last executing test programs: 6m18.194825232s ago: executing program 1 (id=825): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x3a, 0x3a, 0x0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242f09880b", 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffd}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfd, 0xfd, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xb02}, 0x0, 0xc8, 0x10003, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfdef) socketpair(0x10, 0x3, 0x4, &(0x7f0000000180)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'macvlan1\x00', 0xfd2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000780)={0x1, &(0x7f0000000600)=[{0x3d}]}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000001000)={'wg0\x00', @remote}) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b0000000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000009000400"/28], 0x50) 6m18.047589596s ago: executing program 1 (id=826): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x31b2c0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x4880, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2578, 0x0, 0x1}, 0xffffffffffffffff, 0xe, r2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x8, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) gettid() mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) close(r1) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) 6m15.355249158s ago: executing program 1 (id=834): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x19, 0x4, 0x8, 0xb}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x3a, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000040), &(0x7f0000000280)='%pS \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0xffffffff}, 0x118920, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000001050000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff4cff80850000007100000095"], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x11, 0xe, 0x0, &(0x7f00000009c0)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 6m14.887928977s ago: executing program 1 (id=838): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x3a, 0x3a, 0x0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242f09880b", 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffd}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfd, 0xfd, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xb02}, 0x0, 0xc8, 0x10003, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfdef) socketpair(0x10, 0x3, 0x4, &(0x7f0000000180)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'macvlan1\x00', 0xfd2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000780)={0x1, &(0x7f0000000600)=[{0x3d}]}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000001000)={'wg0\x00', @remote}) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b0000000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000009000400"/28], 0x50) 6m14.538401083s ago: executing program 1 (id=840): bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0, 0x91b1400079c52c93}, 0x105c34, 0x80000001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4}, &(0x7f00000004c0), &(0x7f0000000500)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 6m14.372429487s ago: executing program 1 (id=842): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000002135000000000000fdffffffffa46760af554b9ed80896ec0847fe9400ef1f5aa7e8fa991e37c048aa97fe2504b91a3246d719bb34f9276c5f749443c378427b923612bcd3434e836a696f8b0ddf03737d5ad8636d8fa88273c9dcd1a2205a268e2ae743f69b9c55492f8ca8f6bfcc786c39bbe4e62594ec344e54a6706579f794916ec8faaa59969524d149b25362e9437b874c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, &(0x7f0000000380)="d772575eb91d61733e046326f4302ed27f2e5e85325c79d51a3b9707b801bfd29395d59237d55443d91fb13cbdb3e6ee5512e35917229886030cdfebaea1add4189418da819131b6c860b831f7384564", &(0x7f0000000600)=""/240}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r4}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r3, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000a40)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r7}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r8}, 0x10) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r9}, 0x8) write$cgroup_int(r10, &(0x7f00000001c0), 0xfffffdef) write$cgroup_int(r10, &(0x7f00000002c0)=0x9, 0x12) write$cgroup_subtree(r10, 0x0, 0xfe1b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) 5m59.350520827s ago: executing program 32 (id=842): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000002135000000000000fdffffffffa46760af554b9ed80896ec0847fe9400ef1f5aa7e8fa991e37c048aa97fe2504b91a3246d719bb34f9276c5f749443c378427b923612bcd3434e836a696f8b0ddf03737d5ad8636d8fa88273c9dcd1a2205a268e2ae743f69b9c55492f8ca8f6bfcc786c39bbe4e62594ec344e54a6706579f794916ec8faaa59969524d149b25362e9437b874c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, &(0x7f0000000380)="d772575eb91d61733e046326f4302ed27f2e5e85325c79d51a3b9707b801bfd29395d59237d55443d91fb13cbdb3e6ee5512e35917229886030cdfebaea1add4189418da819131b6c860b831f7384564", &(0x7f0000000600)=""/240}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r4}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r3, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000a40)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r7}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r8}, 0x10) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r9}, 0x8) write$cgroup_int(r10, &(0x7f00000001c0), 0xfffffdef) write$cgroup_int(r10, &(0x7f00000002c0)=0x9, 0x12) write$cgroup_subtree(r10, 0x0, 0xfe1b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) 33.958831423s ago: executing program 4 (id=2287): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1}, 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000002c0)=0x10000) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r2, 0x0, 0x0}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v\x00'/20, @ANYRES32, @ANYBLOB="000000090000000000000000000000000000cce7cc93533cbd994718de786a33dc0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="98e701d6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r9) 27.969558029s ago: executing program 4 (id=2287): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1}, 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000002c0)=0x10000) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r2, 0x0, 0x0}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v\x00'/20, @ANYRES32, @ANYBLOB="000000090000000000000000000000000000cce7cc93533cbd994718de786a33dc0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="98e701d6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r9) 23.569737094s ago: executing program 4 (id=2287): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1}, 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000002c0)=0x10000) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r2, 0x0, 0x0}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v\x00'/20, @ANYRES32, @ANYBLOB="000000090000000000000000000000000000cce7cc93533cbd994718de786a33dc0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="98e701d6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r9) 16.789351286s ago: executing program 4 (id=2287): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1}, 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000002c0)=0x10000) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r2, 0x0, 0x0}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v\x00'/20, @ANYRES32, @ANYBLOB="000000090000000000000000000000000000cce7cc93533cbd994718de786a33dc0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="98e701d6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r9) 10.956198448s ago: executing program 4 (id=2287): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1}, 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000002c0)=0x10000) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r2, 0x0, 0x0}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v\x00'/20, @ANYRES32, @ANYBLOB="000000090000000000000000000000000000cce7cc93533cbd994718de786a33dc0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="98e701d6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r9) 7.400610298s ago: executing program 5 (id=2704): unlink(&(0x7f0000000040)='\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0xa002a0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x6414, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x202}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x28, &(0x7f0000001400)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x18) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r2, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000800), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0x14, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x253}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@jmp={0x5, 0x1, 0xb, 0x0, 0x5, 0x6, 0x13}, @alu={0x7, 0x1, 0x6, 0x1, 0x8, 0xfffffffffffffff8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ldst={0x2, 0x3, 0x2, 0xa, 0x9, 0x40, 0x1}, @ldst={0x3, 0x0, 0x6, 0x5, 0x7, 0x1, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000400)='syzkaller\x00', 0xfffffffc, 0x7b, &(0x7f0000000580)=""/123, 0x41100, 0x4, '\x00', r3, 0x17, r4, 0x8, &(0x7f0000000780)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0x3, 0x2, 0xfffffffe}, 0x10, 0x22e15, r5, 0x0, &(0x7f0000000840)=[r2, r2], 0x0, 0x10, 0x80000000}, 0x94) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000880), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18021200000000000000000000000000850000007554b4680200000095000000"], 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r1}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) 7.229486701s ago: executing program 5 (id=2705): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={0x0, 0x0, 0xa8, 0x0, 0x1, 0x7}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, 0x0, 0x0) r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') ioctl$TUNSETNOCSUM(r4, 0xb703, 0x0) 6.790696319s ago: executing program 5 (id=2708): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x407fff, 0xaea}, 0x14325, 0x32, 0xfffffbff, 0x3, 0x2, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_bp={0x0, 0x8}, 0x100e0, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x27, 0x2, 0x0, &(0x7f0000000440)={0x0, 0x0}) 6.653364912s ago: executing program 5 (id=2711): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000", @ANYRES32], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b1da4bd9dcd1b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="180400000000000012000031000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000a80)={0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=""/235}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000340)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001380)='ns/mnt\x00') r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./cgroup\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_alloc\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) syz_clone(0x43001000, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 6.590291883s ago: executing program 3 (id=2712): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000090000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x7fff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0x12, &(0x7f0000000dc0)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000c530ff070700000018000000ff0100000000000010000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xe, 0xf5, &(0x7f0000000840)=""/245, 0x41000, 0x60, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1, 0x6, &(0x7f0000000240)=[r0, r0, r0, r0, r0], &(0x7f00000005c0)=[{0x2, 0x4, 0x3, 0xa}, {0x2, 0x1, 0x6, 0x1}, {0x2, 0x4, 0xb}, {0x3, 0x2, 0x3, 0x3}, {0x3, 0x3, 0x4, 0xa}, {0x4, 0x2, 0x4, 0x8}], 0x10, 0x10000}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9, &(0x7f0000000a00)=[{}], 0x8, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', r4, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1833fab62c0000000000e3ffffff00b5181100", @ANYRESHEX=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0x0, 0x26}, 0x28) syz_clone(0x206000, &(0x7f0000001980), 0x0, 0x0, 0x0, 0x0) 5.887513067s ago: executing program 3 (id=2714): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x3a, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffd}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfd, 0xfd, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xb02}, 0x0, 0xc8, 0x10003, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfdef) socketpair(0x10, 0x3, 0x4, &(0x7f0000000180)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'macvlan1\x00', 0xfd2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000780)={0x1, &(0x7f0000000600)=[{0x3d}]}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000001000)={'wg0\x00', @remote}) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b0000000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000009000400"/28], 0x50) 4.931559505s ago: executing program 3 (id=2718): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff0001}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='timer_start\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) (fail_nth: 6) 4.272138648s ago: executing program 4 (id=2287): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1}, 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000002c0)=0x10000) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r2, 0x0, 0x0}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v\x00'/20, @ANYRES32, @ANYBLOB="000000090000000000000000000000000000cce7cc93533cbd994718de786a33dc0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="98e701d6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r9) 4.231359178s ago: executing program 3 (id=2720): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0ff1100001f79a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7040000050000006a0af2fe00000000850000001a000000b700000000000000950000000000000000e154cd844a954b26c933f7ffffffffffffff55bb2007ee51050512da90b5b42128aa090a79507df719af36349f298129da4871307b534bf901115e17392ac66ad022186a8929d1c000006146001e04aeacea799a22a2fa030000c412f6cae80043eb27d53319d0ad229e5752548300000000dbc2777df1509516f06f1330cf8c3a8b1ff72e6127b0dd488318b5790bee7ebd4745b7cdd77b85b941092314fd085f028f4e09d63781987af2abd55a87ac0394b2f92ffab7d153d62058d0a413b217369ca8b6712f000000001b1df65b3e1b9bf115646914ce53d13d0ccacda1ef16fdcceaede3faedc51d29a47fc813ce3d32cfc7a504c271d6d6f4ea6bf97f2f1be2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804d4a69bf9bc5fa77ee293fbd165a5a68488e40b030166565a097b1b44b451de7940b0000db8db03d4b7745fef1d04ec633dee254a6d491b8496da787e814c4fdf0b4a387b4c8149d18c1020029a18986252a70f8f92eb6f0e8c7db000068fbaa2e2a27efd9104297f2c58159f02d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa909ac06b57479321a0574fb304bc2a1681989328c8ddc20ea011bf5742e0ef94234db1f00000000000000c20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b35f421c3552772ca7f3e2c25a65f75ca13fb7c8bbd6ff43cb78b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41aad8bda74d66f47cc17d8ba3eec0fd80f82c5f573c6d294d366505000000da0fde0745db06753a7ac7fe13cab6692422a46e9ffe2d4a2d32f7528751313694bf5700b20ef0c248ddd3da323947004cacadcaff2066bb5d4045c9585638c2153a6eee01738b0c10671f4f559b7dcb98a6273b8c5f1e24d9f679e4fbe948dfb4cc4a389485ee7af1f0387c93559653f50a471c69608241730459f012b060e7d23fd39206000000000000eb55d00162325ba141bd587cc9dad46de56ef907b059b99a79ae5498f6589880ed6eea7b9c670012f80cd6a1397953ba5870786554df26236ebced9390cb6941b8365d936a7d2120eca291963eb2d537d87cbb54e588ee5d6944ee4de5c183c960119451c31539b22809e1d7f0c7a06a9fa87d64cb77872a0aa9a104e16b3b8c6e64836ac3f32f53c9a2bae513464ca03aff14b9aa4bd9539f5096412b92012e095b84c202060098df3314f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c363000000000223201780200c6ed7966130b547dbf8b497af0a77f52f2cd39000000200000e81c23cf14156951210001c800000000001500000000000928ee53595a779d243a48cea769470424d28804c026ab7f4a5c81921e0128dfd70b438af60b060000000000000056642b49b745f3bf2c01808b6d7d748308eea09f0161b4735efbf3411738d6ee7aebf9ef40662d7836d252c566e1ee938a9a6804ed3a1079b0282a12043408cd60b9e53978c81839be0000000000456f7d2a42cb13da2022f23eaec61854f640f701db0276652f6c74f20675eb781925441578e93046aaddea394cd8ffd3d628293e591dc6f71c2710a7ea8a4fdc214e1cc275b26adfa892e6de9200000000e50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab50fe82d5a96b09c68c73de2f04f15d005387577f480000ea65559eb00e014df20fa209bcbb5c252b11a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cdfba05e3633c26d3927ae1beb065f5ac33fdbe28a5ffc83f2f085185cc92fe7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2b2bdc0af7c4c61241750d50515a59a3ad09e8802e8f4f535447dc0fc9d5f99a145dfcedad69da9cd4b75c624600e78f4458542b14f29611f95d4a318384eb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d583f436137a3c5dc714c9402c21d181aae59efb28d4f91652f6750b9195599d60c534ee8e8ff0755b09004c25edb85bcff24c757aa80900000000b6638c420eb4304f66e3a37aaf000000c42a570f0e9d76fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284df80e4636c25b96174326d82761c26e329555f9290af40000000000000100000fd3763655500344bae34347f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419a5c16e2055b8505809ed2ee9647c5d3b0000bc00edf5e9020c09ab004321610b857e8717974b633b21cb32f0e03280e09758bd445ab91d201782d656ab09f508bbbaca005452b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92b32af00f191b66b6a6f732a91f0a2e9120be61e58c79d497247d278888901d44bf77e8246605a644e9e3d769db497c3960df05caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f3101985602688888ccb85c87b4f8ffffff7f000000002c331fca28541b7ca211115b43f8b1894c8fa8a14dc4810f61ae96c18cc7130000000000000102000000000000000000000027c9585c0cead5d619d18475ccde2857279a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77a23b0000e49666c464d35ca9b50f3ed3b3da8c17a23692759ccf5a205311b7d122532697b861dfb54609fd88e6043bd52ae84c1bb0c8a6c769da52b3d42c68a3102fa1296dfff4a979369b0e8ebc62887aa46e820a74f91381dcc198e353047db70686d147357024eb3cb94f1e8918a0d6e2949affcacb5ba0a56aa063b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76b0d395832f1e2aad3e519f1634e8fbd8d31330d89069f9448a2ff93060ff073b3a113e47edf76f7d1b8b90bc0df4cfb0b9c8c80158b44ecae9420654f7016b0aac117087406d343e27b372d6027ab2aec8f2bcad7fe6bb932bc5751d2974e95455a277fa3b472bc7bbdd2ac5a1ea608e8137ace03361607cc1a84be659355629ab13ad49008c3fcfa2423439a3607961d5b59da48a0155e8e42cc13c702cc40c99cf86c2021d72f9f4ab1b00de555a5a39593c93871ff7eb5ecadb64837a2d88723ef65aa5152e3d55e5c66585e2112f5ec64b639a9864e57581b61f2b0960600000000000000265f091e7bce17d20604c5ab751773a5cf8a719a7ada06ed03832bf274707c7c970edc20f4a1eaa3b61045a20097208d03f7a146a6901913618738679d4e0af53eae997eecfa0dc3dcec19d3d9205450765d659200c92701ee75c8710470d9eb6f62c5c721883f1544ba66271c8dab05a933746c16b6e93294b561c6715a32a394ed1e6c01670c931bfa76c58c6f34d64e758a7a7f7d33c49336d4cba2cbb170ad7539a45774dfcc55257215c8ae719dc1c232fc6699ef01005887d04a543030b4328ab48744ac23ff56fd2da52eb9fb2eefcdd2d92d73ac1b111ea895e1fec36a3579879acfe366d393f1fa9cbe08d9ba57a443643e9cd251dc88e91a5e458e66ea1e822d55d4dd919a95eb4c25a08cb6e1070000003a0fd07a4ad9df240e00006aaa2db0dfe416146840d88bd08365e547c970e2983200703864a3b9c4682cb479dad6d34d211b05267eb1355520e9ec0c5014b0832f7fb35782fdbfcbf5e23a7f5d51ea480371748d18d8e10608ab8261fe058d1732f28814a9981d84a04a2bb36c89bdd245e3293a14df1ac567301a79514f103abd387d6ef2d9d94508ac0f6135c8921279573eefd5d4e33b9ef585980789a94d9848906f545559d30000b5040f0776703363249ca984cbb09752f099efbb9e7362e4999594c1086d8958e9469db01d85fb0b9b3148663e9ea2e755d96c70e540b4200e4cf82986712dd733b26d00e947d03c42215118426d548cb2077b43b89e4163d260faea1db53e2cf3427c90aefa2662a1c2b28b0e020e872bda1d39da508de5dbc37d03ee056b2579a1d16799589a2600000000aa00006c94bcaf115fbbcb212e3cb7fd9afe16d1fff2d047e508aa5f6de0ea4e9ec1b3a4ab1f8b5f312fc50000000000000000000000000042709db6de7e969ac0ce18b47280fb1b1b1531648122fed3e25edecb5200f5000000000000166f7d36b2966c19af7ffa6afa69e50821c9aa3ae60fbc196cf8ad2f7f86d79db1bb0ecbf9c3d0d3d407574def838e4def26ed9c7e6c69858f7813be8ffc565583663bebfe7485660b67e1436cbc6d4d3c48ab7b033d7d1195173edb16643f69cb779802839d490a4df94e5ea89c192af2ae83876edd59c9a7140e12ba591f073ec604f7e8f1e100cd414e9237ecfc052d9a73a868cd0e4b06da0435af72fb0d25657e8f5464b19fa83f977e6900000000367871fa37420e7a232ef9b440bb0639994c655d144c5786939d6a187b81f9ddd2bec36cd28371b1754cb6c53697fb23576ee0d3fd0a5803c9be9fe364803184f1a7a9a8eb64d17d238fa3238a001aa8ed040a69e9ec0a627e3b3ca64d4680d819c14c71684581000000000000000000000000000000000000c6a6587715865fe14558960bc936bc838bd1f2a00b17a407457681d0760000000000000040000000000000000000004faeabea6de40ae30291662594c993099ef041c264a64d77d69e0cdfa620a191704cef91e269044acf844de65a099200265e13c2a8f9b717886dea8e79407e34bc268a17965033ca1dfeeaf9b49bc68f1546595642f9fc008875ddb7aebda7a16b1d20dd8b65bcdac8cdc75a173fd2e57a9c37bf5a52ea001ec981dd7ad4e5944575ced39233ada8f3c1b856644812828bb79536a5188d14fe537250dc107121534cbbc7598f48aa2335616ae8eb72acf6982048e568e37f1f58e9714343587734c7ec0fa5c44d13165d6384bf9500757b4b0275950d6e7c451eef3fd353d47c54c4c2cf7318e6c24583ba0966225284d1abac80786519c563ddf0e6c023d537ca6e0d6d4e072c98f45415d13f0dcea174f162ebd00b42264f6fa3dccd09f4101dd254e54423b30e06713eccfacb6ffb38afff920980af938a4d78f4b9a6b5c7424e91121cda789104ee490d25843f1622bba93257cc23e45cd7ed42abdb991d51804e674e507dfd53b5ab6944df33f4f494b926f2ceb329550b46e82a939ad82b385e66809d7d4d3630b6f22c2f41fdaa0fadeea09fa4f7005813643c2d6307d55689faf6f656327ac5872a3bd4c11363909a8b9f30e5401993a0f6e1a9b42287542647d1e86b02b7e36319414629ac1f35e1457f922da0c2de76c9e97944efad0a3ad78cda81c5b82709d696e85bbf4595ef9664a6aff8cf96446cb6c26595f4eb659d26c846471f6551dbb24fc6c03a01e33efcd5939472b687d31be9bd9bd1bcda45bd2236f06c000000007d348ebcb9d810d4dc3d55bbe4055ce9c45267daeec7a7d8b498f507e933cc02fb53c2c28fa09ce5ada5de1415309761f6378c794f8ce23c1f7add4f65280ab446ea2d130000000000000000000000d1a0313ff63bc4e4463688db1d6ac7f4595a02c89349a973f118d936f33ea18e69d7739f4532e1b8580ef125b47cf5b402b6f2beffed6cc9afe2b548c4dbc78363118818d9473f29d52444685c41620eeaeb1f8786e87aeaf287fb9b63b30e6761507503dcd47b64f0b6157999c82bd151bee0c67f3e664225bd917b38aeae1da5524eefef1772d759df9ec9b4197383f9a66217e180e434e650dd560aa3ed42acddd44d6f45807a3c63e15929cfbebc7eef1a319d3147a6c06bd974168ac689392fa851ebdf524ca2331148ff7e855cccc106074ca92153734d5c5e3f9efc6592b08e0c07c7b5d42ec71484bb2a4c0f4293138369f39f9fa4a9cc607b42ba6102f918ce4e76d66fba450e940ed6a6a301a0b761a9cd849962fae5059bda419fd2a170ea387c10a4ada5893f38486069ef1bfdbb432ab322c887d7a94fa967135833157bafbed3b48bb267fc3aa56d1e5b66417a673b40884fc91ec9558eab6a08222dfe37767095b2d94cda881290d6017137595cdd53972353f485adfde8015cac0e1acd64ca97d67023f75a54b1ebe55053652ad16292a15e79dc58ba080f795f1a548da6f669e5c34afc272e5a32e85d5f44979431eab3fcd8d33d54000000000000000000ff1f3f6f4b33adcbee66736b4b35b5b909bc7ddd03f17f5f6436156a56c7e77e0808703b370f0cb4f00074200ae3e4ea0611d548f34582848903e4459d0a18ab9b113ebc614fafe4bd03cb1a8843e592f1b102b1bb87f13c50a1dc5df223e5bbcd06c55393f9c0e08ab6509bbed0dfedbf37309c99bf1e1fc7512afb7bd334653356419f8aa57f1224a54a85a3041657fb5037dda5b0f2e6a9673cc0d51b28954ef8c0ca82e69d198729b2c984a04b0f6ef9486767f5928461df5b8f84e0b790fa7d9088fdb7b7e6f020d4eae420155f1739307421fc3e9d4ffaffff2434f3d167d24bead3c6cedb2dd480d5c8b21c0edb06893c1fb18e9e716525f115055a84daca135d8972280324a9ffd4e636c87225c2512eb3e0fe65972c84361536e52a6ea677ffcb4bf8fac2009f24c01b7c86c203ce9093dd53b154110f033a25034752dc8561ed7bb7343e069ba1ad6f1d7437b584d2c292088d3d80e8834ae8760cc0211cb03f3ed168131eba4c8a0000000000000000000000000019c2dbe83523a58f68e66fa9fdf1d2878bf2ff524e6da7f918e87c1b1de17ff8077ba247fd5498310ae532b9bc6c583edfa97f7a4c00cce855a225dc017afc3c06e8a72b62bdb64e83cb6a319eb551345cfb24aaa02ddc4ec2daa942dc6e2332d724b11c0d9c8ff4ee94849938f5d231fdb5984d5442b564c079fce70ac620dcf7739693beca9dff66e957dd2fc03ce462da31e7f7a657118387727e8500"/5107], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x11, 0x0, &(0x7f0000000180)="5620d59bb619dfc227b53d1f52b3cbfcbc", 0x0, 0xf001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.358500045s ago: executing program 0 (id=2721): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="e8b3ce7f115396024a3d0e0000000400cd0000000000", @ANYRES32, @ANYRES8=r0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='qdisc_enqueue\x00'}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) close(r6) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r7 = openat$cgroup_procs(r5, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000001c0), 0x12) bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r0}, 0x8) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="10000000040000000400000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r6}, &(0x7f0000000a00), &(0x7f0000000200)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r10}, &(0x7f00000004c0), &(0x7f00000008c0)=r0}, 0x20) 2.357084495s ago: executing program 5 (id=2722): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x3a, 0x1d, 0x0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755", 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffd}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfd, 0xfd, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xb02}, 0x0, 0xc8, 0x10003, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfdef) socketpair(0x10, 0x3, 0x4, &(0x7f0000000180)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'macvlan1\x00', 0xfd2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000001000)={'wg0\x00', @remote}) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b0000000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000009000400"/28], 0x50) 2.356522165s ago: executing program 2 (id=2723): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x3, &(0x7f0000000440)=@framed, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, 0x0, &(0x7f00000004c0), 0xce, r0}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x5, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000008000000000000000000000001801000020756c2500000000002020207b1af8ff00"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sys_enter\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f00000004c0)={&(0x7f0000000200)=@phonet, 0x80, 0x0}, 0x2020) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 2.356236095s ago: executing program 3 (id=2724): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000090000000300000009f2d05f8a2c03f1", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r5) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x2, 0x1, 0x7fff, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES8=r0, @ANYRESHEX=r2], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) 2.215634757s ago: executing program 0 (id=2725): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x3000000, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200}, 0x28) 1.795221816s ago: executing program 0 (id=2726): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="001a000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffff070000000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="09000000070000000000010003"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000340)={&(0x7f0000000700)=""/191, 0xbf, 0x0, &(0x7f00000007c0)=""/218, 0xda}}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000003000000000000000", @ANYRES32, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000050000000500"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xa, 0x0, &(0x7f00000004c0), 0x0, 0x9, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x2, 0x7, 0x7}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r4, 0xffffffffffffffff, r2, r1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000600), 0x10, 0x4}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x3b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r6}, 0x10) close(0xffffffffffffffff) 1.625205799s ago: executing program 0 (id=2727): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r1, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={0xffffffffffffffff, 0x18000000000002a0, 0xb, 0x0, &(0x7f0000000040)="76ea090000000000009ba5", 0x0, 0xfffffe01, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x14, &(0x7f0000000040), 0x3b) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x12, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x6d}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.509214861s ago: executing program 2 (id=2728): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x7fff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0x12, &(0x7f0000000dc0)=ANY=[@ANYBLOB="18000000feff77e28000e67ccb4d2e2c325900faeb825741b7068973a647f2a9597d98d9780de89ba462602d55e9398b3748ecb220220bc7d4f1ed517db3e43bad3b1a1728980de230c08aba2ef15aeb42752a1409623c2e8198f26e4c9b77ed6a663a53ce9dcf1149192b0bac5cdeed67ab43bcca859cb55e5ac6e34a25f81bb816e4bd1146402cf52f34b5851fd9416aa92dede273ed5fc63eeef966afc35f32c18fb5edbc77406947684bc9cd78fc44a7579cc49a77", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000c530ff070700000018000000ff0100000000000010000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xe, 0xf5, &(0x7f0000000840)=""/245, 0x41000, 0x60, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1, 0x6, &(0x7f0000000240)=[r0, r0, r0, r0, r0], &(0x7f00000005c0)=[{0x2, 0x4, 0x3, 0xa}, {0x2, 0x1, 0x6, 0x1}, {0x2, 0x4, 0xb}, {0x3, 0x2, 0x3, 0x3}, {0x3, 0x3, 0x4, 0xa}, {0x4, 0x2, 0x4, 0x8}], 0x10, 0x10000}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9, &(0x7f0000000a00)=[{}], 0x8, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', r4, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1833fab62c0000000000e3ffffff00b5181100", @ANYRESHEX=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0x0, 0x26}, 0x28) syz_clone(0x206000, &(0x7f0000001980), 0x0, 0x0, 0x0, 0x0) 1.017767051s ago: executing program 2 (id=2729): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x3a, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffd}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfd, 0xfd, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xb02}, 0x0, 0xc8, 0x10003, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, 0x0, 0xfdef) socketpair(0x10, 0x3, 0x4, &(0x7f0000000180)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000780)={0x1, &(0x7f0000000600)=[{0x3d}]}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000001000)={'wg0\x00', @remote}) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b0000000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000009000400"/28], 0x50) 872.822854ms ago: executing program 5 (id=2730): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x101400, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x371f6458}, 0x108d80, 0x0, 0xfffffffd, 0x6, 0x407c, 0x7, 0x8004, 0x0, 0x0, 0x0, 0x4717}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660ad76400000000611184000000070eff8e1a5f0000000000000000000000000000000000950000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6b00}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x3, 0x4, &(0x7f0000001000)=ANY=[@ANYBLOB="18000000000000000000000000000001850000004f0000009500000000000000844b473f62813e9b87d660e54047364a80fc2a789ace3f328417a9864ae17a"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000020000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='percpu_free_percpu\x00', r5}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB='\x00'/22], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000018110000", @ANYRES32=r6], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x42a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}], 0x70}, 0x2160) 678.831237ms ago: executing program 2 (id=2731): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc2a00e9bfde908990817b364e51afe9c8dab05b16a6437211f9f0570759f1cae63487ff68fffffffffffe8e3932e2b75a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba7541189070000f50c000000d8e5b1dc91c5499be2097784a94b6cc2d272ac751d8bce5db4862c1b2eab7007ceea158dbc329bab5f8450147b2b9629fdd6cdb5507d3a76dbaf6f93d161caa513f8aa41f795507856ea0015166c56ea0103220ed5a66834be086ef206a8606b04fc8462cbbe8233f381b4eefbdbdac708c1f4959cb6c008397006da8e243ec9fb19f3fab2b0f46d73a9f2d7c674cdbe4d7f76f5fbd05043e81f435fccf5063a93aa9b4c7f68670594"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x3000000, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200}, 0x28) 600.534249ms ago: executing program 0 (id=2732): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={0x0, 0x0, 0xa8, 0x0, 0x1, 0x7}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) r4 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(r4, 0xb703, 0x0) 480.624881ms ago: executing program 2 (id=2733): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/16], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x4, &(0x7f0000000000)=[{0x15, 0x0, 0x2, 0x80000000}, {}, {}, {0x6}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) close(0x4) 347.974844ms ago: executing program 0 (id=2734): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/16], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x4, &(0x7f0000000000)=[{0x15, 0x0, 0x2, 0x80000000}, {}, {}, {0x6}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) close(0x4) (fail_nth: 1) 192.790257ms ago: executing program 2 (id=2735): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000090000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x7fff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0x12, &(0x7f0000000dc0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000c530ff070700000018000000ff0100000000000010000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xe, 0xf5, &(0x7f0000000840)=""/245, 0x41000, 0x60, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1, 0x6, &(0x7f0000000240)=[r0, r0, r0, r0, r0], &(0x7f00000005c0)=[{0x2, 0x4, 0x3, 0xa}, {0x2, 0x1, 0x6, 0x1}, {0x2, 0x4, 0xb}, {0x3, 0x2, 0x3, 0x3}, {0x3, 0x3, 0x4, 0xa}, {0x4, 0x2, 0x4, 0x8}], 0x10, 0x10000}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9, &(0x7f0000000a00)=[{}], 0x8, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', r4, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1833fab62c0000000000e3ffffff00b5181100", @ANYRESHEX=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000f80)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000200000000000000000000020400000000009e37f42160be4097ab879df1a150ce13b44e2b3aac5158b5e090c67dd4809fd50da1bc40e9d506bd516e30c940614d2088801d023a80468baaf404d44ac4c9a18a506ebe3db7329db02c388c1b5929bb129220d6dd48fd43ce349c420660fcbb31b10178468437e4733169cc25cbdd2c0dd76be5e91e9ec2fa3ad1d404334725e0594e18a1f77d401b34ff0212a5695dd3e4c94009aa34629eeef50605167d5fa4d091ad53846bb2b34f822187c727926325a82c79ec6494931480b29eeeec34a143b6f64659bd4362800413eb11c9dc32eb297bb0b54c5e88f55a20"], 0x0, 0x26}, 0x28) syz_clone(0x206000, &(0x7f0000001980), 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 3 (id=2736): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x3, &(0x7f0000000440)=@framed, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, 0x0, &(0x7f00000004c0), 0xce, r0}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000017000000bca30000000000002403000040feffff6b0af0ff0000000071a4f0ff000000001f030000000000002e0a0200000000002604fdffffff000061140800000000001d430000000000007a0a00fe0000001f6114100000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff6194732827a58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566d674e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b702396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f37382000000000000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf799b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae633d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a6a274000000000000000000000000000000000000000000000009dd14b38f2f4426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd8f1d04166d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10baa804a707f0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0f7a4f9c2f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08acb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac987fd637c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703fd52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23ed080000000000002bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c370267cc51ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de0600ee477d71bf3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812fc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a2271d96c22fdcea26498d26229110b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf15dd64c9ece60b8588ee8777d0ea8f4713b258427c7d90f9e93348e17723ba9ab8ae790f74cc41ae5795d35f3cec40dff485d2802c08611454d9ea784a205bcc07ec26f906f3cf45bb37014ab6f22af6213618e242b283ea9d3f0677ee598072ec06f7170009d92bb7eddd12c378dfd3e74ec056ee83eef666423d934fc5908c9ff98715218a5964f1e00000000426ac9588e27aefe307f49662990ee823568bbc2f89596ced7c6c52d76b8096f1848410843b93fd404f535be474f456778b5ef85abb8fc2336abd5ea64a6efea8a5aca0015499b0200780a7bae4df603bd3c72808cf300440b1b638a6640f7de8d0d82f359ca2f779cd48cd8d3603f4f69e47f386988c9b7b5d6dd3d48a1fdca78fa04d7c87bea42161a4c0d7cf0125b43dc9d8845f3c05a08acda647e7143d0e0aee2949a45e2848890522c2288072467d2afe269f589fb7e034b92d3ca245b16b71998711bfe206c9690b6d0eebb06a29349229eb45ff15c63aa2c82c56d7420738cd1b04eb16e87cb524315d7361ea3635d3799bb7fcc56aa5e1dbe031a7a12554dee6754b72f43a6fddf427f32ec3df274a88097725679769beebf1aa6eb09d5154e4900000000000d0f7160a05911d969879953d3d4702b78825d5ed789711b77d40dc31e0b8fc651b45559da463f00000000000000005bae7859839f856e7a397913eec7977f6231c5f11849b3deabc60c5ccf240d16924eb760a969813be02a229c674045b88915518a17b683268f10358e1c0b20cfc2bd105e5e1db7fed951b8faf126267bb38b8d356f63d3433d3dee643503a8ba4968adf6673f720c474ecf324d989235f1b52aacfe52e4519af87b7e1594728d6d6fff1248e72d5b1b1b692b2b732f0f2ac0714079fd7bf97bf2b5687d1db91daa5210d09ebe66d00ff4f35143be01585e629d408f2d00a0a290db76adc5f57e160b2c188bb1ecc4e7d2948788e4f9c1bcaf91dac53a2f525f7385d5d82728b5217908748f4c22b6d797b5bbeb61411f88ee1554a78306fe"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x5, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000008000000000000000000000001801000020756c2500000000002020207b1af8ff00"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000004c0)={&(0x7f0000000200)=@phonet, 0x80, 0x0}, 0x2020) kernel console output (not intermixed with test programs): bability 0, space 0, times 0 [ 365.244688][T13166] should_fail_ex+0x3d4/0x520 [ 365.244718][T13166] should_fail+0xb/0x10 [ 365.244737][T13166] should_fail_usercopy+0x1a/0x20 [ 365.272308][T13166] _copy_to_user+0x1e/0x90 [ 365.276735][T13166] map_lookup_elem+0x466/0x5d0 [ 365.281505][T13166] __sys_bpf+0x49a/0x780 [ 365.285831][T13166] ? bpf_link_show_fdinfo+0x320/0x320 [ 365.291211][T13166] ? __cfi_ksys_write+0x10/0x10 [ 365.296065][T13166] ? debug_smp_processor_id+0x17/0x20 [ 365.301620][T13166] __x64_sys_bpf+0x7c/0x90 [ 365.306121][T13166] x64_sys_call+0x488/0x9a0 [ 365.310742][T13166] do_syscall_64+0x4c/0xa0 [ 365.315246][T13166] ? clear_bhb_loop+0x30/0x80 [ 365.320044][T13166] ? clear_bhb_loop+0x30/0x80 [ 365.324732][T13166] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 365.330645][T13166] RIP: 0033:0x7f4aa3f8ebe9 [ 365.335068][T13166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.354676][T13166] RSP: 002b:00007f4aa4ec8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 365.363534][T13166] RAX: ffffffffffffffda RBX: 00007f4aa41c5fa0 RCX: 00007f4aa3f8ebe9 [ 365.371507][T13166] RDX: 0000000000000020 RSI: 0000200000000e80 RDI: 0000000000000001 [ 365.379741][T13166] RBP: 00007f4aa4ec8090 R08: 0000000000000000 R09: 0000000000000000 [ 365.387729][T13166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.395710][T13166] R13: 00007f4aa41c6038 R14: 00007f4aa41c5fa0 R15: 00007ffd97ecc1b8 [ 365.403798][T13166] [ 365.426499][T13170] CPU: 0 PID: 13170 Comm: syz.5.1794 Not tainted syzkaller #0 [ 365.434005][T13170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 365.444128][T13170] Call Trace: [ 365.447405][T13170] [ 365.450331][T13170] __dump_stack+0x21/0x24 [ 365.454656][T13170] dump_stack_lvl+0xee/0x150 [ 365.459353][T13170] ? __cfi_dump_stack_lvl+0x8/0x8 [ 365.464424][T13170] ? try_charge_memcg+0x24a/0x15b0 [ 365.469554][T13170] dump_stack+0x15/0x24 [ 365.473827][T13170] should_fail_ex+0x3d4/0x520 [ 365.478687][T13170] should_fail_alloc_page+0x61/0x90 [ 365.483940][T13170] prepare_alloc_pages+0x148/0x5f0 [ 365.489076][T13170] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 365.494281][T13170] ? memset_erms+0xb/0x10 [ 365.498703][T13170] __alloc_pages+0x124/0x450 [ 365.503476][T13170] ? __cfi___alloc_pages+0x10/0x10 [ 365.508878][T13170] ? memcg_rstat_updated+0x56/0x110 [ 365.514184][T13170] ? folio_add_lru+0x260/0x390 [ 365.519057][T13170] __folio_alloc+0x12/0x40 [ 365.523489][T13170] wp_page_copy+0x255/0x15b0 [ 365.528087][T13170] ? fault_dirty_shared_page+0x310/0x310 [ 365.533808][T13170] ? vm_normal_page+0x1eb/0x200 [ 365.538680][T13170] do_wp_page+0x9f2/0xfc0 [ 365.543199][T13170] handle_mm_fault+0x10e4/0x2640 [ 365.548235][T13170] ? __cfi_handle_mm_fault+0x10/0x10 [ 365.553530][T13170] ? down_read_trylock+0x273/0x640 [ 365.558752][T13170] ? lock_mm_and_find_vma+0x9e/0x320 [ 365.564186][T13170] ? do_user_addr_fault+0x2ee/0x1050 [ 365.569491][T13170] do_user_addr_fault+0x63b/0x1050 [ 365.574633][T13170] exc_page_fault+0x51/0xb0 [ 365.579157][T13170] asm_exc_page_fault+0x27/0x30 [ 365.584330][T13170] RIP: 0010:copy_user_enhanced_fast_string+0xa/0x40 [ 365.590943][T13170] Code: ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 8d 0c ca 89 ca eb 20 0f 01 cb 83 fa 40 72 38 89 d1 a4 31 c0 0f 01 ca c3 89 ca eb 0a 90 90 90 90 90 90 90 90 90 90 [ 365.610817][T13170] RSP: 0018:ffffc9000af87680 EFLAGS: 00050206 [ 365.617170][T13170] RAX: ffffffff82616a01 RBX: 00000000000101d0 RCX: 000000000000e5d0 [ 365.625147][T13170] RDX: 00000000000101d0 RSI: ffff888128601cc8 RDI: 0000200000002000 [ 365.633123][T13170] RBP: ffffc9000af876b0 R08: dffffc0000000000 R09: ffffed10250c2053 [ 365.641363][T13170] R10: 0000000000000000 R11: 0000000000002030 R12: 00007ffffffeee30 [ 365.649511][T13170] R13: 0000000000010100 R14: ffff8881286000c8 R15: 0000200000000400 [ 365.657493][T13170] ? copy_pipe_to_iter+0x111/0x150 [ 365.662619][T13170] ? copyout+0x82/0xa0 [ 365.666719][T13170] _copy_to_iter+0x3f0/0xe50 [ 365.671469][T13170] ? irqentry_exit+0x37/0x40 [ 365.676138][T13170] ? __cfi__copy_to_iter+0x10/0x10 [ 365.681493][T13170] ? __virt_addr_valid+0x141/0x2e0 [ 365.686584][T13170] ? __kasan_check_read+0x11/0x20 [ 365.691705][T13170] ? __check_object_size+0x45a/0x600 [ 365.697169][T13170] simple_copy_to_iter+0x50/0x70 [ 365.702184][T13170] __skb_datagram_iter+0xf1/0x730 [ 365.707218][T13170] ? tsk_importance+0x150/0x150 [ 365.712058][T13170] ? __cfi_simple_copy_to_iter+0x10/0x10 [ 365.717711][T13170] skb_copy_datagram_iter+0x40/0x150 [ 365.723204][T13170] tipc_recvstream+0x6fe/0xe80 [ 365.728076][T13170] ? __cfi_tipc_recvstream+0x10/0x10 [ 365.733552][T13170] ____sys_recvmsg+0x2a0/0x590 [ 365.738511][T13170] ? __sys_recvmsg_sock+0x50/0x50 [ 365.743739][T13170] ___sys_recvmsg+0x1b2/0x510 [ 365.748510][T13170] ? __sys_recvmsg+0x270/0x270 [ 365.753613][T13170] ? __fget_files+0x2d5/0x330 [ 365.758431][T13170] ? __fdget+0x19c/0x220 [ 365.762678][T13170] __x64_sys_recvmsg+0x1ed/0x2c0 [ 365.767626][T13170] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 365.773074][T13170] ? sched_clock_cpu+0x6e/0x250 [ 365.777927][T13170] ? debug_smp_processor_id+0x17/0x20 [ 365.783405][T13170] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 365.789486][T13170] x64_sys_call+0x75/0x9a0 [ 365.793910][T13170] do_syscall_64+0x4c/0xa0 [ 365.798416][T13170] ? clear_bhb_loop+0x30/0x80 [ 365.803466][T13170] ? clear_bhb_loop+0x30/0x80 [ 365.808242][T13170] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 365.814237][T13170] RIP: 0033:0x7f5ab538ebe9 [ 365.818644][T13170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.838410][T13170] RSP: 002b:00007f5ab6238038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 365.846986][T13170] RAX: ffffffffffffffda RBX: 00007f5ab55c5fa0 RCX: 00007f5ab538ebe9 [ 365.854972][T13170] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000008 [ 365.863110][T13170] RBP: 00007f5ab6238090 R08: 0000000000000000 R09: 0000000000000000 [ 365.871219][T13170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.879294][T13170] R13: 00007f5ab55c6038 R14: 00007f5ab55c5fa0 R15: 00007ffc88c4d318 [ 365.887531][T13170] [ 365.906416][T13177] syz.0.1796[13177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.906499][T13177] syz.0.1796[13177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.139044][T13189] syz.3.1801[13189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.196801][T13189] syz.3.1801[13189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.322075][T13195] syz.0.1804[13195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.333694][T13195] syz.0.1804[13195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.384177][T13189] syz.3.1801[13189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.445350][T13189] syz.3.1801[13189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.308780][T13235] syz.0.1808[13235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.406079][T13235] syz.0.1808[13235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.426176][T13234] device pim6reg1 entered promiscuous mode [ 368.656012][T13267] device sit0 entered promiscuous mode [ 369.020099][T13288] FAULT_INJECTION: forcing a failure. [ 369.020099][T13288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 369.047211][T13288] CPU: 0 PID: 13288 Comm: syz.5.1830 Not tainted syzkaller #0 [ 369.054896][T13288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 369.064966][T13288] Call Trace: [ 369.068348][T13288] [ 369.071377][T13288] __dump_stack+0x21/0x24 [ 369.075896][T13288] dump_stack_lvl+0xee/0x150 [ 369.080518][T13288] ? __cfi_dump_stack_lvl+0x8/0x8 [ 369.085735][T13288] ? htab_lru_map_delete_elem+0x5e4/0x740 [ 369.091480][T13288] dump_stack+0x15/0x24 [ 369.095651][T13288] should_fail_ex+0x3d4/0x520 [ 369.100363][T13288] should_fail+0xb/0x10 [ 369.104810][T13288] should_fail_usercopy+0x1a/0x20 [ 369.109945][T13288] _copy_to_user+0x1e/0x90 [ 369.114463][T13288] generic_map_delete_batch+0x3f6/0x500 [ 369.120123][T13288] ? __cfi_generic_map_delete_batch+0x10/0x10 [ 369.126214][T13288] ? __fdget+0x19c/0x220 [ 369.130468][T13288] ? __cfi_generic_map_delete_batch+0x10/0x10 [ 369.136804][T13288] bpf_map_do_batch+0x48c/0x620 [ 369.142091][T13288] __sys_bpf+0x624/0x780 [ 369.146338][T13288] ? bpf_link_show_fdinfo+0x320/0x320 [ 369.151803][T13288] ? __cfi_ksys_write+0x10/0x10 [ 369.156762][T13288] ? debug_smp_processor_id+0x17/0x20 [ 369.162233][T13288] __x64_sys_bpf+0x7c/0x90 [ 369.166661][T13288] x64_sys_call+0x488/0x9a0 [ 369.171276][T13288] do_syscall_64+0x4c/0xa0 [ 369.175759][T13288] ? clear_bhb_loop+0x30/0x80 [ 369.180628][T13288] ? clear_bhb_loop+0x30/0x80 [ 369.185326][T13288] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 369.191230][T13288] RIP: 0033:0x7f5ab538ebe9 [ 369.195767][T13288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 369.215546][T13288] RSP: 002b:00007f5ab6238038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 369.224249][T13288] RAX: ffffffffffffffda RBX: 00007f5ab55c5fa0 RCX: 00007f5ab538ebe9 [ 369.232262][T13288] RDX: 0000000000000038 RSI: 0000200000000180 RDI: 000000000000001b [ 369.240519][T13288] RBP: 00007f5ab6238090 R08: 0000000000000000 R09: 0000000000000000 [ 369.248514][T13288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 369.256779][T13288] R13: 00007f5ab55c6038 R14: 00007f5ab55c5fa0 R15: 00007ffc88c4d318 [ 369.264863][T13288] [ 371.794138][T13341] FAULT_INJECTION: forcing a failure. [ 371.794138][T13341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 371.925065][T13341] CPU: 1 PID: 13341 Comm: syz.5.1845 Not tainted syzkaller #0 [ 371.932683][T13341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 371.943156][T13341] Call Trace: [ 371.946457][T13341] [ 371.949599][T13341] __dump_stack+0x21/0x24 [ 371.953946][T13341] dump_stack_lvl+0xee/0x150 [ 371.958543][T13341] ? __cfi_dump_stack_lvl+0x8/0x8 [ 371.963818][T13341] dump_stack+0x15/0x24 [ 371.968096][T13341] should_fail_ex+0x3d4/0x520 [ 371.972893][T13341] should_fail+0xb/0x10 [ 371.977105][T13341] should_fail_usercopy+0x1a/0x20 [ 371.982347][T13341] _copy_from_user+0x1e/0xc0 [ 371.986996][T13341] __sys_bpf+0x277/0x780 [ 371.991244][T13341] ? bpf_link_show_fdinfo+0x320/0x320 [ 371.996721][T13341] ? __cfi_ksys_write+0x10/0x10 [ 372.001766][T13341] ? debug_smp_processor_id+0x17/0x20 [ 372.007415][T13341] __x64_sys_bpf+0x7c/0x90 [ 372.011937][T13341] x64_sys_call+0x488/0x9a0 [ 372.016553][T13341] do_syscall_64+0x4c/0xa0 [ 372.021432][T13341] ? clear_bhb_loop+0x30/0x80 [ 372.026378][T13341] ? clear_bhb_loop+0x30/0x80 [ 372.031170][T13341] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 372.037652][T13341] RIP: 0033:0x7f5ab538ebe9 [ 372.042368][T13341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 372.063216][T13341] RSP: 002b:00007f5ab6238038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 372.071929][T13341] RAX: ffffffffffffffda RBX: 00007f5ab55c5fa0 RCX: 00007f5ab538ebe9 [ 372.080143][T13341] RDX: 0000000000000094 RSI: 0000200000000380 RDI: 0000000000000005 [ 372.088131][T13341] RBP: 00007f5ab6238090 R08: 0000000000000000 R09: 0000000000000000 [ 372.096122][T13341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 372.104095][T13341] R13: 00007f5ab55c6038 R14: 00007f5ab55c5fa0 R15: 00007ffc88c4d318 [ 372.112250][T13341] [ 372.210948][T13349] FAULT_INJECTION: forcing a failure. [ 372.210948][T13349] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 372.346946][T13349] CPU: 0 PID: 13349 Comm: syz.3.1848 Not tainted syzkaller #0 [ 372.354795][T13349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 372.365205][T13349] Call Trace: [ 372.368583][T13349] [ 372.371529][T13349] __dump_stack+0x21/0x24 [ 372.376049][T13349] dump_stack_lvl+0xee/0x150 [ 372.380678][T13349] ? __cfi_dump_stack_lvl+0x8/0x8 [ 372.385751][T13349] ? __cfi___alloc_pages+0x10/0x10 [ 372.390890][T13349] dump_stack+0x15/0x24 [ 372.395052][T13349] should_fail_ex+0x3d4/0x520 [ 372.399741][T13349] should_fail+0xb/0x10 [ 372.403917][T13349] should_fail_usercopy+0x1a/0x20 [ 372.408967][T13349] copyin+0x20/0xa0 [ 372.412781][T13349] _copy_from_iter+0x3e2/0xfd0 [ 372.417556][T13349] ? __kasan_check_write+0x14/0x20 [ 372.422705][T13349] ? __cfi__copy_from_iter+0x10/0x10 [ 372.428014][T13349] ? check_stack_object+0x81/0x140 [ 372.433241][T13349] ? __check_object_size+0x45a/0x600 [ 372.438898][T13349] skb_copy_datagram_from_iter+0xf7/0x6b0 [ 372.444816][T13349] ? __cfi_avc_has_perm+0x10/0x10 [ 372.450040][T13349] ? is_bpf_text_address+0x177/0x190 [ 372.455449][T13349] ? skb_put+0x10e/0x1f0 [ 372.459773][T13349] unix_stream_sendmsg+0x4c8/0xa70 [ 372.464884][T13349] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 372.470632][T13349] ? stack_trace_save+0x98/0xe0 [ 372.475713][T13349] ? __stack_depot_save+0x36/0x480 [ 372.480906][T13349] ? security_socket_sendmsg+0x93/0xb0 [ 372.486387][T13349] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 372.492025][T13349] ____sys_sendmsg+0x5a9/0x990 [ 372.496830][T13349] ? __sys_sendmsg_sock+0x40/0x40 [ 372.502020][T13349] ? import_iovec+0x7c/0xb0 [ 372.506526][T13349] ___sys_sendmsg+0x21c/0x290 [ 372.511449][T13349] ? __sys_sendmsg+0x270/0x270 [ 372.516197][T13349] ? __kasan_check_write+0x14/0x20 [ 372.521307][T13349] ? proc_fail_nth_write+0x17a/0x1f0 [ 372.526575][T13349] ? vfs_write+0x9d6/0xca0 [ 372.531078][T13349] ? __fdget+0x19c/0x220 [ 372.535301][T13349] __x64_sys_sendmsg+0x1f0/0x2c0 [ 372.540320][T13349] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 372.545852][T13349] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 372.552090][T13349] x64_sys_call+0x171/0x9a0 [ 372.556594][T13349] do_syscall_64+0x4c/0xa0 [ 372.560991][T13349] ? clear_bhb_loop+0x30/0x80 [ 372.565682][T13349] ? clear_bhb_loop+0x30/0x80 [ 372.570538][T13349] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 372.576506][T13349] RIP: 0033:0x7f4aa3f8ebe9 [ 372.581006][T13349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 372.601126][T13349] RSP: 002b:00007f4aa4ec8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 372.609754][T13349] RAX: ffffffffffffffda RBX: 00007f4aa41c5fa0 RCX: 00007f4aa3f8ebe9 [ 372.617976][T13349] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000005 [ 372.626368][T13349] RBP: 00007f4aa4ec8090 R08: 0000000000000000 R09: 0000000000000000 [ 372.634426][T13349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 372.642389][T13349] R13: 00007f4aa41c6038 R14: 00007f4aa41c5fa0 R15: 00007ffd97ecc1b8 [ 372.650441][T13349] [ 374.206951][T13393] device syzkaller0 entered promiscuous mode [ 374.512429][T13405] device wg2 left promiscuous mode [ 374.561655][T13410] bpf_get_probe_write_proto: 2 callbacks suppressed [ 374.561680][T13410] syz.5.1862[13410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.606822][T13410] syz.5.1862[13410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.825865][T13406] device wg2 entered promiscuous mode [ 375.736914][T13419] syz.2.1865[13419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.736985][T13419] syz.2.1865[13419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.955957][T13426] FAULT_INJECTION: forcing a failure. [ 375.955957][T13426] name failslab, interval 1, probability 0, space 0, times 0 [ 375.980754][T13426] CPU: 1 PID: 13426 Comm: syz.2.1868 Not tainted syzkaller #0 [ 375.988318][T13426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 375.998745][T13426] Call Trace: [ 376.002050][T13426] [ 376.005010][T13426] __dump_stack+0x21/0x24 [ 376.009517][T13426] dump_stack_lvl+0xee/0x150 [ 376.014128][T13426] ? __cfi_dump_stack_lvl+0x8/0x8 [ 376.019249][T13426] dump_stack+0x15/0x24 [ 376.023663][T13426] should_fail_ex+0x3d4/0x520 [ 376.028430][T13426] __should_failslab+0xac/0xf0 [ 376.033294][T13426] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 376.039060][T13426] should_failslab+0x9/0x20 [ 376.043566][T13426] __kmem_cache_alloc_node+0x3d/0x2c0 [ 376.049362][T13426] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 376.055194][T13426] __kmalloc+0xa1/0x1e0 [ 376.059387][T13426] bpf_prog_test_run_skb+0x24f/0x1290 [ 376.064782][T13426] ? __fget_files+0x2d5/0x330 [ 376.069481][T13426] ? __kasan_check_write+0x14/0x20 [ 376.074614][T13426] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 376.080434][T13426] bpf_prog_test_run+0x3e3/0x630 [ 376.085409][T13426] ? slab_free_freelist_hook+0xc2/0x190 [ 376.091060][T13426] ? bpf_prog_query+0x270/0x270 [ 376.095924][T13426] ? selinux_bpf+0xce/0xf0 [ 376.100354][T13426] ? security_bpf+0x93/0xb0 [ 376.104874][T13426] __sys_bpf+0x56d/0x780 [ 376.109127][T13426] ? bpf_link_show_fdinfo+0x320/0x320 [ 376.114512][T13426] ? __cfi_ksys_write+0x10/0x10 [ 376.119472][T13426] ? debug_smp_processor_id+0x17/0x20 [ 376.124880][T13426] __x64_sys_bpf+0x7c/0x90 [ 376.129363][T13426] x64_sys_call+0x488/0x9a0 [ 376.133872][T13426] do_syscall_64+0x4c/0xa0 [ 376.138528][T13426] ? clear_bhb_loop+0x30/0x80 [ 376.143295][T13426] ? clear_bhb_loop+0x30/0x80 [ 376.148046][T13426] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 376.153929][T13426] RIP: 0033:0x7fcff5b8ebe9 [ 376.158447][T13426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 376.178229][T13426] RSP: 002b:00007fcff69e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 376.186636][T13426] RAX: ffffffffffffffda RBX: 00007fcff5dc5fa0 RCX: 00007fcff5b8ebe9 [ 376.194687][T13426] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 376.202640][T13426] RBP: 00007fcff69e8090 R08: 0000000000000000 R09: 0000000000000000 [ 376.210592][T13426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 376.218544][T13426] R13: 00007fcff5dc6038 R14: 00007fcff5dc5fa0 R15: 00007ffd5ed939f8 [ 376.226593][T13426] [ 377.071150][T13435] syz.4.1870[13435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.071227][T13435] syz.4.1870[13435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.035262][T13470] device wg2 left promiscuous mode [ 379.382230][T13470] device veth1_macvtap entered promiscuous mode [ 379.449168][T13470] device macsec0 entered promiscuous mode [ 379.558450][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 380.490561][T13511] FAULT_INJECTION: forcing a failure. [ 380.490561][T13511] name failslab, interval 1, probability 0, space 0, times 0 [ 380.536777][T13511] CPU: 1 PID: 13511 Comm: syz.5.1892 Not tainted syzkaller #0 [ 380.544331][T13511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 380.554579][T13511] Call Trace: [ 380.558147][T13511] [ 380.561086][T13511] __dump_stack+0x21/0x24 [ 380.565674][T13511] dump_stack_lvl+0xee/0x150 [ 380.570386][T13511] ? __cfi_dump_stack_lvl+0x8/0x8 [ 380.575443][T13511] dump_stack+0x15/0x24 [ 380.579613][T13511] should_fail_ex+0x3d4/0x520 [ 380.584302][T13511] __should_failslab+0xac/0xf0 [ 380.589079][T13511] ? kvmalloc_node+0x294/0x480 [ 380.594025][T13511] should_failslab+0x9/0x20 [ 380.598534][T13511] __kmem_cache_alloc_node+0x3d/0x2c0 [ 380.604070][T13511] ? ref_tracker_alloc+0x2a5/0x430 [ 380.609448][T13511] ? __alloc_percpu+0x24/0x30 [ 380.614140][T13511] ? kvmalloc_node+0x294/0x480 [ 380.618998][T13511] __kmalloc_node+0xa1/0x1e0 [ 380.623596][T13511] ? dev_activate+0x2cf/0x1040 [ 380.628360][T13511] ? __dev_change_flags+0x21b/0x6b0 [ 380.633554][T13511] kvmalloc_node+0x294/0x480 [ 380.638132][T13511] ? x64_sys_call+0x58b/0x9a0 [ 380.642809][T13511] ? do_syscall_64+0x4c/0xa0 [ 380.647673][T13511] ? __cfi_kvmalloc_node+0x10/0x10 [ 380.652800][T13511] ? __kasan_check_write+0x14/0x20 [ 380.657916][T13511] ? qdisc_alloc+0x5ae/0x780 [ 380.662753][T13511] pfifo_fast_init+0x112/0x7a0 [ 380.667799][T13511] qdisc_create_dflt+0x150/0x3b0 [ 380.672846][T13511] dev_activate+0x2cf/0x1040 [ 380.677509][T13511] __dev_open+0x3ce/0x4f0 [ 380.681826][T13511] ? dev_open+0x230/0x230 [ 380.686134][T13511] ? _raw_spin_unlock_bh+0x50/0x60 [ 380.691226][T13511] ? dev_set_rx_mode+0x223/0x2c0 [ 380.696149][T13511] ? __kasan_check_read+0x11/0x20 [ 380.701253][T13511] __dev_change_flags+0x21b/0x6b0 [ 380.706267][T13511] ? __cfi___dev_change_flags+0x10/0x10 [ 380.711795][T13511] ? __cfi_free_modprobe_argv+0x10/0x10 [ 380.717323][T13511] ? __request_module+0x3dc/0x890 [ 380.722333][T13511] dev_change_flags+0x88/0x1a0 [ 380.727255][T13511] dev_ifsioc+0x159/0xed0 [ 380.731584][T13511] ? dev_ioctl+0xd10/0xd10 [ 380.736108][T13511] ? __mutex_lock_slowpath+0xe/0x10 [ 380.741334][T13511] ? mutex_lock+0xf8/0x1a0 [ 380.745793][T13511] ? __cfi_mutex_lock+0x10/0x10 [ 380.750743][T13511] ? security_capable+0x99/0xc0 [ 380.755690][T13511] dev_ioctl+0x556/0xd10 [ 380.759928][T13511] sock_do_ioctl+0x23f/0x310 [ 380.764853][T13511] ? sock_show_fdinfo+0xb0/0xb0 [ 380.769714][T13511] ? selinux_file_ioctl+0x377/0x480 [ 380.774909][T13511] sock_ioctl+0x4d8/0x6e0 [ 380.779320][T13511] ? __cfi_sock_ioctl+0x10/0x10 [ 380.784155][T13511] ? __fget_files+0x2d5/0x330 [ 380.788831][T13511] ? security_file_ioctl+0x95/0xc0 [ 380.793977][T13511] ? __cfi_sock_ioctl+0x10/0x10 [ 380.798827][T13511] __se_sys_ioctl+0x12f/0x1b0 [ 380.803580][T13511] __x64_sys_ioctl+0x7b/0x90 [ 380.808161][T13511] x64_sys_call+0x58b/0x9a0 [ 380.812740][T13511] do_syscall_64+0x4c/0xa0 [ 380.817227][T13511] ? clear_bhb_loop+0x30/0x80 [ 380.821926][T13511] ? clear_bhb_loop+0x30/0x80 [ 380.826589][T13511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 380.832462][T13511] RIP: 0033:0x7f5ab538ebe9 [ 380.836866][T13511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 380.856830][T13511] RSP: 002b:00007f5ab6217038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 380.865271][T13511] RAX: ffffffffffffffda RBX: 00007f5ab55c6090 RCX: 00007f5ab538ebe9 [ 380.873300][T13511] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 380.881350][T13511] RBP: 00007f5ab6217090 R08: 0000000000000000 R09: 0000000000000000 [ 380.889391][T13511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 380.897657][T13511] R13: 00007f5ab55c6128 R14: 00007f5ab55c6090 R15: 00007ffc88c4d318 [ 380.905810][T13511] [ 380.966508][T13511] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 380.977481][T13511] device pim6reg1 entered promiscuous mode [ 381.581738][T13528] syz.2.1893[13528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.624412][T13528] syz.2.1893[13528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.899013][ T28] audit: type=1400 audit(1756832195.394:132): avc: denied { create } for pid=13542 comm="syz.2.1901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 386.119602][T13589] device sit0 left promiscuous mode [ 386.286199][T13589] device sit0 entered promiscuous mode [ 388.303837][T13634] syz.0.1923[13634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.303914][T13634] syz.0.1923[13634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.810348][T13641] device sit0 left promiscuous mode [ 392.783874][T13708] device sit0 entered promiscuous mode [ 393.408213][T13740] FAULT_INJECTION: forcing a failure. [ 393.408213][T13740] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 393.707464][T13740] CPU: 1 PID: 13740 Comm: syz.0.1959 Not tainted syzkaller #0 [ 393.714969][T13740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 393.725031][T13740] Call Trace: [ 393.728320][T13740] [ 393.731302][T13740] __dump_stack+0x21/0x24 [ 393.735779][T13740] dump_stack_lvl+0xee/0x150 [ 393.740399][T13740] ? __cfi_dump_stack_lvl+0x8/0x8 [ 393.745434][T13740] ? __kasan_check_write+0x14/0x20 [ 393.750560][T13740] dump_stack+0x15/0x24 [ 393.754712][T13740] should_fail_ex+0x3d4/0x520 [ 393.759392][T13740] should_fail+0xb/0x10 [ 393.763640][T13740] should_fail_usercopy+0x1a/0x20 [ 393.769190][T13740] _copy_from_user+0x1e/0xc0 [ 393.773867][T13740] perf_copy_attr+0x15e/0x880 [ 393.778644][T13740] __se_sys_perf_event_open+0xcb/0x1b80 [ 393.784217][T13740] ? __kasan_check_write+0x14/0x20 [ 393.789360][T13740] ? mutex_unlock+0x89/0x220 [ 393.793973][T13740] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 393.799728][T13740] ? __cfi_ksys_write+0x10/0x10 [ 393.804630][T13740] __x64_sys_perf_event_open+0xbf/0xd0 [ 393.810180][T13740] x64_sys_call+0x385/0x9a0 [ 393.814686][T13740] do_syscall_64+0x4c/0xa0 [ 393.819109][T13740] ? clear_bhb_loop+0x30/0x80 [ 393.824131][T13740] ? clear_bhb_loop+0x30/0x80 [ 393.829071][T13740] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 393.834963][T13740] RIP: 0033:0x7f0d28f8ebe9 [ 393.839379][T13740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.859331][T13740] RSP: 002b:00007f0d29ded038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 393.867837][T13740] RAX: ffffffffffffffda RBX: 00007f0d291c6090 RCX: 00007f0d28f8ebe9 [ 393.875820][T13740] RDX: feffffffffffffff RSI: 0000000000000000 RDI: 00002000000002c0 [ 393.884073][T13740] RBP: 00007f0d29ded090 R08: 0000000000000000 R09: 0000000000000000 [ 393.892098][T13740] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 393.900160][T13740] R13: 00007f0d291c6128 R14: 00007f0d291c6090 R15: 00007ffdee19a2a8 [ 393.908139][T13740] [ 394.029092][T13742] syz.3.1957[13742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.029168][T13742] syz.3.1957[13742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.728202][T13795] syz.5.1971[13795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.793554][T13795] syz.5.1971[13795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.753365][T13879] device sit0 left promiscuous mode [ 407.923988][T14010] syz.3.2039[14010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.924079][T14010] syz.3.2039[14010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.117037][T14050] Ÿë: port 1(ip6gretap0) entered blocking state [ 410.147083][T14050] Ÿë: port 1(ip6gretap0) entered disabled state [ 410.153962][T14050] device ip6gretap0 entered promiscuous mode [ 410.614178][T14066] FAULT_INJECTION: forcing a failure. [ 410.614178][T14066] name failslab, interval 1, probability 0, space 0, times 0 [ 410.746261][T14066] CPU: 1 PID: 14066 Comm: syz.5.2060 Not tainted syzkaller #0 [ 410.753857][T14066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 410.763928][T14066] Call Trace: [ 410.767212][T14066] [ 410.770140][T14066] __dump_stack+0x21/0x24 [ 410.774465][T14066] dump_stack_lvl+0xee/0x150 [ 410.779246][T14066] ? __cfi_dump_stack_lvl+0x8/0x8 [ 410.784282][T14066] dump_stack+0x15/0x24 [ 410.788556][T14066] should_fail_ex+0x3d4/0x520 [ 410.793293][T14066] __should_failslab+0xac/0xf0 [ 410.798085][T14066] ? kvmalloc_node+0x294/0x480 [ 410.803067][T14066] should_failslab+0x9/0x20 [ 410.808006][T14066] __kmem_cache_alloc_node+0x3d/0x2c0 [ 410.813387][T14066] ? kasan_save_alloc_info+0x25/0x30 [ 410.818952][T14066] ? kvmalloc_node+0x294/0x480 [ 410.823913][T14066] __kmalloc_node+0xa1/0x1e0 [ 410.828549][T14066] ? irqentry_exit+0x37/0x40 [ 410.833141][T14066] kvmalloc_node+0x294/0x480 [ 410.837740][T14066] ? __cfi_kvmalloc_node+0x10/0x10 [ 410.842982][T14066] ? memset+0x35/0x40 [ 410.846986][T14066] alloc_netdev_mqs+0xa23/0xf90 [ 410.851844][T14066] vti6_locate+0x588/0x6d0 [ 410.856262][T14066] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 410.862423][T14066] ? vti6_link_config+0x550/0x550 [ 410.867458][T14066] ? memcpy+0x56/0x70 [ 410.871586][T14066] vti6_siocdevprivate+0x6d7/0xd20 [ 410.876886][T14066] ? __cfi_vti6_siocdevprivate+0x10/0x10 [ 410.882719][T14066] ? __mutex_lock+0x47a/0x16d0 [ 410.887677][T14066] ? dev_ifsioc+0x6ac/0xed0 [ 410.892207][T14066] dev_ifsioc+0xbc4/0xed0 [ 410.896554][T14066] ? dev_ioctl+0xd10/0xd10 [ 410.900984][T14066] ? __mutex_lock_slowpath+0xe/0x10 [ 410.906362][T14066] ? mutex_lock+0xf8/0x1a0 [ 410.910968][T14066] ? __cfi_mutex_lock+0x10/0x10 [ 410.915915][T14066] ? dev_get_by_name_rcu+0xe5/0x130 [ 410.921130][T14066] dev_ioctl+0x5f3/0xd10 [ 410.925599][T14066] sock_ioctl+0x675/0x6e0 [ 410.930117][T14066] ? __cfi_sock_ioctl+0x10/0x10 [ 410.935239][T14066] ? __se_sys_ioctl+0x62/0x1b0 [ 410.940100][T14066] ? __cfi_sock_ioctl+0x10/0x10 [ 410.945045][T14066] __se_sys_ioctl+0x12f/0x1b0 [ 410.949774][T14066] __x64_sys_ioctl+0x7b/0x90 [ 410.954461][T14066] x64_sys_call+0x58b/0x9a0 [ 410.958979][T14066] do_syscall_64+0x4c/0xa0 [ 410.963623][T14066] ? clear_bhb_loop+0x30/0x80 [ 410.968293][T14066] ? clear_bhb_loop+0x30/0x80 [ 410.972956][T14066] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 410.978835][T14066] RIP: 0033:0x7f5ab538ebe9 [ 410.983495][T14066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.003177][T14066] RSP: 002b:00007f5ab6238038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 411.012372][T14066] RAX: ffffffffffffffda RBX: 00007f5ab55c5fa0 RCX: 00007f5ab538ebe9 [ 411.020705][T14066] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 411.028874][T14066] RBP: 00007f5ab6238090 R08: 0000000000000000 R09: 0000000000000000 [ 411.037138][T14066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.045906][T14066] R13: 00007f5ab55c6038 R14: 00007f5ab55c5fa0 R15: 00007ffc88c4d318 [ 411.054431][T14066] [ 411.957950][T14099] FAULT_INJECTION: forcing a failure. [ 411.957950][T14099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 412.041344][T14099] CPU: 1 PID: 14099 Comm: syz.5.2068 Not tainted syzkaller #0 [ 412.049474][T14099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 412.059641][T14099] Call Trace: [ 412.062929][T14099] [ 412.065875][T14099] __dump_stack+0x21/0x24 [ 412.070213][T14099] dump_stack_lvl+0xee/0x150 [ 412.074819][T14099] ? __cfi_dump_stack_lvl+0x8/0x8 [ 412.079855][T14099] ? ___ratelimit+0xd/0x570 [ 412.084377][T14099] dump_stack+0x15/0x24 [ 412.088561][T14099] should_fail_ex+0x3d4/0x520 [ 412.093246][T14099] should_fail_alloc_page+0x61/0x90 [ 412.098472][T14099] prepare_alloc_pages+0x148/0x5f0 [ 412.103593][T14099] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 412.108890][T14099] ? __vmalloc_node_range+0x326/0x13d0 [ 412.114535][T14099] ? bpf_map_area_alloc+0xd7/0xe0 [ 412.119607][T14099] ? dev_map_alloc+0x227/0x540 [ 412.124396][T14099] ? map_create+0x49c/0xd80 [ 412.128922][T14099] ? __sys_bpf+0x30b/0x780 [ 412.133412][T14099] ? x64_sys_call+0x488/0x9a0 [ 412.138114][T14099] __alloc_pages+0x124/0x450 [ 412.142815][T14099] ? __cfi___alloc_pages+0x10/0x10 [ 412.147952][T14099] ? irqentry_exit+0x37/0x40 [ 412.152567][T14099] __get_free_pages+0xe/0x30 [ 412.157233][T14099] kasan_populate_vmalloc_pte+0x29/0x120 [ 412.162937][T14099] __apply_to_page_range+0x8c1/0xc00 [ 412.168431][T14099] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 412.174677][T14099] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 412.180930][T14099] apply_to_page_range+0x3b/0x50 [ 412.185902][T14099] kasan_populate_vmalloc+0x60/0x70 [ 412.191087][T14099] alloc_vmap_area+0x173e/0x1870 [ 412.196021][T14099] ? vm_map_ram+0x930/0x930 [ 412.200536][T14099] ? __kasan_kmalloc+0x95/0xb0 [ 412.205295][T14099] ? kmalloc_node_trace+0x3d/0xb0 [ 412.210311][T14099] __get_vm_area_node+0x160/0x360 [ 412.215330][T14099] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 412.221578][T14099] __vmalloc_node_range+0x326/0x13d0 [ 412.226851][T14099] ? dev_map_alloc+0x227/0x540 [ 412.231692][T14099] ? __cfi___vmalloc_node_range+0x10/0x10 [ 412.237417][T14099] ? kasan_save_alloc_info+0x25/0x30 [ 412.242696][T14099] ? __kasan_kmalloc+0x95/0xb0 [ 412.247620][T14099] ? bpf_map_area_alloc+0x4b/0xe0 [ 412.252631][T14099] ? __kmalloc_node+0xb2/0x1e0 [ 412.257739][T14099] bpf_map_area_alloc+0xd7/0xe0 [ 412.262579][T14099] ? dev_map_alloc+0x227/0x540 [ 412.267327][T14099] dev_map_alloc+0x227/0x540 [ 412.271993][T14099] map_create+0x49c/0xd80 [ 412.276456][T14099] __sys_bpf+0x30b/0x780 [ 412.280683][T14099] ? bpf_link_show_fdinfo+0x320/0x320 [ 412.286064][T14099] ? irqentry_exit+0x37/0x40 [ 412.290722][T14099] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 412.296742][T14099] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 412.302988][T14099] __x64_sys_bpf+0x7c/0x90 [ 412.307518][T14099] x64_sys_call+0x488/0x9a0 [ 412.312185][T14099] do_syscall_64+0x4c/0xa0 [ 412.316778][T14099] ? clear_bhb_loop+0x30/0x80 [ 412.321454][T14099] ? clear_bhb_loop+0x30/0x80 [ 412.326119][T14099] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 412.332265][T14099] RIP: 0033:0x7f5ab538ebe9 [ 412.336688][T14099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.356461][T14099] RSP: 002b:00007f5ab6238038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 412.364870][T14099] RAX: ffffffffffffffda RBX: 00007f5ab55c5fa0 RCX: 00007f5ab538ebe9 [ 412.373015][T14099] RDX: 0000000000000050 RSI: 0000200000000bc0 RDI: 0000000000000000 [ 412.380980][T14099] RBP: 00007f5ab6238090 R08: 0000000000000000 R09: 0000000000000000 [ 412.389024][T14099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.396981][T14099] R13: 00007f5ab55c6038 R14: 00007f5ab55c5fa0 R15: 00007ffc88c4d318 [ 412.404941][T14099] [ 414.461984][T14146] syz.2.2082[14146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.462059][T14146] syz.2.2082[14146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.296711][T14387] syz.4.2156[14387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.527792][T14387] syz.4.2156[14387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.338561][ T28] audit: type=1400 audit(1756832239.824:133): avc: denied { create } for pid=14413 comm="syz.5.2170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 428.331433][ T28] audit: type=1400 audit(1756832241.824:134): avc: denied { write } for pid=14447 comm="syz.4.2182" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 429.904485][T14480] syz.5.2189[14480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.904571][T14480] syz.5.2189[14480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.357910][T14479] syz.2.2191[14479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.413978][T14479] syz.2.2191[14479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.151530][T14618] FAULT_INJECTION: forcing a failure. [ 436.151530][T14618] name failslab, interval 1, probability 0, space 0, times 0 [ 436.191547][T14618] CPU: 0 PID: 14618 Comm: syz.4.2235 Not tainted syzkaller #0 [ 436.199044][T14618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 436.209104][T14618] Call Trace: [ 436.212646][T14618] [ 436.215582][T14618] __dump_stack+0x21/0x24 [ 436.219937][T14618] dump_stack_lvl+0xee/0x150 [ 436.224542][T14618] ? __cfi_dump_stack_lvl+0x8/0x8 [ 436.229651][T14618] ? mas_prev+0x21c/0x3f0 [ 436.233969][T14618] dump_stack+0x15/0x24 [ 436.238196][T14618] should_fail_ex+0x3d4/0x520 [ 436.242936][T14618] ? __anon_vma_prepare+0x9a/0x420 [ 436.248125][T14618] __should_failslab+0xac/0xf0 [ 436.252895][T14618] should_failslab+0x9/0x20 [ 436.257551][T14618] kmem_cache_alloc+0x3b/0x330 [ 436.262332][T14618] ? __anon_vma_prepare+0x51/0x420 [ 436.267480][T14618] __anon_vma_prepare+0x9a/0x420 [ 436.272490][T14618] handle_mm_fault+0x2409/0x2640 [ 436.277417][T14618] ? __cfi_handle_mm_fault+0x10/0x10 [ 436.282806][T14618] ? lock_mm_and_find_vma+0x9e/0x320 [ 436.288095][T14618] ? do_user_addr_fault+0x2ee/0x1050 [ 436.293372][T14618] do_user_addr_fault+0x63b/0x1050 [ 436.298476][T14618] exc_page_fault+0x51/0xb0 [ 436.303157][T14618] asm_exc_page_fault+0x27/0x30 [ 436.308029][T14618] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 436.313751][T14618] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 436.333811][T14618] RSP: 0018:ffffc9000b187e60 EFLAGS: 00050297 [ 436.339949][T14618] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 00002000000001c0 [ 436.348000][T14618] RDX: ffff888121debcc0 RSI: 0000000000000005 RDI: 0000000000000000 [ 436.356050][T14618] RBP: ffffc9000b187ec8 R08: dffffc0000000000 R09: ffffed1026505415 [ 436.364371][T14618] R10: ffffed1026505415 R11: 1ffff11026505414 R12: 0000000000000003 [ 436.372343][T14618] R13: 00002000000001c0 R14: 0000000000000004 R15: 0000000000000000 [ 436.380320][T14618] ? __sys_socketpair+0xac/0x5b0 [ 436.385264][T14618] __x64_sys_socketpair+0x9b/0xb0 [ 436.390302][T14618] x64_sys_call+0x6e/0x9a0 [ 436.394708][T14618] do_syscall_64+0x4c/0xa0 [ 436.399201][T14618] ? clear_bhb_loop+0x30/0x80 [ 436.403893][T14618] ? clear_bhb_loop+0x30/0x80 [ 436.408555][T14618] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 436.414517][T14618] RIP: 0033:0x7f9f7078ebe9 [ 436.419099][T14618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 436.438966][T14618] RSP: 002b:00007f9f716d8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 436.447466][T14618] RAX: ffffffffffffffda RBX: 00007f9f709c5fa0 RCX: 00007f9f7078ebe9 [ 436.455472][T14618] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 436.463599][T14618] RBP: 00007f9f716d8090 R08: 0000000000000000 R09: 0000000000000000 [ 436.472167][T14618] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 436.480136][T14618] R13: 00007f9f709c6038 R14: 00007f9f709c5fa0 R15: 00007ffd2cfc0168 [ 436.488191][T14618] [ 436.670853][T14630] device pim6reg1 entered promiscuous mode [ 437.413129][T14663] FAULT_INJECTION: forcing a failure. [ 437.413129][T14663] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 437.446235][T14664] syz.2.2240[14664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.446314][T14664] syz.2.2240[14664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.544827][T14666] device xfrm0 entered promiscuous mode [ 437.578055][T14663] CPU: 0 PID: 14663 Comm: syz.0.2247 Not tainted syzkaller #0 [ 437.585739][T14663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 437.595978][T14663] Call Trace: [ 437.599267][T14663] [ 437.602204][T14663] __dump_stack+0x21/0x24 [ 437.606694][T14663] dump_stack_lvl+0xee/0x150 [ 437.611303][T14663] ? __cfi_dump_stack_lvl+0x8/0x8 [ 437.616443][T14663] ? ctx_sched_in+0x259/0x2f0 [ 437.621161][T14663] dump_stack+0x15/0x24 [ 437.625314][T14663] should_fail_ex+0x3d4/0x520 [ 437.629993][T14663] should_fail_alloc_page+0x61/0x90 [ 437.635471][T14663] prepare_alloc_pages+0x148/0x5f0 [ 437.640624][T14663] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 437.645926][T14663] ? __cfi___perf_event_task_sched_out+0x10/0x10 [ 437.652347][T14663] __alloc_pages+0x124/0x450 [ 437.657217][T14663] ? irqentry_exit+0x37/0x40 [ 437.661908][T14663] ? __cfi___alloc_pages+0x10/0x10 [ 437.667132][T14663] ? __cfi__raw_spin_lock+0x10/0x10 [ 437.672527][T14663] __get_free_pages+0xe/0x30 [ 437.677126][T14663] kasan_populate_vmalloc_pte+0x29/0x120 [ 437.682756][T14663] __apply_to_page_range+0x8c1/0xc00 [ 437.688057][T14663] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 437.694402][T14663] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 437.700924][T14663] apply_to_page_range+0x3b/0x50 [ 437.705876][T14663] kasan_populate_vmalloc+0x60/0x70 [ 437.711164][T14663] alloc_vmap_area+0x173e/0x1870 [ 437.716125][T14663] ? vm_map_ram+0x930/0x930 [ 437.720720][T14663] ? __kasan_kmalloc+0x95/0xb0 [ 437.725503][T14663] ? kmalloc_node_trace+0x3d/0xb0 [ 437.730549][T14663] __get_vm_area_node+0x160/0x360 [ 437.735584][T14663] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 437.741818][T14663] __vmalloc_node_range+0x326/0x13d0 [ 437.747192][T14663] ? htab_map_alloc+0x399/0xfd0 [ 437.752047][T14663] ? __cfi___vmalloc_node_range+0x10/0x10 [ 437.757815][T14663] ? kasan_save_alloc_info+0x25/0x30 [ 437.763088][T14663] ? __kasan_kmalloc+0x95/0xb0 [ 437.767919][T14663] ? bpf_map_area_alloc+0x4b/0xe0 [ 437.773013][T14663] ? __kmalloc_node+0xb2/0x1e0 [ 437.777800][T14663] bpf_map_area_alloc+0xd7/0xe0 [ 437.782656][T14663] ? htab_map_alloc+0x399/0xfd0 [ 437.787495][T14663] htab_map_alloc+0x399/0xfd0 [ 437.792346][T14663] ? htab_map_alloc_check+0x3e1/0x4c0 [ 437.797848][T14663] map_create+0x49c/0xd80 [ 437.802190][T14663] __sys_bpf+0x30b/0x780 [ 437.806540][T14663] ? bpf_link_show_fdinfo+0x320/0x320 [ 437.812084][T14663] ? __cfi_ksys_write+0x10/0x10 [ 437.817192][T14663] ? debug_smp_processor_id+0x17/0x20 [ 437.822632][T14663] __x64_sys_bpf+0x7c/0x90 [ 437.827036][T14663] x64_sys_call+0x488/0x9a0 [ 437.831698][T14663] do_syscall_64+0x4c/0xa0 [ 437.836094][T14663] ? clear_bhb_loop+0x30/0x80 [ 437.840762][T14663] ? clear_bhb_loop+0x30/0x80 [ 437.845518][T14663] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 437.851588][T14663] RIP: 0033:0x7f0d28f8ebe9 [ 437.866595][T14663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 437.886386][T14663] RSP: 002b:00007f0d29e0e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 437.894911][T14663] RAX: ffffffffffffffda RBX: 00007f0d291c5fa0 RCX: 00007f0d28f8ebe9 [ 437.903039][T14663] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 437.911006][T14663] RBP: 00007f0d29e0e090 R08: 0000000000000000 R09: 0000000000000000 [ 437.919182][T14663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 437.927257][T14663] R13: 00007f0d291c6038 R14: 00007f0d291c5fa0 R15: 00007ffdee19a2a8 [ 437.935318][T14663] [ 442.617557][T14762] syz.3.2280[14762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.617632][T14762] syz.3.2280[14762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.389056][ T283] syz-executor (283) used greatest stack depth: 20512 bytes left [ 444.639929][T14797] syz.2.2289[14797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.640005][T14797] syz.2.2289[14797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.169106][T14791] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.189105][T14791] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.197125][T14791] device bridge_slave_0 entered promiscuous mode [ 445.217756][T14791] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.225018][T14791] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.250280][T14791] device bridge_slave_1 entered promiscuous mode [ 445.632372][ T346] device veth1_macvtap left promiscuous mode [ 445.648408][ T346] device veth0_vlan left promiscuous mode [ 445.843133][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 445.893364][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 446.136654][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 446.207177][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 446.244414][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.251551][ T376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.346991][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 446.381682][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 446.396941][ T376] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.404151][ T376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.414412][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 446.444319][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 446.459548][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 446.477422][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 446.508397][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 446.616824][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 446.673579][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 446.720303][T14791] device veth0_vlan entered promiscuous mode [ 446.756341][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 446.789732][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 446.893552][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 446.997138][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 447.019471][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 447.097130][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 447.180639][T14791] device veth1_macvtap entered promiscuous mode [ 447.245603][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 447.255995][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 447.309556][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 447.374503][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 447.383404][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 449.476070][T14883] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.490989][T14883] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.559699][T14883] device bridge_slave_0 entered promiscuous mode [ 449.681354][T14883] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.733798][T14883] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.747064][T14883] device bridge_slave_1 entered promiscuous mode [ 449.940082][ T346] device bridge_slave_1 left promiscuous mode [ 449.956949][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.965349][ T346] device bridge_slave_0 left promiscuous mode [ 450.006703][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.228097][ T346] device veth1_macvtap left promiscuous mode [ 450.234393][ T346] device veth0_vlan left promiscuous mode [ 450.898641][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 450.906906][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.914514][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 450.931599][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 451.055912][ T3823] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.063129][ T3823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.157120][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 451.169113][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 451.178106][ T3823] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.185319][ T3823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.228825][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 451.245231][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 451.428853][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 451.505129][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 451.538851][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 451.633404][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 451.707686][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 451.745387][T14883] device veth0_vlan entered promiscuous mode [ 451.882438][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 451.901256][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 451.944390][T14883] device veth1_macvtap entered promiscuous mode [ 452.017528][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 452.046899][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 452.055324][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 452.119245][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 452.182393][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 452.290131][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 452.363636][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 454.211406][T14992] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.222796][T14992] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.256983][T14992] device bridge_slave_0 entered promiscuous mode [ 454.343617][T14992] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.361487][T14992] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.369492][T14992] device bridge_slave_1 entered promiscuous mode [ 455.031974][ T346] device bridge_slave_1 left promiscuous mode [ 455.042883][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.087999][ T346] device bridge_slave_0 left promiscuous mode [ 455.114186][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.143395][ T346] device veth1_macvtap left promiscuous mode [ 455.186506][ T346] device veth0_vlan left promiscuous mode [ 455.682053][T15038] syz.2.2349[15038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.682130][T15038] syz.2.2349[15038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.957511][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 456.018927][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 456.313154][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 456.354970][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 456.401603][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.408828][ T376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.481896][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 456.539062][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 456.599075][ T376] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.606336][ T376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.768415][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 456.837179][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 456.892585][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 456.982794][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 457.143248][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 457.233315][T14992] device veth0_vlan entered promiscuous mode [ 457.254092][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 457.263811][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 457.277195][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 457.288440][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.423917][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.495064][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 457.529537][T15059] syz.0.2358[15059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.535626][T15059] syz.0.2358[15059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.565429][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 457.586000][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 457.596035][T14992] device veth1_macvtap entered promiscuous mode [ 457.660131][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 457.672129][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 457.701156][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 457.734256][T15066] device xfrm0 entered promiscuous mode [ 457.750681][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 457.760638][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 459.018739][ T346] device bridge_slave_1 left promiscuous mode [ 459.033892][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.045377][ T346] device bridge_slave_0 left promiscuous mode [ 459.051949][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.068185][ T346] device veth1_macvtap left promiscuous mode [ 459.074319][ T346] device veth0_vlan left promiscuous mode [ 459.356479][T15093] device xfrm0 entered promiscuous mode [ 459.447047][T15089] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.454288][T15089] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.617251][T15089] device bridge_slave_0 entered promiscuous mode [ 459.815095][T15112] syz.2.2371[15112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.815210][T15112] syz.2.2371[15112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.853291][T15089] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.943824][T15089] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.951548][T15089] device bridge_slave_1 entered promiscuous mode [ 460.913995][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 460.924554][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 460.951637][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 460.960893][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 460.969633][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.976815][ T376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.985005][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 461.040163][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 461.044766][T15133] FAULT_INJECTION: forcing a failure. [ 461.044766][T15133] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 461.050330][ T376] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.062804][T15133] CPU: 0 PID: 15133 Comm: syz.5.2376 Not tainted syzkaller #0 [ 461.069534][ T376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.077002][T15133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 461.077014][T15133] Call Trace: [ 461.077019][T15133] [ 461.077027][T15133] __dump_stack+0x21/0x24 [ 461.105000][T15133] dump_stack_lvl+0xee/0x150 [ 461.105279][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 461.109769][T15133] ? __cfi_dump_stack_lvl+0x8/0x8 [ 461.109796][T15133] dump_stack+0x15/0x24 [ 461.126825][T15133] should_fail_ex+0x3d4/0x520 [ 461.131523][T15133] should_fail+0xb/0x10 [ 461.135690][T15133] should_fail_usercopy+0x1a/0x20 [ 461.140723][T15133] _copy_from_user+0x1e/0xc0 [ 461.145404][T15133] sock_do_ioctl+0x186/0x310 [ 461.150018][T15133] ? sock_show_fdinfo+0xb0/0xb0 [ 461.154879][T15133] ? selinux_file_ioctl+0x377/0x480 [ 461.160272][T15133] sock_ioctl+0x4d8/0x6e0 [ 461.164627][T15133] ? __cfi_sock_ioctl+0x10/0x10 [ 461.169502][T15133] ? __fget_files+0x2d5/0x330 [ 461.174190][T15133] ? security_file_ioctl+0x95/0xc0 [ 461.179437][T15133] ? __cfi_sock_ioctl+0x10/0x10 [ 461.184487][T15133] __se_sys_ioctl+0x12f/0x1b0 [ 461.189262][T15133] __x64_sys_ioctl+0x7b/0x90 [ 461.193941][T15133] x64_sys_call+0x58b/0x9a0 [ 461.198470][T15133] do_syscall_64+0x4c/0xa0 [ 461.202896][T15133] ? clear_bhb_loop+0x30/0x80 [ 461.207586][T15133] ? clear_bhb_loop+0x30/0x80 [ 461.212493][T15133] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 461.218675][T15133] RIP: 0033:0x7f5ab538ebe9 [ 461.223099][T15133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 461.242714][T15133] RSP: 002b:00007f5ab6217038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.251230][T15133] RAX: ffffffffffffffda RBX: 00007f5ab55c6090 RCX: 00007f5ab538ebe9 [ 461.259297][T15133] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000005 [ 461.267364][T15133] RBP: 00007f5ab6217090 R08: 0000000000000000 R09: 0000000000000000 [ 461.275600][T15133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.283955][T15133] R13: 00007f5ab55c6128 R14: 00007f5ab55c6090 R15: 00007ffc88c4d318 [ 461.292101][T15133] [ 461.361512][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 461.369867][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 461.378331][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 461.387421][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 461.432867][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 461.447307][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 461.517715][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 461.525737][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.533918][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 461.542710][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 461.551321][T15089] device veth0_vlan entered promiscuous mode [ 461.594669][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 461.603582][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 461.613099][T15089] device veth1_macvtap entered promiscuous mode [ 461.702335][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 461.761432][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 461.790622][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 461.799312][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 461.807800][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 462.768912][ T346] device bridge_slave_1 left promiscuous mode [ 462.775459][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.821158][ T346] device bridge_slave_0 left promiscuous mode [ 462.942191][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.023383][ T346] device veth1_macvtap left promiscuous mode [ 463.075270][ T346] device veth0_vlan left promiscuous mode [ 463.521874][T15179] syz.3.2388[15179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.521947][T15179] syz.3.2388[15179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.656123][T15165] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.725485][T15165] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.745003][T15165] device bridge_slave_0 entered promiscuous mode [ 463.752573][T15165] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.759935][T15165] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.767981][T15165] device bridge_slave_1 entered promiscuous mode [ 465.261706][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 465.288107][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 465.324637][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 465.333198][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 465.342281][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.349454][ T376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 465.357680][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 465.366281][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 465.375435][ T376] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.382618][ T376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 465.390649][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 465.399046][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 465.407538][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 465.420583][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 465.430501][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 465.439322][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 465.448294][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 465.629925][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 465.642383][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 465.662064][T15165] device veth0_vlan entered promiscuous mode [ 465.721153][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 465.729498][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 465.763395][T15165] device veth1_macvtap entered promiscuous mode [ 465.783414][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 465.802514][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 465.811148][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 465.819342][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 465.827789][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 465.836343][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 465.844757][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 466.831092][ T43] device bridge_slave_1 left promiscuous mode [ 466.846633][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.918340][ T43] device bridge_slave_0 left promiscuous mode [ 466.930445][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.942113][ T43] device veth1_macvtap left promiscuous mode [ 466.949255][ T43] device veth0_vlan left promiscuous mode [ 467.583386][ T28] audit: type=1400 audit(1756832281.074:135): avc: denied { create } for pid=15266 comm="syz.3.2415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 467.605305][T15269] bond_slave_1: mtu less than device minimum [ 467.621046][T15271] device veth1_macvtap left promiscuous mode [ 467.629459][T15271] device macsec0 left promiscuous mode [ 468.032089][T15254] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.041105][T15254] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.048788][T15254] device bridge_slave_0 entered promiscuous mode [ 468.093291][T15254] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.108756][T15254] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.126021][T15254] device bridge_slave_1 entered promiscuous mode [ 468.641744][T15317] syz.0.2424[15317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.641836][T15317] syz.0.2424[15317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.912633][T15254] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.931379][T15254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.938766][T15254] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.945819][T15254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.956716][ T376] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.972658][ T376] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.275861][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 469.316650][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 469.392841][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 469.408719][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 469.433304][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.440774][ T376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.545802][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 469.606613][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 469.623672][ T376] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.631402][ T376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.647948][T15333] device pim6reg1 entered promiscuous mode [ 469.656450][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 469.665718][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 469.685989][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 469.747132][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 469.763452][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 469.777162][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 469.859625][T15254] device veth0_vlan entered promiscuous mode [ 469.877070][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 469.921474][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 469.951555][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 469.959397][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 470.296217][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 470.325272][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 470.400644][T15254] device veth1_macvtap entered promiscuous mode [ 470.523828][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 470.547005][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 470.679710][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 470.781893][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 470.848926][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 471.917046][ T376] device bridge_slave_1 left promiscuous mode [ 471.923405][ T376] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.931185][ T376] device bridge_slave_0 left promiscuous mode [ 471.937467][ T376] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.945457][ T376] device veth1_macvtap left promiscuous mode [ 471.951743][ T376] device veth0_vlan left promiscuous mode [ 473.292624][T15400] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.325944][T15400] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.372241][T15400] device bridge_slave_0 entered promiscuous mode [ 473.417268][T15400] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.518492][T15419] syz.0.2454[15419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.518569][T15419] syz.0.2454[15419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.533967][T15400] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.641439][T15400] device bridge_slave_1 entered promiscuous mode [ 474.778495][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 474.794937][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 474.888208][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 474.896896][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 474.905456][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.912813][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.920817][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 474.989257][T15400] device veth0_vlan entered promiscuous mode [ 475.002350][T15400] device veth1_macvtap entered promiscuous mode [ 475.035871][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 475.097151][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 475.184612][ T3823] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.191861][ T3823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 475.204113][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 475.232469][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 475.282165][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 475.350566][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 475.413668][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 475.422427][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 475.431287][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 475.446810][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 475.462211][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 475.479648][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 475.488264][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 475.515355][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 475.528189][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 475.587336][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 475.636592][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 475.645372][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 475.654583][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 477.394441][T15484] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.426708][T15484] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.434635][T15484] device bridge_slave_0 entered promiscuous mode [ 477.487713][T15484] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.585580][T15484] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.707437][T15484] device bridge_slave_1 entered promiscuous mode [ 478.267223][ T3823] device bridge_slave_1 left promiscuous mode [ 478.288211][ T3823] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.318180][ T3823] device bridge_slave_0 left promiscuous mode [ 478.393575][ T3823] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.529733][ T3823] device veth1_macvtap left promiscuous mode [ 478.661677][ T3823] device veth0_vlan left promiscuous mode [ 479.531576][T15507] device sit0 entered promiscuous mode [ 480.349323][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 480.380887][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 480.452798][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 480.503132][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 480.513917][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.521113][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 480.535383][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 480.544350][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 480.553054][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.560126][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 480.609880][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 480.626108][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 480.775005][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 480.880888][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 480.978449][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 481.046975][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 481.139670][T15484] device veth0_vlan entered promiscuous mode [ 481.163870][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 481.235000][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 481.326633][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 481.433914][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 481.525760][T15484] device veth1_macvtap entered promiscuous mode [ 481.711943][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 481.747137][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 481.815286][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 481.964735][T15560] FAULT_INJECTION: forcing a failure. [ 481.964735][T15560] name failslab, interval 1, probability 0, space 0, times 0 [ 481.983267][T15560] CPU: 1 PID: 15560 Comm: syz.2.2494 Not tainted syzkaller #0 [ 481.991050][T15560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 482.001315][T15560] Call Trace: [ 482.004690][T15560] [ 482.007813][T15560] __dump_stack+0x21/0x24 [ 482.012575][T15560] dump_stack_lvl+0xee/0x150 [ 482.017303][T15560] ? __cfi_dump_stack_lvl+0x8/0x8 [ 482.022434][T15560] dump_stack+0x15/0x24 [ 482.026596][T15560] should_fail_ex+0x3d4/0x520 [ 482.031370][T15560] __should_failslab+0xac/0xf0 [ 482.036179][T15560] ? sidtab_sid2str_get+0x120/0x2c0 [ 482.041705][T15560] should_failslab+0x9/0x20 [ 482.046588][T15560] __kmem_cache_alloc_node+0x3d/0x2c0 [ 482.052194][T15560] ? sidtab_sid2str_get+0x120/0x2c0 [ 482.057724][T15560] __kmalloc_node_track_caller+0xa0/0x1e0 [ 482.063614][T15560] kmemdup+0x2b/0x60 [ 482.067641][T15560] sidtab_sid2str_get+0x120/0x2c0 [ 482.072654][T15560] security_sid_to_context_core+0x2ac/0x480 [ 482.078538][T15560] security_sid_to_context_force+0x36/0x40 [ 482.084343][T15560] selinux_inode_init_security+0x662/0x950 [ 482.090204][T15560] ? __cfi_selinux_inode_init_security+0x10/0x10 [ 482.096519][T15560] security_inode_init_security+0x173/0x3a0 [ 482.102440][T15560] ? __cfi_shmem_initxattrs+0x10/0x10 [ 482.107888][T15560] ? __cfi_security_inode_init_security+0x10/0x10 [ 482.114389][T15560] ? get_acl+0x3f/0x280 [ 482.118757][T15560] ? __kasan_check_write+0x14/0x20 [ 482.123945][T15560] ? set_cached_acl+0xdd/0x180 [ 482.128779][T15560] ? simple_acl_create+0x191/0x1c0 [ 482.133879][T15560] shmem_mknod+0xbb/0x1d0 [ 482.138223][T15560] ? security_inode_mkdir+0x85/0x120 [ 482.143491][T15560] shmem_mkdir+0x2f/0x60 [ 482.147720][T15560] vfs_mkdir+0x39c/0x580 [ 482.152006][T15560] do_mkdirat+0x171/0x4c0 [ 482.156328][T15560] __x64_sys_mkdir+0x6e/0x80 [ 482.161174][T15560] x64_sys_call+0x966/0x9a0 [ 482.165685][T15560] do_syscall_64+0x4c/0xa0 [ 482.170311][T15560] ? clear_bhb_loop+0x30/0x80 [ 482.175089][T15560] ? clear_bhb_loop+0x30/0x80 [ 482.179774][T15560] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 482.185657][T15560] RIP: 0033:0x7fcff5b8ebe9 [ 482.190109][T15560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 482.209731][T15560] RSP: 002b:00007fcff69c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 482.218291][T15560] RAX: ffffffffffffffda RBX: 00007fcff5dc6090 RCX: 00007fcff5b8ebe9 [ 482.226270][T15560] RDX: 0000000000000000 RSI: 00000000000000aa RDI: 0000200000000580 [ 482.234318][T15560] RBP: 00007fcff69c7090 R08: 0000000000000000 R09: 0000000000000000 [ 482.242279][T15560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.250330][T15560] R13: 00007fcff5dc6128 R14: 00007fcff5dc6090 R15: 00007ffd5ed939f8 [ 482.258336][T15560] [ 482.368948][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 482.402837][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 483.539198][ T3823] device bridge_slave_1 left promiscuous mode [ 483.556840][ T3823] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.676645][ T3823] device bridge_slave_0 left promiscuous mode [ 483.683026][ T3823] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.698073][ T3823] device veth1_macvtap left promiscuous mode [ 483.704159][ T3823] device veth0_vlan left promiscuous mode [ 484.041218][T15575] FAULT_INJECTION: forcing a failure. [ 484.041218][T15575] name failslab, interval 1, probability 0, space 0, times 0 [ 484.055624][T15575] CPU: 0 PID: 15575 Comm: syz.2.2499 Not tainted syzkaller #0 [ 484.063202][T15575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 484.073267][T15575] Call Trace: [ 484.076555][T15575] [ 484.079928][T15575] __dump_stack+0x21/0x24 [ 484.084427][T15575] dump_stack_lvl+0xee/0x150 [ 484.089136][T15575] ? __cfi_dump_stack_lvl+0x8/0x8 [ 484.094189][T15575] ? pcpu_memcg_post_alloc_hook+0x177/0x270 [ 484.100344][T15575] dump_stack+0x15/0x24 [ 484.104512][T15575] should_fail_ex+0x3d4/0x520 [ 484.109183][T15575] __should_failslab+0xac/0xf0 [ 484.113942][T15575] ? selinux_tun_dev_alloc_security+0x51/0x140 [ 484.120118][T15575] should_failslab+0x9/0x20 [ 484.124724][T15575] __kmem_cache_alloc_node+0x3d/0x2c0 [ 484.130312][T15575] ? selinux_tun_dev_alloc_security+0x51/0x140 [ 484.136543][T15575] kmalloc_trace+0x29/0xb0 [ 484.140970][T15575] selinux_tun_dev_alloc_security+0x51/0x140 [ 484.146955][T15575] security_tun_dev_alloc_security+0x73/0xa0 [ 484.153044][T15575] tun_net_init+0x1cc/0x5a0 [ 484.157733][T15575] register_netdevice+0x3f4/0x14a0 [ 484.162887][T15575] ? dev_addr_mod+0x2de/0x3a0 [ 484.167601][T15575] ? __cfi_register_netdevice+0x10/0x10 [ 484.173154][T15575] ? tun_net_initialize+0x14e/0x430 [ 484.178346][T15575] ? tun_setup+0x2b0/0x2b0 [ 484.183058][T15575] tun_set_iff+0x82a/0xe90 [ 484.188161][T15575] __tun_chr_ioctl+0x806/0x1e70 [ 484.193096][T15575] ? tun_flow_create+0x320/0x320 [ 484.198014][T15575] ? mutex_unlock+0x89/0x220 [ 484.202747][T15575] tun_chr_ioctl+0x2a/0x40 [ 484.207450][T15575] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 484.212731][T15575] __se_sys_ioctl+0x12f/0x1b0 [ 484.217409][T15575] __x64_sys_ioctl+0x7b/0x90 [ 484.222026][T15575] x64_sys_call+0x58b/0x9a0 [ 484.226624][T15575] do_syscall_64+0x4c/0xa0 [ 484.231125][T15575] ? clear_bhb_loop+0x30/0x80 [ 484.235798][T15575] ? clear_bhb_loop+0x30/0x80 [ 484.240549][T15575] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 484.246429][T15575] RIP: 0033:0x7fcff5b8ebe9 [ 484.250951][T15575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 484.270670][T15575] RSP: 002b:00007fcff69e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 484.279132][T15575] RAX: ffffffffffffffda RBX: 00007fcff5dc5fa0 RCX: 00007fcff5b8ebe9 [ 484.287115][T15575] RDX: 00002000000000c0 RSI: 00000000400454ca RDI: 0000000000000003 [ 484.295529][T15575] RBP: 00007fcff69e8090 R08: 0000000000000000 R09: 0000000000000000 [ 484.303591][T15575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 484.311649][T15575] R13: 00007fcff5dc6038 R14: 00007fcff5dc5fa0 R15: 00007ffd5ed939f8 [ 484.319800][T15575] [ 485.470031][T15585] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.517478][T15585] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.525078][T15585] device bridge_slave_0 entered promiscuous mode [ 485.604675][T15585] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.671965][T15585] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.680355][T15585] device bridge_slave_1 entered promiscuous mode [ 485.807785][T15609] FAULT_INJECTION: forcing a failure. [ 485.807785][T15609] name failslab, interval 1, probability 0, space 0, times 0 [ 485.862230][T15609] CPU: 0 PID: 15609 Comm: syz.2.2506 Not tainted syzkaller #0 [ 485.869916][T15609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 485.880233][T15609] Call Trace: [ 485.883514][T15609] [ 485.886445][T15609] __dump_stack+0x21/0x24 [ 485.890773][T15609] dump_stack_lvl+0xee/0x150 [ 485.895369][T15609] ? __cfi_dump_stack_lvl+0x8/0x8 [ 485.900485][T15609] dump_stack+0x15/0x24 [ 485.904726][T15609] should_fail_ex+0x3d4/0x520 [ 485.909493][T15609] __should_failslab+0xac/0xf0 [ 485.914471][T15609] ? bpf_prog_alloc_no_stats+0x9a/0x3f0 [ 485.920155][T15609] should_failslab+0x9/0x20 [ 485.924760][T15609] __kmem_cache_alloc_node+0x3d/0x2c0 [ 485.930136][T15609] ? bpf_prog_alloc_no_stats+0x9a/0x3f0 [ 485.935675][T15609] kmalloc_trace+0x29/0xb0 [ 485.940087][T15609] bpf_prog_alloc_no_stats+0x9a/0x3f0 [ 485.945446][T15609] ? security_capable+0x99/0xc0 [ 485.950382][T15609] bpf_prog_alloc+0x22/0x1c0 [ 485.955129][T15609] bpf_prog_load+0x7c6/0x15a0 [ 485.959919][T15609] ? map_freeze+0x390/0x390 [ 485.964405][T15609] ? selinux_bpf+0xc7/0xf0 [ 485.968813][T15609] ? security_bpf+0x93/0xb0 [ 485.973320][T15609] __sys_bpf+0x504/0x780 [ 485.977546][T15609] ? bpf_link_show_fdinfo+0x320/0x320 [ 485.982905][T15609] ? __cfi_ksys_write+0x10/0x10 [ 485.988024][T15609] ? debug_smp_processor_id+0x17/0x20 [ 485.993469][T15609] __x64_sys_bpf+0x7c/0x90 [ 485.998004][T15609] x64_sys_call+0x488/0x9a0 [ 486.002579][T15609] do_syscall_64+0x4c/0xa0 [ 486.007066][T15609] ? clear_bhb_loop+0x30/0x80 [ 486.011728][T15609] ? clear_bhb_loop+0x30/0x80 [ 486.016402][T15609] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 486.022395][T15609] RIP: 0033:0x7fcff5b8ebe9 [ 486.026896][T15609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 486.046837][T15609] RSP: 002b:00007fcff69e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 486.055425][T15609] RAX: ffffffffffffffda RBX: 00007fcff5dc5fa0 RCX: 00007fcff5b8ebe9 [ 486.063712][T15609] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005 [ 486.071764][T15609] RBP: 00007fcff69e8090 R08: 0000000000000000 R09: 0000000000000000 [ 486.079807][T15609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 486.087885][T15609] R13: 00007fcff5dc6038 R14: 00007fcff5dc5fa0 R15: 00007ffd5ed939f8 [ 486.095869][T15609] [ 486.622019][T15622] syz.2.2508[15622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.622111][T15622] syz.2.2508[15622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.641153][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 487.783991][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 487.894042][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 487.922877][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 487.957647][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.964728][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 488.085856][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 488.093871][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 488.102603][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 488.112364][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.119470][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 488.129789][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 488.138360][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 488.150960][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 488.159257][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 488.265008][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 488.273666][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 488.299145][T15585] device veth0_vlan entered promiscuous mode [ 488.386597][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 488.394657][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 488.513485][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 488.521691][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 488.557132][T15585] device veth1_macvtap entered promiscuous mode [ 488.642358][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 488.654294][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 488.662954][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 488.670990][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 488.679557][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 488.706564][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 488.715076][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 490.217971][ T43] device bridge_slave_1 left promiscuous mode [ 490.224246][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.231796][ T43] device bridge_slave_0 left promiscuous mode [ 490.238048][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.245741][ T43] device veth1_macvtap left promiscuous mode [ 490.251981][ T43] device veth0_vlan left promiscuous mode [ 491.649681][T15663] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.656885][T15663] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.664500][T15663] device bridge_slave_0 entered promiscuous mode [ 491.682196][T15663] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.689819][T15663] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.717316][T15663] device bridge_slave_1 entered promiscuous mode [ 493.807576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 493.866653][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 493.971135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 493.979827][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 493.988756][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.995915][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 494.133195][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 494.258690][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 494.346145][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 494.353353][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 494.430453][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 494.477642][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 494.538964][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 494.553814][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 494.593497][T15663] device veth0_vlan entered promiscuous mode [ 494.691131][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 494.719586][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 494.773300][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 494.781192][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 495.186425][T15663] device veth1_macvtap entered promiscuous mode [ 495.193107][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 495.201597][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 495.210251][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 495.314971][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 495.323404][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 495.339225][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 495.348087][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 496.497137][ T43] device bridge_slave_1 left promiscuous mode [ 496.503337][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.511093][ T43] device bridge_slave_0 left promiscuous mode [ 496.517322][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 496.525245][ T43] device veth1_macvtap left promiscuous mode [ 496.531372][ T43] device veth0_vlan left promiscuous mode [ 498.249536][T15798] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.311092][T15798] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.322342][T15798] device bridge_slave_0 entered promiscuous mode [ 498.454954][T15798] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.462173][T15798] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.471599][T15798] device bridge_slave_1 entered promiscuous mode [ 498.751721][T15832] syz.0.2563[15832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.751800][T15832] syz.0.2563[15832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.532570][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 499.552019][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 499.561488][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 499.570588][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 499.579197][ T3823] bridge0: port 1(bridge_slave_0) entered blocking state [ 499.586271][ T3823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 499.661716][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 499.669672][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 499.678456][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 499.687085][ T3823] bridge0: port 2(bridge_slave_1) entered blocking state [ 499.694249][ T3823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 499.713694][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 499.728995][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 499.753914][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 499.849225][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 499.889127][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 499.997018][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 500.045621][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 500.108524][T15798] device veth0_vlan entered promiscuous mode [ 500.178571][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 500.193111][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 500.218860][T15798] device veth1_macvtap entered promiscuous mode [ 500.265873][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 500.277783][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 500.318473][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 500.326336][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 500.335102][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 500.344226][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 500.361149][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 500.897773][T15892] device sit0 left promiscuous mode [ 500.952095][T15893] device sit0 entered promiscuous mode [ 501.386940][ T376] device bridge_slave_1 left promiscuous mode [ 501.393158][ T376] bridge0: port 2(bridge_slave_1) entered disabled state [ 501.400884][ T376] device bridge_slave_0 left promiscuous mode [ 501.407309][ T376] bridge0: port 1(bridge_slave_0) entered disabled state [ 501.415199][ T376] device veth1_macvtap left promiscuous mode [ 501.421534][ T376] device veth0_vlan left promiscuous mode [ 503.261313][T15918] device veth1_macvtap left promiscuous mode [ 503.434700][T15909] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.609353][T15909] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.732978][T15909] device bridge_slave_0 entered promiscuous mode [ 503.920539][T15909] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.927950][T15909] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.936872][T15909] device bridge_slave_1 entered promiscuous mode [ 505.205438][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 505.213504][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 505.232558][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 505.245852][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 505.255162][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 505.262319][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 505.273875][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 505.319467][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 505.367848][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 505.406773][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 505.414295][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 505.484083][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 505.498499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 505.509091][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 505.524052][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 505.622664][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 505.647905][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 505.682450][T15909] device veth0_vlan entered promiscuous mode [ 505.694353][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 505.748716][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 505.810462][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 505.851755][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 505.876896][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 505.899811][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 506.128841][T15909] device veth1_macvtap entered promiscuous mode [ 506.251391][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 506.261470][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 506.328128][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 506.407174][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 507.426972][ T3823] device bridge_slave_1 left promiscuous mode [ 507.433286][ T3823] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.441288][ T3823] device bridge_slave_0 left promiscuous mode [ 507.447676][ T3823] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.455628][ T3823] device veth1_macvtap left promiscuous mode [ 507.461740][ T3823] device veth0_vlan left promiscuous mode [ 508.633730][T16024] syz.2.2624[16024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.633818][T16024] syz.2.2624[16024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.308975][T16035] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.328710][T16035] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.352299][T16035] device bridge_slave_0 entered promiscuous mode [ 509.419542][T16035] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.430328][T16035] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.438178][T16035] device bridge_slave_1 entered promiscuous mode [ 509.626055][T16052] device sit0 entered promiscuous mode [ 509.724046][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 509.732224][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 509.782321][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 509.791792][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 509.800739][ T3823] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.807821][ T3823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 509.815605][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 509.824719][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 509.834750][ T3823] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.841829][ T3823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 509.887408][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 509.895437][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 509.903913][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 510.049163][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 510.082677][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 510.122645][T16035] device veth0_vlan entered promiscuous mode [ 510.141505][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 510.172154][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 510.324228][T16035] device veth1_macvtap entered promiscuous mode [ 510.419119][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 510.491128][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 510.636787][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 510.668760][T16068] syz.5.2631[16068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.668837][T16068] syz.5.2631[16068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.699324][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 510.757066][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 511.896912][ T3823] device bridge_slave_1 left promiscuous mode [ 511.903374][ T3823] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.911133][ T3823] device bridge_slave_0 left promiscuous mode [ 511.917412][ T3823] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.925384][ T3823] device veth1_macvtap left promiscuous mode [ 511.931569][ T3823] device veth0_vlan left promiscuous mode [ 513.447955][T16086] bridge0: port 1(bridge_slave_0) entered blocking state [ 513.534099][T16086] bridge0: port 1(bridge_slave_0) entered disabled state [ 513.640168][T16086] device bridge_slave_0 entered promiscuous mode [ 513.763578][T16086] bridge0: port 2(bridge_slave_1) entered blocking state [ 513.928848][T16086] bridge0: port 2(bridge_slave_1) entered disabled state [ 513.997681][T16086] device bridge_slave_1 entered promiscuous mode [ 515.287831][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 515.323020][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 515.472503][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 515.627687][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 515.710063][ T3823] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.717285][ T3823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.730472][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 515.835796][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 515.951217][ T3823] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.958409][ T3823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 516.086969][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 516.095155][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 516.103726][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 516.118276][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 516.127443][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 516.135979][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 516.144971][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 516.159551][T16086] device veth0_vlan entered promiscuous mode [ 516.210458][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 516.250384][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 516.391768][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 516.547312][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 516.646610][T16086] device veth1_macvtap entered promiscuous mode [ 516.702213][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 516.741238][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 516.772697][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 516.800092][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 516.828020][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 516.986486][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 517.102284][T16161] FAULT_INJECTION: forcing a failure. [ 517.102284][T16161] name failslab, interval 1, probability 0, space 0, times 0 [ 517.125886][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 517.257123][T16161] CPU: 0 PID: 16161 Comm: syz.5.2668 Not tainted syzkaller #0 [ 517.264747][T16161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 517.274916][T16161] Call Trace: [ 517.278214][T16161] [ 517.281147][T16161] __dump_stack+0x21/0x24 [ 517.286666][T16161] dump_stack_lvl+0xee/0x150 [ 517.291557][T16161] ? __cfi_dump_stack_lvl+0x8/0x8 [ 517.296780][T16161] ? __d_alloc+0x34/0x6c0 [ 517.301486][T16161] dump_stack+0x15/0x24 [ 517.305837][T16161] should_fail_ex+0x3d4/0x520 [ 517.310539][T16161] __should_failslab+0xac/0xf0 [ 517.315498][T16161] should_failslab+0x9/0x20 [ 517.320196][T16161] slab_pre_alloc_hook+0x30/0x1e0 [ 517.325409][T16161] ? _raw_spin_lock+0x8e/0xe0 [ 517.330667][T16161] kmem_cache_alloc_lru+0x49/0x280 [ 517.335926][T16161] ? proc_alloc_inode+0x2a/0xc0 [ 517.341054][T16161] proc_alloc_inode+0x2a/0xc0 [ 517.345927][T16161] ? __cfi_proc_alloc_inode+0x10/0x10 [ 517.351426][T16161] new_inode_pseudo+0x70/0x1f0 [ 517.356652][T16161] new_inode+0x28/0x1e0 [ 517.360907][T16161] proc_pid_make_inode+0x27/0x1d0 [ 517.365930][T16161] proc_pident_instantiate+0x69/0x2b0 [ 517.371465][T16161] proc_pident_lookup+0x1c7/0x270 [ 517.376708][T16161] proc_tgid_base_lookup+0x2b/0x30 [ 517.381900][T16161] __lookup_slow+0x2c7/0x3f0 [ 517.386577][T16161] ? lookup_one_len+0x2d0/0x2d0 [ 517.391499][T16161] ? down_read+0xa0/0xf0 [ 517.395747][T16161] ? __cfi_down_read+0x10/0x10 [ 517.400587][T16161] lookup_slow+0x57/0x70 [ 517.404903][T16161] link_path_walk+0x936/0xe50 [ 517.409684][T16161] ? handle_lookup_down+0x130/0x130 [ 517.414965][T16161] ? __alloc_file+0x181/0x2a0 [ 517.419808][T16161] path_openat+0x285/0x2f50 [ 517.424559][T16161] ? kasan_set_track+0x4b/0x70 [ 517.429353][T16161] ? getname_flags+0xb9/0x500 [ 517.434290][T16161] ? getname+0x19/0x20 [ 517.438345][T16161] ? do_sys_openat2+0xcb/0x7e0 [ 517.443111][T16161] ? x64_sys_call+0x783/0x9a0 [ 517.447781][T16161] ? do_syscall_64+0x4c/0xa0 [ 517.452446][T16161] ? do_filp_open+0x3c0/0x3c0 [ 517.457108][T16161] do_filp_open+0x1c1/0x3c0 [ 517.461685][T16161] ? __cfi_do_filp_open+0x10/0x10 [ 517.466864][T16161] ? __cfi_kfree_link+0x10/0x10 [ 517.471806][T16161] ? alloc_fd+0x4e6/0x590 [ 517.476180][T16161] do_sys_openat2+0x185/0x7e0 [ 517.480864][T16161] ? do_sys_open+0xe0/0xe0 [ 517.485361][T16161] ? notify_die+0x174/0x1c0 [ 517.489942][T16161] ? __cfi_notify_die+0x10/0x10 [ 517.494876][T16161] __x64_sys_openat+0x136/0x160 [ 517.499762][T16161] x64_sys_call+0x783/0x9a0 [ 517.504287][T16161] do_syscall_64+0x4c/0xa0 [ 517.508703][T16161] ? clear_bhb_loop+0x30/0x80 [ 517.513374][T16161] ? clear_bhb_loop+0x30/0x80 [ 517.518150][T16161] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 517.524118][T16161] RIP: 0033:0x7f5ab538d550 [ 517.528613][T16161] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 517.548497][T16161] RSP: 002b:00007f5ab6237f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 517.557117][T16161] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f5ab538d550 [ 517.565728][T16161] RDX: 0000000000000002 RSI: 00007f5ab6237fa0 RDI: 00000000ffffff9c [ 517.573787][T16161] RBP: 00007f5ab6237fa0 R08: 0000000000000000 R09: 0000000000000000 [ 517.581861][T16161] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 517.589915][T16161] R13: 00007f5ab55c6038 R14: 00007f5ab55c5fa0 R15: 00007ffc88c4d318 [ 517.598496][T16161] [ 517.716598][T16166] syz.0.2657[16166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.716685][T16166] syz.0.2657[16166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 518.527019][ T8] device bridge_slave_1 left promiscuous mode [ 518.544923][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.552773][ T8] device bridge_slave_0 left promiscuous mode [ 518.559117][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.567404][ T8] device veth1_macvtap left promiscuous mode [ 518.573618][ T8] device veth0_vlan left promiscuous mode [ 520.386211][T16190] bridge0: port 1(bridge_slave_0) entered blocking state [ 520.398648][T16190] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.406314][T16190] device bridge_slave_0 entered promiscuous mode [ 520.443475][T16190] bridge0: port 2(bridge_slave_1) entered blocking state [ 520.488147][T16190] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.495800][T16190] device bridge_slave_1 entered promiscuous mode [ 521.920592][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 521.970344][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 522.073117][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 522.095413][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 522.167635][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 522.174807][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 522.236414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 522.246718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 522.259774][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 522.266851][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 522.366851][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 522.382672][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 522.516819][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 522.587289][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 522.676774][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 522.699023][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 522.717387][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 522.858236][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 522.888775][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 522.983976][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 523.001459][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 523.034721][T16190] device veth0_vlan entered promiscuous mode [ 523.226994][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 523.260682][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 523.279565][T16190] device veth1_macvtap entered promiscuous mode [ 523.302026][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 523.312248][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 523.337149][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 523.401110][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 523.497330][T16138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 524.547318][ T3823] device bridge_slave_1 left promiscuous mode [ 524.553498][ T3823] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.561363][ T3823] device bridge_slave_0 left promiscuous mode [ 524.567773][ T3823] bridge0: port 1(bridge_slave_0) entered disabled state [ 524.575727][ T3823] device veth1_macvtap left promiscuous mode [ 524.581915][ T3823] device veth0_vlan left promiscuous mode [ 526.623667][T16315] syz.0.2696[16315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.623768][T16315] syz.0.2696[16315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.658237][T16317] FAULT_INJECTION: forcing a failure. [ 526.658237][T16317] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 526.682877][T16317] CPU: 0 PID: 16317 Comm: syz.3.2701 Not tainted syzkaller #0 [ 526.690442][T16317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 526.700508][T16317] Call Trace: [ 526.703806][T16317] [ 526.706786][T16317] __dump_stack+0x21/0x24 [ 526.711312][T16317] dump_stack_lvl+0xee/0x150 [ 526.715915][T16317] ? __cfi_dump_stack_lvl+0x8/0x8 [ 526.720953][T16317] ? proc_fail_nth_write+0x17a/0x1f0 [ 526.726335][T16317] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 526.732066][T16317] ? security_file_permission+0x8a/0xb0 [ 526.737807][T16317] dump_stack+0x15/0x24 [ 526.742073][T16317] should_fail_ex+0x3d4/0x520 [ 526.746770][T16317] should_fail+0xb/0x10 [ 526.750931][T16317] should_fail_usercopy+0x1a/0x20 [ 526.756435][T16317] strncpy_from_user+0x24/0x2d0 [ 526.761577][T16317] strncpy_from_user_nofault+0x73/0x150 [ 526.767228][T16317] bpf_probe_read_user_str+0x2a/0x70 [ 526.772577][T16317] bpf_prog_860dce4575eb4f0a+0x35/0x37 [ 526.778050][T16317] bpf_trace_run2+0x1a7/0x250 [ 526.782920][T16317] ? fput+0x154/0x1a0 [ 526.786922][T16317] ? __cfi_bpf_trace_run2+0x10/0x10 [ 526.792403][T16317] ? ksys_write+0x1eb/0x240 [ 526.797008][T16317] ? __cfi_ksys_write+0x10/0x10 [ 526.801952][T16317] __bpf_trace_sys_enter+0x62/0x70 [ 526.807232][T16317] trace_sys_enter+0x3d/0x50 [ 526.811909][T16317] syscall_trace_enter+0xf3/0x150 [ 526.816938][T16317] syscall_enter_from_user_mode+0x1f/0x30 [ 526.822665][T16317] do_syscall_64+0x24/0xa0 [ 526.827088][T16317] ? clear_bhb_loop+0x30/0x80 [ 526.831770][T16317] ? clear_bhb_loop+0x30/0x80 [ 526.836448][T16317] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 526.842429][T16317] RIP: 0033:0x7f4aa3f8ebe9 [ 526.846848][T16317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 526.866847][T16317] RSP: 002b:00007f4aa4ec7fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 526.875279][T16317] RAX: ffffffffffffffda RBX: 00007f4aa41c5fa0 RCX: 00007f4aa3f8ebe9 [ 526.883440][T16317] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042000000 [ 526.891691][T16317] RBP: 00007f4aa4ec8090 R08: 0000000000000000 R09: 0000000000000000 [ 526.900640][T16317] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 526.908811][T16317] R13: 00007f4aa41c6038 R14: 00007f4aa41c5fa0 R15: 00007ffd97ecc1b8 [ 526.916889][T16317] [ 527.016229][T16320] device lo entered promiscuous mode [ 527.221488][T16305] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.228778][T16305] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.236444][T16305] device bridge_slave_0 entered promiscuous mode [ 527.283592][T16305] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.290821][T16305] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.303102][T16305] device bridge_slave_1 entered promiscuous mode [ 527.793008][ T28] audit: type=1400 audit(1756832341.284:136): avc: denied { create } for pid=16338 comm="syz.5.2708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 527.884863][T16344] device sit0 left promiscuous mode [ 527.944780][T16344] device sit0 entered promiscuous mode [ 528.207911][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 528.228995][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 528.350867][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 528.430823][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 528.502648][ T3823] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.509891][ T3823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.725016][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 528.803801][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 528.887824][ T3823] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.895031][ T3823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 529.154086][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 529.176101][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 529.186841][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 529.200066][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 529.208626][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 529.222187][T16305] device veth0_vlan entered promiscuous mode [ 529.258576][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 529.267894][T16371] FAULT_INJECTION: forcing a failure. [ 529.267894][T16371] name failslab, interval 1, probability 0, space 0, times 0 [ 529.274220][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 529.281625][T16371] CPU: 1 PID: 16371 Comm: syz.2.2716 Not tainted syzkaller #0 [ 529.290123][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 529.296453][T16371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 529.296465][T16371] Call Trace: [ 529.296470][T16371] [ 529.296476][T16371] __dump_stack+0x21/0x24 [ 529.296501][T16371] dump_stack_lvl+0xee/0x150 [ 529.305025][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 529.314360][T16371] ? __cfi_dump_stack_lvl+0x8/0x8 [ 529.314393][T16371] dump_stack+0x15/0x24 [ 529.314407][T16371] should_fail_ex+0x3d4/0x520 [ 529.318706][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 529.320733][T16371] ? security_inode_alloc+0x33/0x120 [ 529.325531][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 529.329824][T16371] __should_failslab+0xac/0xf0 [ 529.329851][T16371] should_failslab+0x9/0x20 [ 529.329865][T16371] kmem_cache_alloc+0x3b/0x330 [ 529.329885][T16371] ? slab_pre_alloc_hook+0x30/0x1e0 [ 529.329904][T16371] security_inode_alloc+0x33/0x120 [ 529.329922][T16371] inode_init_always+0x6fc/0x960 [ 529.329938][T16371] new_inode_pseudo+0xa2/0x1f0 [ 529.343102][T16305] device veth1_macvtap entered promiscuous mode [ 529.346858][T16371] __sock_create+0x12c/0x7c0 [ 529.408798][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 529.413042][T16371] __sys_socketpair+0x218/0x5b0 [ 529.430605][T16371] __x64_sys_socketpair+0x9b/0xb0 [ 529.435668][T16371] x64_sys_call+0x6e/0x9a0 [ 529.440262][T16371] do_syscall_64+0x4c/0xa0 [ 529.444676][T16371] ? clear_bhb_loop+0x30/0x80 [ 529.449381][T16371] ? clear_bhb_loop+0x30/0x80 [ 529.454060][T16371] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 529.459959][T16371] RIP: 0033:0x7fcff5b8ebe9 [ 529.461796][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 529.464495][T16371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 529.473768][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 529.492867][T16371] RSP: 002b:00007fcff69e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 529.492898][T16371] RAX: ffffffffffffffda RBX: 00007fcff5dc5fa0 RCX: 00007fcff5b8ebe9 [ 529.492909][T16371] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 529.492918][T16371] RBP: 00007fcff69e8090 R08: 0000000000000000 R09: 0000000000000000 [ 529.492927][T16371] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 529.492937][T16371] R13: 00007fcff5dc6038 R14: 00007fcff5dc5fa0 R15: 00007ffd5ed939f8 [ 529.492954][T16371] [ 529.498227][T16371] socket: no more sockets [ 529.661984][T16376] FAULT_INJECTION: forcing a failure. [ 529.661984][T16376] name failslab, interval 1, probability 0, space 0, times 0 [ 529.697011][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 529.747137][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 529.776047][T16376] CPU: 1 PID: 16376 Comm: syz.3.2718 Not tainted syzkaller #0 [ 529.783561][T16376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 529.793793][T16376] Call Trace: [ 529.797075][T16376] [ 529.799998][T16376] __dump_stack+0x21/0x24 [ 529.804330][T16376] dump_stack_lvl+0xee/0x150 [ 529.808933][T16376] ? __cfi_dump_stack_lvl+0x8/0x8 [ 529.814132][T16376] dump_stack+0x15/0x24 [ 529.818280][T16376] should_fail_ex+0x3d4/0x520 [ 529.822965][T16376] ? security_inode_alloc+0x33/0x120 [ 529.828311][T16376] __should_failslab+0xac/0xf0 [ 529.833075][T16376] should_failslab+0x9/0x20 [ 529.837664][T16376] kmem_cache_alloc+0x3b/0x330 [ 529.842424][T16376] ? slab_pre_alloc_hook+0x30/0x1e0 [ 529.847734][T16376] security_inode_alloc+0x33/0x120 [ 529.852860][T16376] inode_init_always+0x6fc/0x960 [ 529.857794][T16376] new_inode_pseudo+0xa2/0x1f0 [ 529.862549][T16376] __sock_create+0x12c/0x7c0 [ 529.867158][T16376] __sys_socketpair+0x218/0x5b0 [ 529.872040][T16376] __x64_sys_socketpair+0x9b/0xb0 [ 529.877204][T16376] x64_sys_call+0x6e/0x9a0 [ 529.881648][T16376] do_syscall_64+0x4c/0xa0 [ 529.886160][T16376] ? clear_bhb_loop+0x30/0x80 [ 529.890926][T16376] ? clear_bhb_loop+0x30/0x80 [ 529.895611][T16376] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 529.901593][T16376] RIP: 0033:0x7f4aa3f8ebe9 [ 529.906104][T16376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 529.925894][T16376] RSP: 002b:00007f4aa4ec8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 529.934333][T16376] RAX: ffffffffffffffda RBX: 00007f4aa41c5fa0 RCX: 00007f4aa3f8ebe9 [ 529.942526][T16376] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 529.950630][T16376] RBP: 00007f4aa4ec8090 R08: 0000000000000000 R09: 0000000000000000 [ 529.958703][T16376] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 529.966686][T16376] R13: 00007f4aa41c6038 R14: 00007f4aa41c5fa0 R15: 00007ffd97ecc1b8 [ 529.974674][T16376] [ 530.046642][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 530.146752][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 530.240489][T16376] socket: no more sockets [ 530.857044][ T3823] device bridge_slave_1 left promiscuous mode [ 530.863571][ T3823] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.871178][ T3823] device bridge_slave_0 left promiscuous mode [ 530.877508][ T3823] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.885501][ T3823] device veth1_macvtap left promiscuous mode [ 530.891731][ T3823] device veth0_vlan left promiscuous mode [ 532.881533][T16403] device sit0 left promiscuous mode [ 532.917577][T16404] syz.3.2724[16404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.918813][T16404] syz.3.2724[16404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.970348][T16406] device sit0 entered promiscuous mode [ 534.084913][T16405] bridge0: port 1(bridge_slave_0) entered blocking state [ 534.110971][T16405] bridge0: port 1(bridge_slave_0) entered disabled state [ 534.119021][T16405] device bridge_slave_0 entered promiscuous mode [ 534.126235][T16405] bridge0: port 2(bridge_slave_1) entered blocking state [ 534.134361][T16405] bridge0: port 2(bridge_slave_1) entered disabled state [ 534.148452][T16405] device bridge_slave_1 entered promiscuous mode [ 534.329570][T16433] FAULT_INJECTION: forcing a failure. [ 534.329570][T16433] name failslab, interval 1, probability 0, space 0, times 0 [ 534.552636][T16433] CPU: 1 PID: 16433 Comm: syz.0.2734 Not tainted syzkaller #0 [ 534.560342][T16433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 534.570410][T16433] Call Trace: [ 534.573962][T16433] [ 534.576888][T16433] __dump_stack+0x21/0x24 [ 534.581239][T16433] dump_stack_lvl+0xee/0x150 [ 534.585844][T16433] ? __cfi_dump_stack_lvl+0x8/0x8 [ 534.590908][T16433] dump_stack+0x15/0x24 [ 534.595151][T16433] should_fail_ex+0x3d4/0x520 [ 534.599846][T16433] __should_failslab+0xac/0xf0 [ 534.604784][T16433] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 534.610851][T16433] should_failslab+0x9/0x20 [ 534.615363][T16433] __kmem_cache_alloc_node+0x3d/0x2c0 [ 534.620828][T16433] ? __cfi_mutex_lock+0x10/0x10 [ 534.625769][T16433] ? delete_node+0x2f4/0xa60 [ 534.630550][T16433] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 534.636635][T16433] __kmalloc+0xa1/0x1e0 [ 534.640969][T16433] ? __cfi___bpf_trace_tlb_flush+0x10/0x10 [ 534.647135][T16433] tracepoint_probe_unregister+0x1e6/0x8b0 [ 534.653057][T16433] bpf_probe_unregister+0x61/0x70 [ 534.658097][T16433] bpf_raw_tp_link_release+0x63/0x90 [ 534.663473][T16433] bpf_link_free+0x13a/0x390 [ 534.668202][T16433] ? bpf_link_put_deferred+0x20/0x20 [ 534.673492][T16433] bpf_link_release+0x15f/0x170 [ 534.678347][T16433] ? __cfi_bpf_link_release+0x10/0x10 [ 534.683716][T16433] __fput+0x1fc/0x8f0 [ 534.687717][T16433] ____fput+0x15/0x20 [ 534.691698][T16433] task_work_run+0x1db/0x240 [ 534.696294][T16433] ? __cfi_task_work_run+0x10/0x10 [ 534.701406][T16433] ? filp_close+0x111/0x160 [ 534.706018][T16433] exit_to_user_mode_loop+0x9b/0xb0 [ 534.711259][T16433] exit_to_user_mode_prepare+0x5a/0xa0 [ 534.716730][T16433] syscall_exit_to_user_mode+0x1a/0x30 [ 534.722333][T16433] do_syscall_64+0x58/0xa0 [ 534.726790][T16433] ? clear_bhb_loop+0x30/0x80 [ 534.731669][T16433] ? clear_bhb_loop+0x30/0x80 [ 534.736441][T16433] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 534.742537][T16433] RIP: 0033:0x7f0d28f8ebe9 [ 534.747145][T16433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 534.767165][T16433] RSP: 002b:00007f0d29ded038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 534.775838][T16433] RAX: 0000000000000000 RBX: 00007f0d291c6090 RCX: 00007f0d28f8ebe9 [ 534.784124][T16433] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 534.792138][T16433] RBP: 00007f0d29ded090 R08: 0000000000000000 R09: 0000000000000000 [ 534.800555][T16433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 534.808626][T16433] R13: 00007f0d291c6128 R14: 00007f0d291c6090 R15: 00007ffdee19a2a8 [ 534.816616][T16433] [ 534.829177][ T16] CFI failure at __traceiter_tlb_flush+0x80/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0x205553a5) [ 534.829170][T16431] CFI failure at __traceiter_tlb_flush+0x80/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0x205553a5) [ 534.829248][T16431] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 534.858383][T16431] CPU: 0 PID: 16431 Comm: syz.0.2734 Not tainted syzkaller #0 [ 534.866005][T16431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 534.876131][T16431] RIP: 0010:__traceiter_tlb_flush+0x80/0xd0 [ 534.882040][T16431] Code: 89 f8 48 c1 e8 03 42 80 3c 28 00 74 05 e8 a8 63 07 00 49 8b 7c 24 08 44 89 f6 48 8b 55 d0 41 ba 5b ac aa df 44 03 53 fc 74 02 <0f> 0b ff d3 49 83 c7 18 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 534.901640][T16431] RSP: 0018:ffffc90000cb74c8 EFLAGS: 00010093 [ 534.907794][T16431] RAX: 1ffff11022e82203 RBX: ffffffff817125b0 RCX: ffff888121b02880 [ 534.915937][T16431] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffc90000b5b000 [ 534.923994][T16431] RBP: ffffc90000cb74f8 R08: dffffc0000000000 R09: fffffbfff0ee4b9e [ 534.932087][T16431] R10: 0000000084eb1367 R11: 1ffffffff0ee4b9d R12: ffff888117411010 [ 534.940305][T16431] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff888117411010 [ 534.948632][T16431] FS: 00007f0d29e0e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 534.957654][T16431] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 534.964332][T16431] CR2: 00007f4aa4e44d58 CR3: 000000010005e000 CR4: 00000000003506b0 [ 534.972645][T16431] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 534.980601][T16431] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 534.988667][T16431] Call Trace: [ 534.993276][T16431] [ 534.996238][T16431] switch_mm_irqs_off+0x61f/0x980 [ 535.001247][T16431] ? __get_locked_pte+0x28e/0x350 [ 535.006351][T16431] __text_poke+0x461/0x650 [ 535.010748][T16431] ? __cfi_text_poke_memcpy+0x10/0x10 [ 535.016198][T16431] ? __SCT__tp_func_kmem_cache_alloc+0x8/0x8 [ 535.022592][T16431] ? text_poke+0x30/0x30 [ 535.027141][T16431] ? text_poke_loc_init+0xd6/0x570 [ 535.032459][T16431] ? __kernel_text_address+0xd/0x30 [ 535.037743][T16431] text_poke_bp_batch+0x12f/0x580 [ 535.042853][T16431] ? text_poke_finish+0x30/0x30 [ 535.047810][T16431] ? text_poke_loc_init+0x570/0x570 [ 535.053015][T16431] ? __stack_depot_save+0x36/0x480 [ 535.058106][T16431] ? __SCT__tp_func_kmem_cache_alloc+0x8/0x8 [ 535.064410][T16431] text_poke_bp+0xc8/0x140 [ 535.068896][T16431] ? __cfi_text_poke_bp+0x10/0x10 [ 535.073901][T16431] ? __kmalloc+0xb1/0x1e0 [ 535.078234][T16431] ? trace_event_reg+0x150/0x260 [ 535.083241][T16431] ? perf_trace_event_init+0x455/0x960 [ 535.088782][T16431] ? perf_tp_event_init+0x8e/0x120 [ 535.094217][T16431] __static_call_transform+0x318/0x500 [ 535.099673][T16431] ? __kasan_check_write+0x14/0x20 [ 535.104797][T16431] ? __SCT__tp_func_kmem_cache_alloc+0x8/0x8 [ 535.110772][T16431] ? text_poke_bp+0x140/0x140 [ 535.115561][T16431] ? __kasan_check_write+0x14/0x20 [ 535.120973][T16431] ? mutex_lock+0x8d/0x1a0 [ 535.125650][T16431] ? __cfi_mutex_lock+0x10/0x10 [ 535.130504][T16431] ? __SCT__tp_func_kmem_cache_alloc+0x8/0x8 [ 535.136612][T16431] ? __cfi_perf_trace_kmalloc+0x10/0x10 [ 535.142172][T16431] arch_static_call_transform+0xd3/0x280 [ 535.147950][T16431] ? __SCT__tp_func_kmem_cache_alloc+0x8/0x8 [ 535.154016][T16431] __static_call_update+0xef/0x5c0 [ 535.159270][T16431] ? __cfi_perf_trace_kmalloc+0x10/0x10 [ 535.164916][T16431] ? __cfi___static_call_update+0x10/0x10 [ 535.170717][T16431] ? __kasan_kmalloc+0x95/0xb0 [ 535.175499][T16431] ? memcpy+0x56/0x70 [ 535.179646][T16431] ? __cfi_perf_trace_kmalloc+0x10/0x10 [ 535.185187][T16431] tracepoint_add_func+0x839/0x900 [ 535.190283][T16431] ? __cfi_perf_trace_kmalloc+0x10/0x10 [ 535.195826][T16431] ? __cfi_perf_trace_kmalloc+0x10/0x10 [ 535.201347][T16431] tracepoint_probe_register+0x5a/0x90 [ 535.206783][T16431] ? __cfi_perf_trace_kmalloc+0x10/0x10 [ 535.212391][T16431] trace_event_reg+0x150/0x260 [ 535.217230][T16431] perf_trace_event_init+0x455/0x960 [ 535.222740][T16431] perf_trace_init+0x240/0x2e0 [ 535.227590][T16431] perf_tp_event_init+0x8e/0x120 [ 535.232685][T16431] perf_try_init_event+0x15b/0x450 [ 535.237923][T16431] perf_event_alloc+0x10f7/0x1970 [ 535.242941][T16431] __se_sys_perf_event_open+0x5ae/0x1b80 [ 535.248554][T16431] ? __sys_bpf+0x4d1/0x780 [ 535.253069][T16431] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 535.258809][T16431] ? __kasan_check_write+0x14/0x20 [ 535.263898][T16431] ? fpregs_restore_userregs+0x128/0x260 [ 535.269509][T16431] __x64_sys_perf_event_open+0xbf/0xd0 [ 535.275045][T16431] x64_sys_call+0x385/0x9a0 [ 535.279630][T16431] do_syscall_64+0x4c/0xa0 [ 535.284020][T16431] ? clear_bhb_loop+0x30/0x80 [ 535.288673][T16431] ? clear_bhb_loop+0x30/0x80 [ 535.293411][T16431] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 535.299470][T16431] RIP: 0033:0x7f0d28f8ebe9 [ 535.304102][T16431] Code: Unable to access opcode bytes at 0x7f0d28f8ebbf. [ 535.311112][T16431] RSP: 002b:00007f0d29e0e038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 535.319598][T16431] RAX: ffffffffffffffda RBX: 00007f0d291c5fa0 RCX: 00007f0d28f8ebe9 [ 535.327745][T16431] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000180 [ 535.335819][T16431] RBP: 00007f0d29011e19 R08: 0000000000000000 R09: 0000000000000000 [ 535.343781][T16431] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 535.351832][T16431] R13: 00007f0d291c6038 R14: 00007f0d291c5fa0 R15: 00007ffdee19a2a8 [ 535.360015][T16431] [ 535.363029][T16431] Modules linked in: [ 535.366946][T16431] ---[ end trace 0000000000000000 ]--- [ 535.366974][ T16] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 535.372478][T16431] RIP: 0010:__traceiter_tlb_flush+0x80/0xd0 [ 535.378534][ T16] CPU: 1 PID: 16 Comm: rcu_exp_gp_kthr Tainted: G D syzkaller #0 [ 535.384504][T16431] Code: 89 f8 48 c1 e8 03 42 80 3c 28 00 74 05 e8 a8 63 07 00 49 8b 7c 24 08 44 89 f6 48 8b 55 d0 41 ba 5b ac aa df 44 03 53 fc 74 02 <0f> 0b ff d3 49 83 c7 18 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 535.393876][ T16] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 535.413816][T16431] RSP: 0018:ffffc90000cb74c8 EFLAGS: 00010093 [ 535.424067][ T16] RIP: 0010:__traceiter_tlb_flush+0x80/0xd0 [ 535.430137][T16431] RAX: 1ffff11022e82203 RBX: ffffffff817125b0 RCX: ffff888121b02880 [ 535.436279][ T16] Code: 89 f8 48 c1 e8 03 42 80 3c 28 00 74 05 e8 a8 63 07 00 49 8b 7c 24 08 44 89 f6 48 8b 55 d0 41 ba 5b ac aa df 44 03 53 fc 74 02 <0f> 0b ff d3 49 83 c7 18 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 535.444876][T16431] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffc90000b5b000 [ 535.464484][ T16] RSP: 0018:ffffc90000107a08 EFLAGS: 00010093 [ 535.472451][T16431] RBP: ffffc90000cb74f8 R08: dffffc0000000000 R09: fffffbfff0ee4b9e [ 535.478586][ T16] RAX: 1ffff11022e82203 RBX: ffffffff817125b0 RCX: ffff8881003a3cc0 [ 535.486537][T16431] R10: 0000000084eb1367 R11: 1ffffffff0ee4b9d R12: ffff888117411010 [ 535.494579][ T16] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffc90000b5b000 [ 535.502528][T16431] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff888117411010 [ 535.510513][ T16] RBP: ffffc90000107a38 R08: dffffc0000000000 R09: fffffbfff0ee4b9e [ 535.518461][T16431] FS: 00007f0d29e0e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 535.526495][ T16] R10: 0000000084eb1367 R11: 1ffffffff0ee4b9d R12: ffff888117411010 [ 535.535482][T16431] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 535.543620][ T16] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff888117411010 [ 535.550279][T16431] CR2: 00007f4aa4e44d58 CR3: 000000010005e000 CR4: 00000000003506b0 [ 535.558338][ T16] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 535.566320][T16431] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 535.575218][ T16] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 535.583170][T16431] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 535.589729][ T16] CR2: 00007fcff5dc7dac CR3: 000000013f7bf000 CR4: 00000000003506a0 [ 535.597740][T16431] Kernel panic - not syncing: Fatal exception [ 535.605712][ T16] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 535.605731][ T16] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 535.605743][ T16] Call Trace: [ 535.605748][ T16] [ 535.605759][ T16] switch_mm_irqs_off+0x61f/0x980 [ 535.605782][ T16] __schedule+0x9eb/0x14e0 [ 535.605800][ T16] ? release_firmware_map_entry+0x194/0x194 [ 535.605816][ T16] ? __mod_timer+0x7ae/0xb30 [ 535.605896][ T16] schedule+0xbd/0x170 [ 535.605910][ T16] schedule_timeout+0x12c/0x2e0 [ 535.605930][ T16] ? __cfi_schedule_timeout+0x10/0x10 [ 535.605948][ T16] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 535.605969][ T16] ? __cfi_process_timeout+0x10/0x10 [ 535.606015][ T16] ? prepare_to_swait_event+0x308/0x320 [ 535.606036][ T16] rcu_exp_sel_wait_wake+0x789/0x1e40 [ 535.606058][ T16] ? __cfi___pv_queued_spin_lock_slowpath+0x10/0x10 [ 535.606078][ T16] ? show_rcu_gp_kthreads+0x2600/0x2600 [ 535.606098][ T16] ? _raw_spin_lock_irq+0x8f/0xe0 [ 535.606118][ T16] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 535.606140][ T16] wait_rcu_exp_gp+0x33/0x40 [ 535.606180][ T16] kthread_worker_fn+0x3bf/0x770 [ 535.606197][ T16] ? __cfi_wait_rcu_exp_gp+0x10/0x10 [ 535.606214][ T16] kthread+0x281/0x320 [ 535.606229][ T16] ? __cfi_kthread_worker_fn+0x10/0x10 [ 535.606245][ T16] ? __cfi_kthread+0x10/0x10 [ 535.606260][ T16] ret_from_fork+0x1f/0x30 [ 535.606280][ T16] [ 535.606286][ T16] Modules linked in: [ 535.612356][ T16] ---[ end trace 0000000000000000 ]--- [ 535.612376][ T16] RIP: 0010:__traceiter_tlb_flush+0x80/0xd0 [ 535.612410][ T16] Code: 89 f8 48 c1 e8 03 42 80 3c 28 00 74 05 e8 a8 63 07 00 49 8b 7c 24 08 44 89 f6 48 8b 55 d0 41 ba 5b ac aa df 44 03 53 fc 74 02 <0f> 0b ff d3 49 83 c7 18 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 535.612425][ T16] RSP: 0018:ffffc90000cb74c8 EFLAGS: 00010093 [ 535.612442][ T16] RAX: 1ffff11022e82203 RBX: ffffffff817125b0 RCX: ffff888121b02880 [ 535.612455][ T16] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffc90000b5b000 [ 535.612467][ T16] RBP: ffffc90000cb74f8 R08: dffffc0000000000 R09: fffffbfff0ee4b9e [ 535.612479][ T16] R10: 0000000084eb1367 R11: 1ffffffff0ee4b9d R12: ffff888117411010 [ 535.612492][ T16] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff888117411010 [ 535.612504][ T16] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 535.612519][ T16] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 535.612531][ T16] CR2: 00007fcff5dc7dac CR3: 000000013f7bf000 CR4: 00000000003506a0 [ 535.612546][ T16] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 535.612557][ T16] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 536.728641][T16431] Shutting down cpus with NMI [ 536.997815][T16431] Kernel Offset: disabled [ 537.002236][T16431] Rebooting in 86400 seconds..