510 [ 247.893025][ T7728] should_fail_usercopy+0x1a/0x20 [ 247.898039][ T7728] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 247.904092][ T7728] generic_perform_write+0x326/0x510 [ 247.909371][ T7728] ? grab_cache_page_write_begin+0xb0/0xb0 [ 247.915165][ T7728] ? file_remove_privs+0x580/0x580 [ 247.920280][ T7728] ? __fsnotify_parent+0x5f5/0x6c0 [ 247.925466][ T7728] ? __kasan_check_write+0x14/0x20 [ 247.930577][ T7728] ? down_write+0xac/0x110 [ 247.934979][ T7728] __generic_file_write_iter+0x24b/0x480 [ 247.940606][ T7728] ? generic_write_checks+0x3d4/0x480 [ 247.945965][ T7728] generic_file_write_iter+0xa9/0x1d0 [ 247.951421][ T7728] vfs_write+0x725/0xd60 [ 247.955650][ T7728] ? __kasan_slab_free+0x11/0x20 [ 247.960674][ T7728] ? kernel_write+0x3c0/0x3c0 [ 247.965344][ T7728] ? mutex_trylock+0xa0/0xa0 [ 247.970015][ T7728] ? __fget_files+0x2c4/0x320 [ 247.974680][ T7728] ? __fdget_pos+0x2d2/0x380 [ 247.979257][ T7728] ? ksys_write+0x71/0x240 [ 247.983658][ T7728] ksys_write+0x140/0x240 [ 247.987973][ T7728] ? __ia32_sys_read+0x90/0x90 [ 247.992721][ T7728] ? fpu__clear_all+0x20/0x20 [ 247.997390][ T7728] __x64_sys_write+0x7b/0x90 [ 248.001978][ T7728] do_syscall_64+0x31/0x40 [ 248.006383][ T7728] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 248.012260][ T7728] RIP: 0033:0x7f0522f04929 [ 248.016813][ T7728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.036424][ T7728] RSP: 002b:00007f052156d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 248.044841][ T7728] RAX: ffffffffffffffda RBX: 00007f052312bfa0 RCX: 00007f0522f04929 [ 248.052896][ T7728] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 248.060854][ T7728] RBP: 00007f052156d090 R08: 0000000000000000 R09: 0000000000000000 [ 248.068810][ T7728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 248.076773][ T7728] R13: 0000000000000000 R14: 00007f052312bfa0 R15: 00007ffd51f4e1a8 [ 248.183670][ T7733] ªªªªªª: renamed from vlan0 [ 248.296613][ T7745] device wg2 left promiscuous mode [ 248.374832][ T7745] device wg2 entered promiscuous mode [ 248.997857][ T7758] device syzkaller0 entered promiscuous mode [ 249.422383][ T7774] device wg2 left promiscuous mode [ 249.492937][ T7774] device wg2 entered promiscuous mode [ 250.082723][ T7799] syz.3.2271[7799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.002352][ T7812] device syzkaller0 entered promiscuous mode [ 251.437637][ T7849] FAULT_INJECTION: forcing a failure. [ 251.437637][ T7849] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 251.450851][ T7849] CPU: 0 PID: 7849 Comm: syz.2.2288 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 251.462134][ T7849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 251.472178][ T7849] Call Trace: [ 251.475464][ T7849] __dump_stack+0x21/0x24 [ 251.479780][ T7849] dump_stack_lvl+0x169/0x1d8 [ 251.484444][ T7849] ? thaw_kernel_threads+0x220/0x220 [ 251.489718][ T7849] ? show_regs_print_info+0x18/0x18 [ 251.494904][ T7849] dump_stack+0x15/0x1c [ 251.499223][ T7849] should_fail+0x3c1/0x510 [ 251.503638][ T7849] should_fail_usercopy+0x1a/0x20 [ 251.508649][ T7849] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 251.514705][ T7849] generic_perform_write+0x326/0x510 [ 251.519977][ T7849] ? grab_cache_page_write_begin+0xb0/0xb0 [ 251.525769][ T7849] ? file_remove_privs+0x580/0x580 [ 251.530965][ T7849] ? __fsnotify_parent+0x5f5/0x6c0 [ 251.536068][ T7849] ? __kasan_check_write+0x14/0x20 [ 251.541199][ T7849] ? down_write+0xac/0x110 [ 251.545721][ T7849] __generic_file_write_iter+0x24b/0x480 [ 251.551351][ T7849] ? generic_write_checks+0x3d4/0x480 [ 251.556885][ T7849] generic_file_write_iter+0xa9/0x1d0 [ 251.562242][ T7849] vfs_write+0x725/0xd60 [ 251.566565][ T7849] ? __kasan_slab_free+0x11/0x20 [ 251.571490][ T7849] ? kernel_write+0x3c0/0x3c0 [ 251.576156][ T7849] ? mutex_trylock+0xa0/0xa0 [ 251.580733][ T7849] ? __fget_files+0x2c4/0x320 [ 251.585400][ T7849] ? __fdget_pos+0x2d2/0x380 [ 251.589994][ T7849] ? ksys_write+0x71/0x240 [ 251.594409][ T7849] ksys_write+0x140/0x240 [ 251.598725][ T7849] ? __ia32_sys_read+0x90/0x90 [ 251.603486][ T7849] ? fpu__clear_all+0x20/0x20 [ 251.608151][ T7849] __x64_sys_write+0x7b/0x90 [ 251.612729][ T7849] do_syscall_64+0x31/0x40 [ 251.617162][ T7849] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 251.623045][ T7849] RIP: 0033:0x7f317aeba929 [ 251.627455][ T7849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 251.647073][ T7849] RSP: 002b:00007f3179523038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 251.655485][ T7849] RAX: ffffffffffffffda RBX: 00007f317b0e1fa0 RCX: 00007f317aeba929 [ 251.663470][ T7849] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 251.671451][ T7849] RBP: 00007f3179523090 R08: 0000000000000000 R09: 0000000000000000 [ 251.679410][ T7849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 251.687381][ T7849] R13: 0000000000000000 R14: 00007f317b0e1fa0 R15: 00007fffe4b48188 [ 251.772417][ T7852] device syzkaller0 entered promiscuous mode [ 252.121234][ T7855] device pim6reg1 entered promiscuous mode [ 252.200422][ T7868] syz.0.2294[7868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.200505][ T7868] syz.0.2294[7868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.132384][ T7893] device wg2 left promiscuous mode [ 253.275956][ T7893] device wg2 entered promiscuous mode [ 255.084703][ T7953] device wg2 left promiscuous mode [ 255.241680][ T7963] device syzkaller0 entered promiscuous mode [ 255.280751][ T7958] device wg2 entered promiscuous mode [ 256.402781][ T8021] device veth0_vlan left promiscuous mode [ 256.448436][ T8021] device veth0_vlan entered promiscuous mode [ 256.534459][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.553246][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 256.573160][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.764357][ T8035] FAULT_INJECTION: forcing a failure. [ 256.764357][ T8035] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 256.777459][ T8035] CPU: 1 PID: 8035 Comm: syz.3.2339 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 256.788912][ T8035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 256.798962][ T8035] Call Trace: [ 256.802258][ T8035] __dump_stack+0x21/0x24 [ 256.806585][ T8035] dump_stack_lvl+0x169/0x1d8 [ 256.811256][ T8035] ? thaw_kernel_threads+0x220/0x220 [ 256.816640][ T8035] ? show_regs_print_info+0x18/0x18 [ 256.821841][ T8035] dump_stack+0x15/0x1c [ 256.825997][ T8035] should_fail+0x3c1/0x510 [ 256.830419][ T8035] should_fail_usercopy+0x1a/0x20 [ 256.835438][ T8035] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 256.841507][ T8035] generic_perform_write+0x326/0x510 [ 256.846794][ T8035] ? grab_cache_page_write_begin+0xb0/0xb0 [ 256.852593][ T8035] ? file_remove_privs+0x580/0x580 [ 256.857696][ T8035] ? __fsnotify_parent+0x5f5/0x6c0 [ 256.862806][ T8035] ? __kasan_check_write+0x14/0x20 [ 256.867909][ T8035] ? down_write+0xac/0x110 [ 256.872325][ T8035] __generic_file_write_iter+0x24b/0x480 [ 256.877955][ T8035] ? generic_write_checks+0x3d4/0x480 [ 256.883324][ T8035] generic_file_write_iter+0xa9/0x1d0 [ 256.888688][ T8035] vfs_write+0x725/0xd60 [ 256.892926][ T8035] ? __kasan_slab_free+0x11/0x20 [ 256.897858][ T8035] ? kernel_write+0x3c0/0x3c0 [ 256.902530][ T8035] ? mutex_trylock+0xa0/0xa0 [ 256.907113][ T8035] ? __fget_files+0x2c4/0x320 [ 256.911789][ T8035] ? __fdget_pos+0x2d2/0x380 [ 256.916407][ T8035] ? ksys_write+0x71/0x240 [ 256.920820][ T8035] ksys_write+0x140/0x240 [ 256.925154][ T8035] ? __ia32_sys_read+0x90/0x90 [ 256.929914][ T8035] ? fpu__clear_all+0x20/0x20 [ 256.934599][ T8035] __x64_sys_write+0x7b/0x90 [ 256.939191][ T8035] do_syscall_64+0x31/0x40 [ 256.943607][ T8035] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 256.949514][ T8035] RIP: 0033:0x7f173103f929 [ 256.953924][ T8035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.973530][ T8035] RSP: 002b:00007f172f6a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 256.981950][ T8035] RAX: ffffffffffffffda RBX: 00007f1731266fa0 RCX: 00007f173103f929 [ 256.989916][ T8035] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000005 [ 256.997897][ T8035] RBP: 00007f172f6a8090 R08: 0000000000000000 R09: 0000000000000000 [ 257.005864][ T8035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 257.013838][ T8035] R13: 0000000000000000 R14: 00007f1731266fa0 R15: 00007ffc54bdfed8 [ 257.385409][ T8046] device syzkaller0 entered promiscuous mode [ 258.432333][ T8065] device syzkaller0 entered promiscuous mode [ 260.014159][ T8127] device sit0 entered promiscuous mode [ 261.320793][ T8173] device syzkaller0 entered promiscuous mode [ 261.667049][ T8174] device syzkaller0 entered promiscuous mode [ 261.996379][ T8196] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.051755][ T8201] device wg2 left promiscuous mode [ 262.388395][ T8205] device wg2 entered promiscuous mode [ 263.393018][ T8238] FAULT_INJECTION: forcing a failure. [ 263.393018][ T8238] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 263.484583][ T8238] CPU: 0 PID: 8238 Comm: syz.3.2403 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 263.495886][ T8238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 263.506042][ T8238] Call Trace: [ 263.509344][ T8238] __dump_stack+0x21/0x24 [ 263.513677][ T8238] dump_stack_lvl+0x169/0x1d8 [ 263.518356][ T8238] ? show_regs_print_info+0x18/0x18 [ 263.523561][ T8238] dump_stack+0x15/0x1c [ 263.527810][ T8238] should_fail+0x3c1/0x510 [ 263.532234][ T8238] should_fail_alloc_page+0x4f/0x60 [ 263.537692][ T8238] __alloc_pages_nodemask+0x109/0x5f0 [ 263.543521][ T8238] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 263.549071][ T8238] ? bpf_send_signal_common+0x321/0x420 [ 263.554619][ T8238] shmem_alloc_page+0x1b1/0x300 [ 263.559469][ T8238] ? put_page+0xd0/0xd0 [ 263.563632][ T8238] ? percpu_counter_add_batch+0x13c/0x160 [ 263.569354][ T8238] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 263.575001][ T8238] ? shmem_swapin_page+0x16c0/0x16c0 [ 263.580286][ T8238] ? xas_load+0x27d/0x2a0 [ 263.584624][ T8238] ? find_get_entry+0x366/0x3c0 [ 263.589478][ T8238] ? page_cache_prev_miss+0x270/0x270 [ 263.594852][ T8238] ? rwsem_down_write_slowpath+0xa17/0xe30 [ 263.600661][ T8238] ? find_lock_entry+0x4b/0x200 [ 263.605547][ T8238] ? is_bpf_text_address+0x177/0x190 [ 263.610834][ T8238] shmem_getpage_gfp+0x625/0x2110 [ 263.615859][ T8238] ? arch_stack_walk+0xee/0x140 [ 263.620740][ T8238] shmem_fallocate+0x817/0xc20 [ 263.625637][ T8238] ? sched_clock_cpu+0x1b/0x3d0 [ 263.630579][ T8238] ? shmem_mmap+0x270/0x270 [ 263.635083][ T8238] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 263.640891][ T8238] ? avc_policy_seqno+0x1b/0x70 [ 263.645866][ T8238] ? selinux_file_permission+0x2a5/0x510 [ 263.651514][ T8238] ? fsnotify_perm+0x66/0x4b0 [ 263.656194][ T8238] ? preempt_count_add+0x90/0x1b0 [ 263.661221][ T8238] vfs_fallocate+0x4b4/0x590 [ 263.665812][ T8238] do_vfs_ioctl+0x12e3/0x1510 [ 263.670612][ T8238] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 263.676245][ T8238] ? has_cap_mac_admin+0x330/0x330 [ 263.681375][ T8238] ? selinux_file_ioctl+0x377/0x480 [ 263.686579][ T8238] ? mutex_trylock+0xa0/0xa0 [ 263.691173][ T8238] ? __fget_files+0x2c4/0x320 [ 263.695954][ T8238] ? selinux_file_alloc_security+0x120/0x120 [ 263.701943][ T8238] ? __fget_files+0x2c4/0x320 [ 263.706617][ T8238] ? security_file_ioctl+0x84/0xa0 [ 263.711804][ T8238] __se_sys_ioctl+0x9f/0x1a0 [ 263.716387][ T8238] __x64_sys_ioctl+0x7b/0x90 [ 263.720966][ T8238] do_syscall_64+0x31/0x40 [ 263.725379][ T8238] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 263.731615][ T8238] RIP: 0033:0x7f173103f929 [ 263.736116][ T8238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 263.755799][ T8238] RSP: 002b:00007f172f687038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.764205][ T8238] RAX: ffffffffffffffda RBX: 00007f1731267080 RCX: 00007f173103f929 [ 263.772272][ T8238] RDX: 0000200000000040 RSI: 000000004030582a RDI: 0000000000000007 [ 263.780326][ T8238] RBP: 00007f172f687090 R08: 0000000000000000 R09: 0000000000000000 [ 263.788293][ T8238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.796254][ T8238] R13: 0000000000000000 R14: 00007f1731267080 R15: 00007ffc54bdfed8 [ 264.287611][ T8260] €Â0aaaaaaaaa: renamed from pim6reg1 [ 264.486664][ T8262] GPL: port 1(erspan0) entered blocking state [ 264.505959][ T8262] GPL: port 1(erspan0) entered disabled state [ 264.530259][ T8262] device erspan0 entered promiscuous mode [ 264.554384][ T8273] GPL: port 1(erspan0) entered blocking state [ 264.560514][ T8273] GPL: port 1(erspan0) entered forwarding state [ 265.029846][ T8312] device syzkaller0 entered promiscuous mode [ 265.130989][ T8320] GPL: port 1(erspan0) entered blocking state [ 265.147441][ T8320] GPL: port 1(erspan0) entered disabled state [ 265.180911][ T8320] device erspan0 entered promiscuous mode [ 265.278301][ T8326] GPL: port 1(erspan0) entered blocking state [ 265.284461][ T8326] GPL: port 1(erspan0) entered forwarding state [ 265.357342][ T8335] device wg2 left promiscuous mode [ 266.401998][ T8366] device veth0_vlan left promiscuous mode [ 266.478629][ T8366] device veth0_vlan entered promiscuous mode [ 266.592629][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.615676][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.996814][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.391552][ T8396] device syzkaller0 entered promiscuous mode [ 268.515839][ T24] audit: type=1400 audit(1749218018.170:156): avc: denied { create } for pid=8413 comm="syz.0.2459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 269.344538][ T24] audit: type=1400 audit(1749218019.000:157): avc: denied { associate } for pid=8416 comm="syz.3.2460" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 270.769438][ T8443] device syzkaller0 entered promiscuous mode [ 271.149206][ T8449] device sit0 left promiscuous mode [ 272.670047][ T8466] device wg2 left promiscuous mode [ 273.575968][ T8468] device wg2 entered promiscuous mode [ 273.738418][ T8486] device syzkaller0 entered promiscuous mode [ 274.366534][ T8488] device wg2 left promiscuous mode [ 274.420876][ T8489] device wg2 entered promiscuous mode [ 276.174280][ T8519] device veth1_macvtap entered promiscuous mode [ 276.233605][ T8519] device macsec0 entered promiscuous mode [ 276.316469][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 278.027501][ T8547] device syzkaller0 entered promiscuous mode [ 278.555330][ T24] audit: type=1400 audit(1749218028.190:158): avc: denied { read } for pid=8582 comm="syz.0.2507" dev="nsfs" ino=4026532450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 278.664080][ T24] audit: type=1400 audit(1749218028.210:159): avc: denied { open } for pid=8582 comm="syz.0.2507" path="cgroup:[4026532450]" dev="nsfs" ino=4026532450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 278.722614][ T8591] device syzkaller0 entered promiscuous mode [ 279.058092][ T8596] device veth0_vlan left promiscuous mode [ 279.070002][ T8596] device veth0_vlan entered promiscuous mode [ 279.115085][ T8596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.164740][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.172581][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.220464][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 279.869976][ T8635] device wg2 left promiscuous mode [ 279.891906][ T8635] device wg2 entered promiscuous mode [ 280.199371][ T8649] device wg2 left promiscuous mode [ 280.330455][ T8649] device wg2 entered promiscuous mode [ 282.560189][ T8759] device pim6reg1 entered promiscuous mode [ 283.033656][ T8770] device wg2 entered promiscuous mode [ 283.785009][ T8785] device veth1_macvtap left promiscuous mode [ 283.907772][ T8789] device veth0_vlan left promiscuous mode [ 283.962778][ T8789] device veth0_vlan entered promiscuous mode [ 284.056884][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.076058][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.124519][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.350035][ T24] audit: type=1400 audit(1749218034.000:160): avc: denied { ioctl } for pid=8824 comm="syz.3.2579" path="uts:[4026532539]" dev="nsfs" ino=4026532539 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 284.414551][ T8815] device veth1_macvtap left promiscuous mode [ 284.431807][ T8815] device macsec0 left promiscuous mode [ 284.514573][ T8831] device veth1_macvtap entered promiscuous mode [ 284.551304][ T8831] device macsec0 entered promiscuous mode [ 285.884107][ T8870] device wg2 left promiscuous mode [ 288.600908][ T8972] device syzkaller0 entered promiscuous mode [ 288.884695][ T8981] device sit0 left promiscuous mode [ 288.907674][ T8984] device sit0 entered promiscuous mode [ 289.498008][ T9002] device syzkaller0 entered promiscuous mode [ 289.899004][ T9017] syz.1.2640[9017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.902021][ T9017] syz.1.2640[9017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.257897][ T9038] device veth0_vlan left promiscuous mode [ 290.306502][ T9038] device veth0_vlan entered promiscuous mode [ 290.649604][ T9059] device wg2 left promiscuous mode [ 291.134963][ T9074] device syzkaller0 entered promiscuous mode [ 291.341162][ T9079] device syzkaller0 entered promiscuous mode [ 291.787416][ T9090] device syzkaller0 entered promiscuous mode [ 293.138243][ T9144] device syzkaller0 entered promiscuous mode [ 294.115936][ T9176] device wg2 entered promiscuous mode [ 295.206663][ T9224] device sit0 entered promiscuous mode [ 297.417976][ T9287] device bridge_slave_1 left promiscuous mode [ 297.444250][ T9287] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.463426][ T9287] device bridge_slave_0 left promiscuous mode [ 297.469577][ T9287] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.064630][ T9337] device veth1_macvtap entered promiscuous mode [ 299.070946][ T9337] device macsec0 entered promiscuous mode [ 299.118076][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 299.981306][ T9390] device pim6reg1 entered promiscuous mode [ 301.317626][ T9448] device sit0 entered promiscuous mode [ 301.594650][ T9452] device wg2 left promiscuous mode [ 301.721575][ T9463] device wg2 entered promiscuous mode [ 302.131159][ T9491] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.139256][ T9491] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.737650][ T9535] device pim6reg1 entered promiscuous mode [ 303.546565][ T9563] device syzkaller0 entered promiscuous mode [ 304.794694][ T9597] device syzkaller0 entered promiscuous mode [ 305.457627][ T9611] device syzkaller0 entered promiscuous mode [ 305.481711][ T9620] device veth1_macvtap entered promiscuous mode [ 305.496241][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 306.488623][ T9654] device syzkaller0 entered promiscuous mode [ 307.222906][ T9696] device veth0_vlan left promiscuous mode [ 307.300465][ T9696] device veth0_vlan entered promiscuous mode [ 307.412500][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.428287][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.460331][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.495380][ T9715] device wg2 left promiscuous mode [ 307.583672][ T9718] device syzkaller0 left promiscuous mode [ 307.620941][ T9718] device pim6reg1 entered promiscuous mode [ 308.320039][ T9758] device sit0 left promiscuous mode [ 308.434306][ T9760] device sit0 entered promiscuous mode [ 308.797866][ T9761] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.851478][ T9761] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.914058][ T9761] device bridge_slave_0 entered promiscuous mode [ 308.950125][ T9761] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.990606][ T9761] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.040795][ T9761] device bridge_slave_1 entered promiscuous mode [ 309.378109][ T9761] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.385216][ T9761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.392502][ T9761] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.399551][ T9761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.561260][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.597937][ T393] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.613652][ T393] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.647536][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 309.693100][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.701377][ T393] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.708438][ T393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.716033][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.724891][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.733477][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.740518][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.782884][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.791066][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.799392][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.808239][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.840985][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 309.855611][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 309.867761][ T9761] device veth0_vlan entered promiscuous mode [ 309.888555][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 309.897513][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.912390][ T9761] device veth1_macvtap entered promiscuous mode [ 309.943888][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.973471][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.003275][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 310.016680][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 310.027721][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 310.080851][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 310.103404][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 310.111929][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 310.120399][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.627249][ T9875] syz.1.2913[9875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.627337][ T9875] syz.1.2913[9875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.917482][ T700] device bridge_slave_1 left promiscuous mode [ 310.992943][ T700] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.028832][ T700] device bridge_slave_0 left promiscuous mode [ 311.055395][ T700] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.752289][ T9897] device syzkaller0 entered promiscuous mode [ 312.025023][ T9905] device syzkaller0 entered promiscuous mode [ 313.001483][ T9923] device syzkaller0 entered promiscuous mode [ 313.324544][ T9941] device veth0_vlan left promiscuous mode [ 313.343658][ T9941] device veth0_vlan entered promiscuous mode [ 313.450093][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.473225][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 313.548077][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.744323][T10017] FAULT_INJECTION: forcing a failure. [ 314.744323][T10017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 314.796470][T10017] CPU: 1 PID: 10017 Comm: syz.2.2953 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 314.807875][T10017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 314.817945][T10017] Call Trace: [ 314.821249][T10017] __dump_stack+0x21/0x24 [ 314.825587][T10017] dump_stack_lvl+0x169/0x1d8 [ 314.830358][T10017] ? thaw_kernel_threads+0x220/0x220 [ 314.835646][T10017] ? vsnprintf+0x1871/0x1960 [ 314.840246][T10017] ? show_regs_print_info+0x18/0x18 [ 314.845459][T10017] dump_stack+0x15/0x1c [ 314.849627][T10017] should_fail+0x3c1/0x510 [ 314.854159][T10017] should_fail_usercopy+0x1a/0x20 [ 314.859186][T10017] _copy_to_user+0x20/0x90 [ 314.863608][T10017] simple_read_from_buffer+0xe9/0x160 [ 314.868994][T10017] proc_fail_nth_read+0x19a/0x210 [ 314.874028][T10017] ? proc_fault_inject_write+0x2f0/0x2f0 [ 314.879657][T10017] ? rw_verify_area+0x1c0/0x360 [ 314.884501][T10017] ? proc_fault_inject_write+0x2f0/0x2f0 [ 314.890128][T10017] vfs_read+0x1fe/0xa10 [ 314.894283][T10017] ? kernel_read+0x70/0x70 [ 314.898691][T10017] ? __kasan_check_write+0x14/0x20 [ 314.903798][T10017] ? mutex_lock+0x8c/0xe0 [ 314.908113][T10017] ? mutex_trylock+0xa0/0xa0 [ 314.912689][T10017] ? __fget_files+0x2c4/0x320 [ 314.917359][T10017] ? __fdget_pos+0x2d2/0x380 [ 314.921936][T10017] ? ksys_read+0x71/0x240 [ 314.926254][T10017] ksys_read+0x140/0x240 [ 314.930489][T10017] ? vfs_write+0xd60/0xd60 [ 314.934904][T10017] ? fpu__clear_all+0x20/0x20 [ 314.939573][T10017] ? task_work_run+0x170/0x190 [ 314.944344][T10017] __x64_sys_read+0x7b/0x90 [ 314.948834][T10017] do_syscall_64+0x31/0x40 [ 314.953244][T10017] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 314.959132][T10017] RIP: 0033:0x7f317aeb933c [ 314.963545][T10017] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 314.983311][T10017] RSP: 002b:00007f3179523030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 314.991722][T10017] RAX: ffffffffffffffda RBX: 00007f317b0e1fa0 RCX: 00007f317aeb933c [ 314.999782][T10017] RDX: 000000000000000f RSI: 00007f31795230a0 RDI: 0000000000000008 [ 315.007744][T10017] RBP: 00007f3179523090 R08: 0000000000000000 R09: 0000000000000000 [ 315.015789][T10017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 315.023772][T10017] R13: 0000000000000000 R14: 00007f317b0e1fa0 R15: 00007fffe4b48188 [ 316.544828][T10109] device syzkaller0 entered promiscuous mode [ 316.745886][T10118] device syzkaller0 entered promiscuous mode [ 317.624828][T10146] device syzkaller0 entered promiscuous mode [ 317.786240][T10151] device syzkaller0 entered promiscuous mode [ 319.023297][T10196] device pim6reg1 entered promiscuous mode [ 320.050379][T10227] device syzkaller0 entered promiscuous mode [ 320.372684][T10236] device syzkaller0 entered promiscuous mode [ 321.692534][T10285] device veth0_vlan left promiscuous mode [ 321.751845][T10285] device veth0_vlan entered promiscuous mode [ 321.827491][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.853446][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 321.860849][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.565052][T10303] device sit0 left promiscuous mode [ 322.819312][T10308] device veth0_vlan left promiscuous mode [ 322.840844][T10308] device veth0_vlan entered promiscuous mode [ 322.887695][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.903523][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.911113][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.216917][T10316] device syzkaller0 entered promiscuous mode [ 324.588375][T10345] device syzkaller0 entered promiscuous mode [ 324.835275][T10362] device syzkaller0 entered promiscuous mode [ 324.981297][T10361] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.988424][T10361] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.995973][T10361] device bridge_slave_0 entered promiscuous mode [ 325.003179][T10361] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.011499][T10361] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.019028][T10361] device bridge_slave_1 entered promiscuous mode [ 326.695277][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 326.722949][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 326.730781][T10400] device sit0 left promiscuous mode [ 326.742776][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.751176][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.833058][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.840134][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.866607][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 326.879008][T10407] device sit0 entered promiscuous mode [ 327.028331][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.045335][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.055007][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.062106][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.073547][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.081628][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.112381][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.129926][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.196577][T10361] device veth0_vlan entered promiscuous mode [ 327.253792][T10424] device syzkaller0 entered promiscuous mode [ 327.261895][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 327.284677][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 327.298403][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 327.306830][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.397250][T10421] device syzkaller0 entered promiscuous mode [ 327.499060][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.506689][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 327.529753][T10361] device veth1_macvtap entered promiscuous mode [ 327.552959][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 327.563084][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 327.571331][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 327.621988][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 327.635019][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 327.643873][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 327.653398][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 327.868346][T10442] device sit0 left promiscuous mode [ 327.946796][T10450] device syzkaller0 entered promiscuous mode [ 328.002075][T10451] device sit0 entered promiscuous mode [ 328.799232][T10455] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.807339][T10455] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.815049][T10455] device bridge_slave_0 entered promiscuous mode [ 328.834144][T10455] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.855543][T10455] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.881746][T10455] device bridge_slave_1 entered promiscuous mode [ 329.002508][ T700] GPL: port 1(erspan0) entered disabled state [ 329.011499][ T700] device erspan0 left promiscuous mode [ 329.017578][ T700] GPL: port 1(erspan0) entered disabled state [ 329.053359][T10473] device syzkaller0 entered promiscuous mode [ 329.497027][T10486] device syzkaller0 entered promiscuous mode [ 329.533209][T10455] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.540288][T10455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.547618][T10455] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.554666][T10455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.752234][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.767581][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.793605][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.824604][ T700] device bridge_slave_1 left promiscuous mode [ 329.830767][ T700] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.865044][ T700] device bridge_slave_0 left promiscuous mode [ 329.881372][ T700] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.902650][ T700] device veth0_vlan left promiscuous mode [ 330.193828][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 330.212342][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.219425][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.275541][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 330.301436][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.308751][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.339975][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 330.365763][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 330.597326][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 330.620150][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 330.670718][T10455] device veth0_vlan entered promiscuous mode [ 330.702354][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 330.715015][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 330.746175][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 330.783076][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 330.794167][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 330.802436][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 330.912316][T10455] device veth1_macvtap entered promiscuous mode [ 331.044386][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 331.057239][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 331.076769][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 331.099314][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 331.123191][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.294730][ T700] device veth1_macvtap left promiscuous mode [ 332.442862][T10549] device veth0_vlan left promiscuous mode [ 332.448995][T10549] device veth0_vlan entered promiscuous mode [ 332.475444][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.497097][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.548605][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.192005][T10564] device veth0_vlan left promiscuous mode [ 333.243732][T10564] device veth0_vlan entered promiscuous mode [ 333.366810][T10577] device syzkaller0 entered promiscuous mode [ 334.021237][T10587] device syzkaller0 entered promiscuous mode [ 334.505910][T10603] device syzkaller0 entered promiscuous mode [ 335.118501][T10602] device syzkaller0 entered promiscuous mode [ 335.519023][T10610] device syzkaller0 entered promiscuous mode [ 337.220927][T10628] syz.2.3142[10628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.220984][T10628] syz.2.3142[10628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.308275][T10630] device veth0_to_team entered promiscuous mode [ 337.777304][T10636] -1: renamed from syzkaller0 [ 338.097945][ T24] audit: type=1400 audit(1749218087.750:161): avc: denied { setattr } for pid=10654 comm="syz.2.3151" path="/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 338.161873][T10655] tap0: tun_chr_ioctl cmd 2147767511 [ 338.514918][T10667] device syzkaller0 entered promiscuous mode [ 338.877514][T10682] device syzkaller0 entered promiscuous mode [ 339.742278][T10715] device veth0_vlan left promiscuous mode [ 339.757271][T10715] device veth0_vlan entered promiscuous mode [ 339.787739][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.797876][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.813150][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.033123][T10724] device syzkaller0 entered promiscuous mode [ 341.403056][T10754] device syzkaller0 entered promiscuous mode [ 341.594215][T10766] device syzkaller0 entered promiscuous mode [ 342.045811][T10780] device syzkaller0 entered promiscuous mode [ 342.532727][T10797] device syzkaller0 entered promiscuous mode [ 342.966438][T10806] device syzkaller0 entered promiscuous mode [ 343.343738][T10823] device syzkaller0 entered promiscuous mode [ 343.424878][T10828] device syzkaller0 entered promiscuous mode [ 345.011856][T10896] device syzkaller0 entered promiscuous mode [ 345.562871][T10930] device sit0 left promiscuous mode [ 345.897247][T10941] device syzkaller0 entered promiscuous mode [ 346.369512][T10955] device veth1_macvtap left promiscuous mode [ 346.427956][T10955] device veth1_macvtap entered promiscuous mode [ 346.438074][T10955] device macsec0 entered promiscuous mode [ 346.496274][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 347.255000][T10988] device syzkaller0 entered promiscuous mode [ 347.749909][T11008] device syzkaller0 entered promiscuous mode [ 347.819399][T11013] device syzkaller0 entered promiscuous mode [ 348.434634][T11018] device syzkaller0 entered promiscuous mode [ 348.497165][T11029] device vxcan1 entered promiscuous mode [ 349.081150][T11048] device syzkaller0 entered promiscuous mode [ 349.550656][T11072] device syzkaller0 entered promiscuous mode [ 349.738918][T11087] device wg2 entered promiscuous mode [ 349.997143][T11105] device syzkaller0 entered promiscuous mode [ 350.537276][T11143] device veth1_macvtap left promiscuous mode [ 350.543972][T11143] device macsec0 left promiscuous mode [ 350.641796][T11143] device veth1_macvtap entered promiscuous mode [ 350.649438][T11143] device macsec0 entered promiscuous mode [ 352.126854][T11199] device syzkaller0 entered promiscuous mode [ 352.635571][T11217] device syzkaller0 entered promiscuous mode [ 353.261274][T11251] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.268484][T11251] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.957805][T11274] device syzkaller0 entered promiscuous mode [ 354.360376][T11289] device veth1_macvtap left promiscuous mode [ 355.964937][T11326] device syzkaller0 entered promiscuous mode [ 356.867300][T11380] device syzkaller0 entered promiscuous mode [ 357.734762][T11416] syz.1.3392[11416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.734820][T11416] syz.1.3392[11416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.830276][T11415] device syzkaller0 entered promiscuous mode [ 358.067120][T11430] device veth0_vlan left promiscuous mode [ 358.083171][T11430] device veth0_vlan entered promiscuous mode [ 358.102691][T11431] device pim6reg1 entered promiscuous mode [ 358.114015][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.127891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 358.146849][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 358.189278][T11444] device pim6reg1 entered promiscuous mode [ 358.384918][T11453] device syzkaller0 entered promiscuous mode [ 358.515205][T11465] device syzkaller0 entered promiscuous mode [ 358.727667][T11472] device syzkaller0 entered promiscuous mode [ 359.008395][T11482] device syzkaller0 entered promiscuous mode [ 359.198195][T11484] device veth1_macvtap left promiscuous mode [ 359.228873][T11484] device macsec0 left promiscuous mode [ 359.756045][T11507] device syzkaller0 entered promiscuous mode [ 360.034845][T11520] device syzkaller0 entered promiscuous mode [ 360.370027][T11525] device syzkaller0 entered promiscuous mode [ 362.150457][T11584] device syzkaller0 entered promiscuous mode [ 362.999038][T11612] device veth1_macvtap left promiscuous mode [ 363.026565][T11612] device macsec0 left promiscuous mode [ 363.446865][T11622] ªªªªªª: renamed from vlan0 [ 363.972166][T11652] device veth1_macvtap left promiscuous mode [ 363.980974][T11652] device macsec0 left promiscuous mode [ 364.139241][T11656] device veth1_macvtap entered promiscuous mode [ 364.147838][T11656] device macsec0 entered promiscuous mode [ 364.706625][T11679] device syzkaller0 entered promiscuous mode [ 365.149863][T11701] device syzkaller0 entered promiscuous mode [ 365.188282][T11699] device veth1_macvtap left promiscuous mode [ 365.201414][T11699] device macsec0 left promiscuous mode [ 365.233639][T11704] device veth1_macvtap entered promiscuous mode [ 365.239950][T11704] device macsec0 entered promiscuous mode [ 365.278903][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 365.343483][T11707] device veth1_macvtap left promiscuous mode [ 365.604909][T11709] device syzkaller0 entered promiscuous mode [ 365.626649][T11707] device veth1_macvtap entered promiscuous mode [ 365.633586][T11707] device macsec0 entered promiscuous mode [ 366.230286][T11727] device syzkaller0 entered promiscuous mode [ 366.769152][T11741] device veth1_macvtap entered promiscuous mode [ 366.776531][T11741] device macsec0 entered promiscuous mode [ 366.803024][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 366.844283][T11745] device veth0_vlan left promiscuous mode [ 366.886607][T11745] device veth0_vlan entered promiscuous mode [ 366.927459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.937239][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 366.945435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 367.717133][T11776] device syzkaller0 entered promiscuous mode [ 367.893074][T11783] device veth1_macvtap left promiscuous mode [ 367.899957][T11783] device macsec0 left promiscuous mode [ 367.934946][T11784] device syzkaller0 entered promiscuous mode [ 367.978952][T11787] device veth1_macvtap entered promiscuous mode [ 367.987728][T11787] device macsec0 entered promiscuous mode [ 368.236143][T11797] device sit0 entered promiscuous mode [ 368.595122][T11805] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 368.723898][T11808] device wg2 entered promiscuous mode [ 368.980688][T11829] device veth1_macvtap entered promiscuous mode [ 369.023699][T11829] device macsec0 entered promiscuous mode [ 369.210817][T11831] device syzkaller0 entered promiscuous mode [ 369.227817][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 369.484345][T11836] device syzkaller0 entered promiscuous mode [ 369.668324][T11838] device syzkaller0 entered promiscuous mode [ 370.916414][T11885] device syzkaller0 entered promiscuous mode [ 371.598478][T11901] device syzkaller0 entered promiscuous mode [ 371.676286][T11909] device syzkaller0 entered promiscuous mode [ 371.696134][T11912] device wg2 left promiscuous mode [ 371.734365][T11913] device wg2 entered promiscuous mode [ 372.417882][T11938] device sit0 entered promiscuous mode [ 372.810916][T11941] device syzkaller0 entered promiscuous mode [ 373.344037][T11959] device syzkaller0 entered promiscuous mode [ 374.526194][T11996] device syzkaller0 entered promiscuous mode [ 374.586528][T12003] device sit0 entered promiscuous mode [ 375.339158][T12024] device syzkaller0 entered promiscuous mode [ 375.515864][T12029] device syzkaller0 entered promiscuous mode [ 376.363283][T12050] device pim6reg1 entered promiscuous mode [ 376.903638][T12059] device syzkaller0 entered promiscuous mode [ 377.003546][T12066] device syzkaller0 entered promiscuous mode [ 377.546690][T12076] device syzkaller0 entered promiscuous mode [ 378.106404][T12095] device pim6reg1 entered promiscuous mode [ 378.265368][T12111] device syzkaller0 entered promiscuous mode [ 378.737841][T12117] device syzkaller0 entered promiscuous mode [ 379.956820][T12161] device wg2 entered promiscuous mode [ 379.964768][T12161] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.972036][T12161] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.004102][T12161] device bridge_slave_1 left promiscuous mode [ 380.011618][T12161] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.019633][T12161] device bridge_slave_0 left promiscuous mode [ 380.026577][T12161] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.294468][T12176] device syzkaller0 entered promiscuous mode [ 381.392036][T12184] device syzkaller0 entered promiscuous mode [ 381.540697][T12197] tap0: tun_chr_ioctl cmd 1074025677 [ 381.546099][T12197] tap0: linktype set to 778 [ 381.581502][T12197] device pim6reg1 entered promiscuous mode [ 381.622341][T12200] device sit0 entered promiscuous mode [ 382.395235][T12225] device syzkaller0 entered promiscuous mode [ 382.604445][T12236] device veth0_vlan left promiscuous mode [ 382.634934][T12236] device veth0_vlan entered promiscuous mode [ 382.707658][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.716649][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.784050][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.915478][T12243] device pim6reg1 entered promiscuous mode [ 383.103680][T12245] device pim6reg1 entered promiscuous mode [ 383.255119][T12237] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.325862][T12237] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.343025][T12237] device bridge_slave_0 entered promiscuous mode [ 383.383470][T12237] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.390626][T12237] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.399199][T12237] device bridge_slave_1 entered promiscuous mode [ 383.413124][ T700] GPL: port 1(erspan0) entered disabled state [ 383.425768][ T700] device erspan0 left promiscuous mode [ 383.441544][ T700] GPL: port 1(erspan0) entered disabled state [ 383.685641][T12237] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.692741][T12237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.700217][T12237] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.707285][T12237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.739677][ T700] device bridge_slave_1 left promiscuous mode [ 383.760293][ T700] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.794849][ T700] device bridge_slave_0 left promiscuous mode [ 383.821151][ T700] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.243017][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.262871][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.291027][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 384.320813][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 384.428960][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 384.446420][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 384.486798][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.493892][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.532192][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 384.573071][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 384.611724][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.618801][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.672874][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 384.700993][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 384.733054][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 384.771494][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 384.846789][T12237] device veth0_vlan entered promiscuous mode [ 384.859766][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 384.893109][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 384.912941][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 384.923021][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 384.943387][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 384.953176][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 385.145856][T12291] device syzkaller0 entered promiscuous mode [ 385.167475][T12237] device veth1_macvtap entered promiscuous mode [ 385.230290][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 385.241246][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 385.292364][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 385.417164][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 385.429393][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 385.443098][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 385.461584][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 385.664374][T12303] device syzkaller0 entered promiscuous mode [ 387.763142][T12345] device syzkaller0 entered promiscuous mode [ 388.236193][T12371] device syzkaller0 entered promiscuous mode [ 389.352534][T12416] device syzkaller0 entered promiscuous mode [ 389.456634][T12427] device syzkaller0 entered promiscuous mode [ 389.955926][T12455] device syzkaller0 entered promiscuous mode [ 390.136944][T12458] device syzkaller0 entered promiscuous mode [ 391.844305][T12493] device syzkaller0 entered promiscuous mode [ 393.280128][T12542] device veth1_macvtap left promiscuous mode [ 393.638519][T12566] device pim6reg1 entered promiscuous mode [ 394.550454][T12602] syz.4.3761[12602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.550939][T12602] syz.4.3761[12602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.551819][T12593] device syzkaller0 entered promiscuous mode [ 394.832480][T12594] device syzkaller0 entered promiscuous mode [ 395.356910][T12603] device syzkaller0 entered promiscuous mode [ 395.852155][ T24] audit: type=1400 audit(1749218145.500:162): avc: denied { create } for pid=12634 comm="syz.4.3772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 395.953492][T12639] device syzkaller0 entered promiscuous mode [ 395.986019][T12641] device sit0 left promiscuous mode [ 396.895184][T12667] device syzkaller0 entered promiscuous mode [ 397.058647][T12669] device syzkaller0 entered promiscuous mode [ 397.409606][T12675] device syzkaller0 entered promiscuous mode [ 397.932833][T12688] device syzkaller0 entered promiscuous mode [ 398.238441][T12710] device syzkaller0 entered promiscuous mode [ 398.906168][T12759] device syzkaller0 entered promiscuous mode [ 399.574932][T12790] device wg2 entered promiscuous mode [ 399.810129][T12792] device syzkaller0 entered promiscuous mode [ 400.099943][T12803] device syzkaller0 entered promiscuous mode [ 400.261051][T12808] device syzkaller0 entered promiscuous mode [ 402.579959][T12824] device syzkaller0 entered promiscuous mode [ 402.657307][T12839] FAULT_INJECTION: forcing a failure. [ 402.657307][T12839] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 402.744098][T12839] CPU: 0 PID: 12839 Comm: syz.1.3846 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 402.755506][T12839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 402.765724][T12839] Call Trace: [ 402.769008][T12839] __dump_stack+0x21/0x24 [ 402.773351][T12839] dump_stack_lvl+0x169/0x1d8 [ 402.778020][T12839] ? show_regs_print_info+0x18/0x18 [ 402.783206][T12839] ? kstrtouint_from_user+0x1a0/0x200 [ 402.788574][T12839] dump_stack+0x15/0x1c [ 402.792721][T12839] should_fail+0x3c1/0x510 [ 402.797133][T12839] should_fail_usercopy+0x1a/0x20 [ 402.802144][T12839] _copy_from_user+0x20/0xd0 [ 402.806731][T12839] ___sys_recvmsg+0x129/0x4f0 [ 402.811396][T12839] ? __sys_recvmsg+0x250/0x250 [ 402.816152][T12839] ? __fdget+0x1a1/0x230 [ 402.820386][T12839] __x64_sys_recvmsg+0x1dd/0x2a0 [ 402.825397][T12839] ? fput+0x1a/0x20 [ 402.829324][T12839] ? ___sys_recvmsg+0x4f0/0x4f0 [ 402.834187][T12839] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 402.840241][T12839] do_syscall_64+0x31/0x40 [ 402.844737][T12839] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 402.850630][T12839] RIP: 0033:0x7f23b6cf4929 [ 402.855131][T12839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.874822][T12839] RSP: 002b:00007f23b535d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 402.883260][T12839] RAX: ffffffffffffffda RBX: 00007f23b6f1bfa0 RCX: 00007f23b6cf4929 [ 402.891223][T12839] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000005 [ 402.899181][T12839] RBP: 00007f23b535d090 R08: 0000000000000000 R09: 0000000000000000 [ 402.907315][T12839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.915373][T12839] R13: 0000000000000000 R14: 00007f23b6f1bfa0 R15: 00007fff319a3f18 [ 403.068615][T12847] device syzkaller0 entered promiscuous mode [ 403.144393][T12845] device syzkaller0 entered promiscuous mode [ 403.501483][T12872] FAULT_INJECTION: forcing a failure. [ 403.501483][T12872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 403.567047][T12872] CPU: 0 PID: 12872 Comm: syz.2.3859 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 403.578456][T12872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 403.588693][T12872] Call Trace: [ 403.592215][T12872] __dump_stack+0x21/0x24 [ 403.596555][T12872] dump_stack_lvl+0x169/0x1d8 [ 403.601415][T12872] ? show_regs_print_info+0x18/0x18 [ 403.606714][T12872] dump_stack+0x15/0x1c [ 403.610876][T12872] should_fail+0x3c1/0x510 [ 403.615296][T12872] should_fail_usercopy+0x1a/0x20 [ 403.620321][T12872] _copy_from_user+0x20/0xd0 [ 403.624910][T12872] iovec_from_user+0x1bc/0x2f0 [ 403.629677][T12872] ? kstrtouint_from_user+0x1a0/0x200 [ 403.635064][T12872] __import_iovec+0x71/0x390 [ 403.639668][T12872] ? memset+0x35/0x40 [ 403.643669][T12872] import_iovec+0x7c/0xb0 [ 403.648010][T12872] ___sys_recvmsg+0x420/0x4f0 [ 403.652692][T12872] ? __sys_recvmsg+0x250/0x250 [ 403.657464][T12872] ? __fdget+0x1a1/0x230 [ 403.661701][T12872] __x64_sys_recvmsg+0x1dd/0x2a0 [ 403.666635][T12872] ? fput+0x1a/0x20 [ 403.670433][T12872] ? ___sys_recvmsg+0x4f0/0x4f0 [ 403.675275][T12872] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 403.681326][T12872] do_syscall_64+0x31/0x40 [ 403.685731][T12872] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 403.691641][T12872] RIP: 0033:0x7efd6ae67929 [ 403.696058][T12872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 403.715651][T12872] RSP: 002b:00007efd694d0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 403.724056][T12872] RAX: ffffffffffffffda RBX: 00007efd6b08efa0 RCX: 00007efd6ae67929 [ 403.732017][T12872] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000005 [ 403.739978][T12872] RBP: 00007efd694d0090 R08: 0000000000000000 R09: 0000000000000000 [ 403.748377][T12872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 403.756345][T12872] R13: 0000000000000000 R14: 00007efd6b08efa0 R15: 00007ffcc048a1b8 [ 403.812716][T12869] device syzkaller0 entered promiscuous mode [ 404.110234][T12885] device lo entered promiscuous mode [ 404.853296][T12896] device syzkaller0 entered promiscuous mode [ 405.509330][T12892] device syzkaller0 entered promiscuous mode [ 406.723786][T12942] ÿ: renamed from bond_slave_0 [ 407.029069][T12957] device syzkaller0 entered promiscuous mode [ 407.236863][T12977] device syzkaller0 entered promiscuous mode [ 407.272786][T12978] device sit0 left promiscuous mode [ 407.300482][T12979] device sit0 entered promiscuous mode [ 408.233059][T13016] device veth1_macvtap left promiscuous mode [ 408.309232][T13021] device syzkaller0 entered promiscuous mode [ 408.435399][T13016] device veth1_macvtap entered promiscuous mode [ 408.479121][T13018] device veth1_macvtap left promiscuous mode [ 408.650888][T13028] syz.0.3911[13028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.650938][T13028] syz.0.3911[13028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.173706][T13040] device syzkaller0 entered promiscuous mode [ 409.476432][T13056] device pim6reg1 entered promiscuous mode [ 410.088422][T13065] device sit0 left promiscuous mode [ 411.018457][T13101] device syzkaller0 entered promiscuous mode [ 411.276860][T13114] device sit0 left promiscuous mode [ 411.341126][T13114] device sit0 entered promiscuous mode [ 411.779909][T13132] device syzkaller0 entered promiscuous mode [ 412.300670][T13157] device syzkaller0 entered promiscuous mode [ 413.820756][T13216] device veth1_macvtap left promiscuous mode [ 414.528537][T13242] device syzkaller0 entered promiscuous mode [ 414.733678][T13247] device syzkaller0 entered promiscuous mode [ 414.788789][T13251] tap0: tun_chr_ioctl cmd 1074025675 [ 414.812648][T13251] tap0: persist enabled [ 414.963922][T13255] tap0: tun_chr_ioctl cmd 1074025675 [ 414.969847][T13255] tap0: persist disabled [ 414.978732][T13257] device sit0 left promiscuous mode [ 418.093247][T13376] syz.2.4024[13376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.093304][T13376] syz.2.4024[13376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.257799][T13370] device syzkaller0 entered promiscuous mode [ 419.459772][T13410] device syzkaller0 entered promiscuous mode [ 419.844806][T13420] device syzkaller0 entered promiscuous mode [ 420.114449][T13436] syz.0.4044[13436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.818633][T13493] device syzkaller0 entered promiscuous mode [ 422.410591][T13515] device syzkaller0 entered promiscuous mode [ 422.548259][T13525] device syzkaller0 entered promiscuous mode [ 423.042656][T13537] device syzkaller0 entered promiscuous mode [ 424.985748][T13605] device syzkaller0 entered promiscuous mode [ 425.413379][T13621] Â: renamed from pim6reg1 [ 425.817555][T13647] device veth1_macvtap left promiscuous mode [ 425.925481][T13652] device pim6reg1 entered promiscuous mode [ 426.352324][T13680] device syzkaller0 entered promiscuous mode [ 426.834465][T13711] device sit0 entered promiscuous mode [ 427.197867][T13731] device syzkaller0 entered promiscuous mode [ 427.221908][T13717] device pim6reg1 entered promiscuous mode [ 427.542642][T13740] device syzkaller0 entered promiscuous mode [ 427.654043][T13761] ------------[ cut here ]------------ [ 427.702861][T13761] kernel BUG at kernel/bpf/arraymap.c:993! [ 427.757215][T13761] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 427.763414][T13761] CPU: 0 PID: 13761 Comm: syz.1.4141 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 427.774785][T13761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 427.784868][T13761] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 427.791218][T13761] Code: 93 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 93 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 93 e9 ff 0f 0b e8 c5 93 e9 ff <0f> 0b e8 be 93 e9 ff 0f 0b e8 b7 93 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 427.810839][T13761] RSP: 0018:ffffc9000105fca8 EFLAGS: 00010293 [ 427.816924][T13761] RAX: ffffffff817a004b RBX: ffff888117343550 RCX: ffff888126352780 [ 427.824909][T13761] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 427.832896][T13761] RBP: ffffc9000105fd28 R08: dffffc0000000000 R09: fffffbfff0c5d3f5 [ 427.840901][T13761] R10: fffffbfff0c5d3f5 R11: 1ffffffff0c5d3f4 R12: 00000000fffffff0 [ 427.849001][T13761] R13: ffff88810da00400 R14: 0000000000000001 R15: ffff88810da00400 [ 427.857001][T13761] FS: 00007f23b531b6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 427.865928][T13761] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 427.872508][T13761] CR2: 0000000000000000 CR3: 0000000115a7f000 CR4: 00000000003506b0 [ 427.880479][T13761] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 427.888447][T13761] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 427.896439][T13761] Call Trace: [ 427.899729][T13761] ? bpf_prog_178c55262a54958c+0xb/0xcc0 [ 427.905359][T13761] fd_array_map_delete_elem+0x14c/0x250 [ 427.910899][T13761] map_delete_elem+0x336/0x510 [ 427.915660][T13761] __se_sys_bpf+0x3bf/0x680 [ 427.920163][T13761] ? __x64_sys_bpf+0x90/0x90 [ 427.924763][T13761] ? fpu__clear_all+0x20/0x20 [ 427.929437][T13761] __x64_sys_bpf+0x7b/0x90 [ 427.933854][T13761] do_syscall_64+0x31/0x40 [ 427.938269][T13761] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 427.944157][T13761] RIP: 0033:0x7f23b6cf4929 [ 427.948573][T13761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 427.968184][T13761] RSP: 002b:00007f23b531b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 427.976596][T13761] RAX: ffffffffffffffda RBX: 00007f23b6f1c160 RCX: 00007f23b6cf4929 [ 427.984567][T13761] RDX: 0000000000000020 RSI: 00002000000007c0 RDI: 0000000000000003 [ 427.992538][T13761] RBP: 00007f23b6d76b39 R08: 0000000000000000 R09: 0000000000000000 [ 428.000520][T13761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 428.008488][T13761] R13: 0000000000000000 R14: 00007f23b6f1c160 R15: 00007fff319a3f18 [ 428.016460][T13761] Modules linked in: [ 428.029512][T13753] device syzkaller0 entered promiscuous mode [ 428.052753][T13761] ---[ end trace 3176149ba48c5f1a ]--- [ 428.058349][T13761] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 428.071595][T13761] Code: 93 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 93 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 93 e9 ff 0f 0b e8 c5 93 e9 ff <0f> 0b e8 be 93 e9 ff 0f 0b e8 b7 93 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 428.096216][T13761] RSP: 0018:ffffc9000105fca8 EFLAGS: 00010293 [ 428.102466][T13761] RAX: ffffffff817a004b RBX: ffff888117343550 RCX: ffff888126352780 [ 428.110620][T13761] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 428.118858][T13761] RBP: ffffc9000105fd28 R08: dffffc0000000000 R09: fffffbfff0c5d3f5 [ 428.126970][T13761] R10: fffffbfff0c5d3f5 R11: 1ffffffff0c5d3f4 R12: 00000000fffffff0 [ 428.135109][T13761] R13: ffff88810da00400 R14: 0000000000000001 R15: ffff88810da00400 [ 428.143387][T13761] FS: 00007f23b531b6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 428.152465][T13761] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 428.159969][T13761] CR2: 0000001b2e116ff8 CR3: 0000000115a7f000 CR4: 00000000003506a0 [ 428.170257][T13761] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 428.183944][T13761] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 428.228933][T13761] Kernel panic - not syncing: Fatal exception [ 428.235107][T13761] Kernel Offset: disabled [ 428.239559][T13761] Rebooting in 86400 seconds..