last executing test programs: 3.24465579s ago: executing program 1 (id=12748): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000004000000000000000200000018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf"], 0x0, 0x5, 0x0, 0x0, 0x41100, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4d0b}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x100040, 0xc8, 0x40000000, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40305829, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000640)=ANY=[@ANYRES8, @ANYRES64=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r10 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r11}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={r8, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x2b, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0xd}, @exit, @map_fd={0x18, 0x3, 0x1, 0x0, r10}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfc}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x10f}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x197}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0xf0, 0x4c, &(0x7f0000000900)=""/76, 0x40f00, 0x6b, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000340)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0xd, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[r0], &(0x7f0000000980)=[{0x0, 0x3, 0x9, 0x3}, {0x5, 0x2, 0x6, 0xb}, {0x1, 0x1, 0xe, 0xc}, {0x1, 0x5, 0x2, 0x2}, {0x5, 0x4, 0x10, 0x4}, {0x3, 0x5, 0xb, 0x9}], 0x10, 0x4}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r13}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r14, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000300)="d2ffdd934517f3e145f228e086dd", 0x0, 0xd5b4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.823254764s ago: executing program 1 (id=12753): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x50) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x403, 0xe9589, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x401, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) (async) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[], 0xfffffdef) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x15, 0x10, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000440)={r3, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x14, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x2}, @exit, @generic={0x5, 0xc, 0xb, 0x0, 0x5c80}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x810000, 0x61, &(0x7f0000000380)=""/97, 0x41100, 0x90, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x5, 0x6, 0x3, 0x200}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000480)=[r3, r6, r4, r4, r3, r4, r3, r4, r3], &(0x7f00000004c0)=[{0x0, 0x5, 0xc, 0x9}, {0x0, 0x1, 0xd, 0xc}, {0x0, 0x4, 0x8, 0x7}, {0x2, 0x5, 0x1, 0x5}]}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x28, 0x25, &(0x7f0000000000)="3fae5e2c117cfcf6db4efb293c8e06086fba2ccbb334d1eeadaf64b0020ea398fd9138ea59759aef", &(0x7f0000000040)=""/37, 0x100, 0x0, 0x0, 0x42, &(0x7f0000000080), &(0x7f00000001c0)="0c811d8ad5a9d07965a9615b4b1aefef24058bbaa1a064f3b715768d8e1e691fbcc4b4e965f1d5087d791c336bdb9599aacb64a133e37033cc56c70dfdf9e49c72ca", 0x0, 0x0, 0x100}, 0x50) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0d00000002000000040000000640000005000000", @ANYRES32, @ANYBLOB="0000000000007775806747b5ca8b261716af3900000097c6fee1e2bb04120a44478662d9a3b09423d0579933a89b118a033d1d7b8aa55a2679005081222cb4fb61edecb3aa763470c73eb67e8bce306d0f9d0f7b31c800"/99, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x50) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r7, &(0x7f0000000980), 0x20000992) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x880, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000100)=[{0x35, 0x0, 0x3, 0x36b}, {0x34, 0x0, 0x2, 0xfffffffe}, {0x0, 0x0, 0x0, 0x4}, {}, {0x6}]}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r9, 0x0, &(0x7f0000001780)=""/4096}, 0x20) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)={0x1b, 0x0, 0x0, 0x1158, 0x0, r9, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r10, &(0x7f00000002c0)="6f2f0efacf8f93ceedab6806d9db99b95a5079cf20f7b92bb3673744536bc393266c0352127d3d7c491f3096968982650c170d38ad0f0983cabcbdc5b4b50f0cd37f889f58683b89419978ecdce6eb355d35a5e18dac460620cf81393094c40d17609368377474fe6200d64d7bd78bdf8f981a169e9c94e07eff0c33f9eaf256796f2039fa0f4ba1f50ccf2ea81345ae58f24b02fa9a68a60be568cf0f1712cc64f092c8b50ac31b5fc5ab3bd400a93c169447", &(0x7f0000000500)=""/229, 0x4}, 0x20) 2.149638634s ago: executing program 1 (id=12759): perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, 0x0, &(0x7f00000005c0)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000000640)=""/204, 0x5c, 0xcc, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0}, 0x50) r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffff2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6694380b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x59405, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value, @void, @value=r0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r6}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) 1.961197985s ago: executing program 0 (id=12768): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x800}, 0x100001, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", 0x0, 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000280)={&(0x7f0000000300)="a9f6ed04849c81856251ce08f5a226aaaab55a0b3b8326494445af7ec630822760e338b8fbcdaa5e4cbba300c1cb5f68f1b7cb48a646246f7a400a9760f0c4a6140a45ccb48ab811499d5c9687e57edf9a45f52dc677bbea099f2c7d53af1d91a453bf3f11ced313816f9bdd0afd1418c37a9db6dd7d67250063b504abc653dba05275461649072027e86ee11ef6686743c28811200bf8d751a5607f4dee955313616c24ff4b39758efb15fd2ce9236aa4b09bb438700c5c4ce1aee3861fbe38e8a4b94aa1eec1526f0bc0b5d0f1de53a414e4b53bf130afd4c7ea2879f80171cc99c8962df04c51a27538a5e6c82cadf931420b1d160f508c", &(0x7f00000001c0)=""/62, &(0x7f0000000680)="3446fbd195ff2157d83828b0cbaa65c738130e8b2a39e1a97caf1c9bd46f63ff1449a290ae8cc37a2475694709f91c89248c543bcf8be184e50c6ddc2ab8a3d82ba750259a5a7ff75295e089683a574c8b69d502992be8e66cb849e24095c9178bece9edaaf9dfbdb5d8784d7336b3430b3e331acc041593c43f1a643a6c243837d8ddc92b9501d7db07", &(0x7f0000000880)="de61869b2cd5759dcd67258bceeb107b9a9e54758470c756e33f6f7ca73954f12d039a44e8d21c991f57d05a98ba5933d7e8b586b00f8ac012118e659de3e6ef7d15575d233f7f21cb539816ae60be38c62219e04d901a5280cb7cbf2f38f0a174e7c3670d5f4efe92011ae65ee5ab7525bb5f45d085dc64302fa7186a17462b0ed8d97b31a039189c42c945", 0xe, r0, 0x4}, 0x38) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r5}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, 0x0}, 0x20) 1.609784136s ago: executing program 3 (id=12772): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000b80), 0x9}, 0x4, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000fc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000e40), &(0x7f0000000f80)='%-5lx \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={0x1, 0x58, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="1e00000008000000040000000700000000000000", @ANYRES32=r2, @ANYBLOB="0100008000"/20, @ANYRES32=r3, @ANYRES32, @ANYBLOB="0100000005000000000000000a000000006d00"/28], 0x50) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r7}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x15, 0x11, &(0x7f0000000dc0)=ANY=[], 0x0, 0xd, 0x18, &(0x7f0000000780)=""/24, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000940)={0x0, 0xe, 0x5, 0x1000}, 0x10, 0x0, r5, 0x2, 0x0, &(0x7f0000000b00)=[{0x4, 0x1, 0xe, 0x4}, {0x1, 0x1, 0x10, 0xc}], 0x10, 0x8d2}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r10, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000001a80)='%pB \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r11, &(0x7f0000000340), &(0x7f0000000000), 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r4, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f00000009c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0xfffffff7}}, @typedef={0xc, 0x0, 0x0, 0x8, 0x5}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x5d, 0x0, 0x13, 0x6}]}, {0x0, [0x0, 0x3e, 0x0]}}, &(0x7f0000000cc0)=""/128, 0x5d, 0x80, 0x0, 0x1}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x6, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000700000000000000000000009500000000000000186a00000900000000000000800000000400000000000000"], &(0x7f0000000880)='syzkaller\x00', 0x0, 0x57, &(0x7f00000008c0)=""/87, 0x41000, 0x1a, '\x00', r12, 0x0, r13, 0x8, &(0x7f0000000b40)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000d40)={0x5, 0xd, 0x8, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000d80)=[r4], &(0x7f0000000dc0)=[{0x2, 0x4, 0x0, 0x1}, {0xc, 0x2, 0xa, 0x8}, {0x4, 0x5, 0x9, 0x3}, {0x5, 0x2, 0x7}, {0x3, 0x1, 0xf, 0x3}], 0x10, 0x800}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r14, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_tracing={0x1a, 0x1, &(0x7f0000001140)=@raw=[@ldst={0x1, 0x3, 0x3, 0x2, 0x9, 0x1, 0x1}], &(0x7f0000001180)='syzkaller\x00', 0x0, 0xc0, &(0x7f00000011c0)=""/192, 0x41000, 0x2, '\x00', r12, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001280)={0x1, 0x3, 0x402e63bb, 0x9}, 0x10, 0x9571, r9, 0x3, 0x0, &(0x7f00000012c0)=[{0x3, 0x1, 0x9, 0xa}, {0x4, 0x1, 0xf, 0x3}, {0x3, 0x1, 0x8, 0xc}], 0x10, 0x44}, 0x94) write$cgroup_int(r15, &(0x7f0000000e80)=0x1, 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_ext={0x1c, 0x12, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4a79c72b, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, @generic={0x2, 0x8, 0x4, 0x7, 0x8}]}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x3e, &(0x7f0000000180)=""/62, 0x40f00, 0x14, '\x00', r12, 0x0, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x3, 0x6, 0x7df, 0x6}, 0x10, 0x8fcc, r9, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1.246150327s ago: executing program 1 (id=12775): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], 0x0, 0xef, &(0x7f00000001c0)=[{}], 0x8, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x7c, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], 0x0, 0xef, &(0x7f00000001c0)=[{}], 0x8, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x7c, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x18, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @exit, @ldst={0x2, 0x0, 0x1, 0x8, 0xa, 0x80, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x7, 0x6, 0xb, 0x40}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x51, '\x00', r0, 0x0, r2, 0x8, &(0x7f0000000440)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000004c0)=[{0x2, 0x4, 0x4, 0x2}, {0x4, 0x3, 0x0, 0x5}, {0x4, 0x3, 0xc, 0x8}, {0x4, 0x5, 0x6, 0x6}, {0x3, 0x3, 0xf, 0xb}], 0x10, 0xe}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='initcall_finish\x00', r3, 0x0, 0x7}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', r0, 0xffffffffffffffff, 0x2, 0x5, 0x2}, 0x50) (async) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', r0, 0xffffffffffffffff, 0x2, 0x5, 0x2}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x15, 0x8, 0x4, 0x80a, 0x24240, r5, 0x6, '\x00', 0x0, r2, 0x5, 0x5, 0x5}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000780)={r6, 0xffffffffffffffff}, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000009c0)={0x80000000}, 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000009c0)={0x80000000, 0x0}, 0x8) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_lsm={0x1d, 0x11, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}]}, &(0x7f0000000880)='GPL\x00', 0xc463, 0x5c, &(0x7f00000008c0)=""/92, 0x41000, 0x8, '\x00', r0, 0x1b, r2, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0xb, 0x200, 0xd}, 0x10, r8, 0x0, 0x7, &(0x7f0000000a00)=[r6, r5], &(0x7f0000000a40)=[{0x3, 0x3, 0x7, 0x6}, {0x4, 0x3, 0x3, 0x5}, {0x5, 0x2, 0x10, 0x9}, {0x1, 0x4, 0xb, 0x7}, {0x4, 0x1, 0xf}, {0x3, 0x3, 0xe, 0x8}, {0x2, 0x1, 0xa, 0xc}], 0x10, 0x6}, 0x94) r10 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000bc0)={r10, r4, 0x0, 0x4, &(0x7f0000000b80)='GPL\x00'}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000bc0)={r10, r4, 0x0, 0x4, &(0x7f0000000b80)='GPL\x00'}, 0x30) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c80)={{r5, 0xffffffffffffffff}, &(0x7f0000000c00), &(0x7f0000000c40)=r3}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001dc0)={r6}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001dc0)={r6, 0xffffffffffffffff}, 0x4) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e80)={0x6, 0x5, &(0x7f0000000cc0)=@raw=[@alu={0x7, 0x0, 0x8, 0x5, 0x7, 0x10, 0xfffffffffffffff0}, @btf_id={0x18, 0xba5eda02a5772248, 0x3, 0x0, 0x1}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xc}], &(0x7f0000000d00)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000d40)=""/4096, 0x41100, 0x60, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000001d40)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001d80)={0x4, 0x6, 0x8, 0x61}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000001e00)=[r7, r7, r6, r6, r12, r6, r6], &(0x7f0000001e40)=[{0x2, 0x5, 0xd, 0x8}, {0x4, 0x2, 0x1, 0xc}, {0x1, 0x1, 0xf, 0x2}], 0x10, 0x6}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000020c0)={0x1c, 0x3, &(0x7f0000001f40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbef8, 0x0, 0x0, 0x0, 0x6ef1}}, &(0x7f0000001f80)='GPL\x00', 0xb, 0x0, 0x0, 0x40f00, 0x20, '\x00', r0, @fallback=0x8, r2, 0x8, &(0x7f0000001fc0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000002000)={0x3, 0x3, 0x8, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000002040), &(0x7f0000002080)=[{0x1, 0x4, 0x1, 0x1}, {0x3, 0x3, 0x4, 0x3}], 0x10, 0x401}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002280)={@map=r5, 0xd, 0x0, 0x4, &(0x7f0000002180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f00000021c0)=[0x0], &(0x7f0000002200)=[0x0], &(0x7f0000002240)=[0x0, 0x0], 0x0}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002300)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002300)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000022c0)={@cgroup=r17, r14, 0x1d, 0x14, 0x0, @void, @value, @void, @void, r16}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002340)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000002440)={0x0, r14}, 0x10) r21 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002480)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x8, '\x00', r0, r2, 0x1, 0x5}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002780)=@bpf_ext={0x1c, 0xc, &(0x7f0000002500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x248d, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000002580)='GPL\x00', 0xeb3, 0xd9, &(0x7f00000025c0)=""/217, 0x41000, 0x1, '\x00', r0, 0x0, r2, 0x8, &(0x7f00000026c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000002700)={0x2, 0xe, 0x3, 0x800}, 0x10, 0x15739, 0xffffffffffffffff, 0x0, &(0x7f0000002740)=[r12, r15, r6, r7, r7, r11, 0xffffffffffffffff, r5], 0x0, 0x10, 0x40}, 0x94) (async) r22 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002780)=@bpf_ext={0x1c, 0xc, &(0x7f0000002500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x248d, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000002580)='GPL\x00', 0xeb3, 0xd9, &(0x7f00000025c0)=""/217, 0x41000, 0x1, '\x00', r0, 0x0, r2, 0x8, &(0x7f00000026c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000002700)={0x2, 0xe, 0x3, 0x800}, 0x10, 0x15739, 0xffffffffffffffff, 0x0, &(0x7f0000002740)=[r12, r15, r6, r7, r7, r11, 0xffffffffffffffff, r5], 0x0, 0x10, 0x40}, 0x94) sendmsg$unix(r18, &(0x7f0000002900)={&(0x7f0000002380)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002400), 0x0, &(0x7f0000002840)=[@rights={{0x34, 0x1, 0x1, [r9, r3, r17, r17, r11, r15, r15, r20, r2]}}, @rights={{0x20, 0x1, 0x1, [r2, r15, r5, r4]}}, @rights={{0x1c, 0x1, 0x1, [r7, r21, r11]}}, @rights={{0x14, 0x1, 0x1, [r22]}}], 0x90, 0x800}, 0x4000000) syz_clone(0x400, &(0x7f0000002940)="f47a47c6c4f6e30ecbf4ffb8c3ec530356cf0bac20151c50898074bbe8348bf6776e86fa1ba4a5e2f52d46151a66523819c0ea2c399e46f0cc35542bf4b7d620", 0x40, &(0x7f0000002980), &(0x7f00000029c0), &(0x7f0000002a00)="250b11") r23 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003a80)={&(0x7f0000002a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f0000002a80)=""/4096, 0x1b, 0x1000, 0x1, 0x8001}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000003d00)={0x6, 0x23, &(0x7f0000003ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffff1}, {{0x18, 0x1, 0x1, 0x0, r15}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000003c00)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x2, '\x00', r0, @fallback=0x20, r23, 0x8, &(0x7f0000003c40)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000003c80)={0x3, 0x1, 0x6, 0x1}, 0x10, r1, r9, 0x0, &(0x7f0000003cc0)=[r12], 0x0, 0x10, 0xdd0a}, 0x94) r24 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000004040)=@bpf_lsm={0x1d, 0x13, &(0x7f0000003e00)=@raw=[@call={0x85, 0x0, 0x0, 0x77}, @jmp={0x5, 0x1, 0xa, 0x3, 0x9, 0xffffffffffffffff, 0xfffffffffffffff0}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ldst={0x1, 0x3, 0x2, 0x6, 0xb, 0x4, 0xfffffffffffffffc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r21}}], &(0x7f0000003ec0)='GPL\x00', 0x6, 0x37, &(0x7f0000003f00)=""/55, 0x40f00, 0x8, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f0000003f40)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000003f80)={0x3, 0xe, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000003fc0)=[r21, r6, r11, r12, r5], &(0x7f0000004000)=[{0x3, 0x5, 0x7, 0x6}, {0x5, 0x2, 0x7, 0x5}, {0x0, 0x1, 0xa, 0x4}, {0x3, 0x3, 0xe, 0x4}], 0x10, 0x6}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004140)={{r11}, &(0x7f0000003dc0), &(0x7f0000004100)=r24}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004140)={{r11}, &(0x7f0000003dc0), &(0x7f0000004100)=r24}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000004180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r25, &(0x7f0000004500)={&(0x7f00000041c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000043c0)=[{&(0x7f0000004240)="8e9fdba1c91cbefb48324c3aecba922812b5f9467bba9ed675867bca04e41e17b8eb4e37e331", 0x26}, {&(0x7f0000004280)="19344c8660ee872c0911494c5ce3975061c6ae9cf267c7caad2ec798fc15c7e0b08bbfaafd4a8347d21d68ad5ac148e4e41a6678a68ed416a34f21ddd61faedd0b22a63e1c873b24939e835847a72a03338403090b29c3e0bebd80748c5bdad43b9148306ee5b4989b4b86ba2a1ed590a918b94b428c03969ea3a11e509eed80cc7fcff88342bc4f30f83ae04df3f1c12fc2a5b0b482eca13f8ad6b9fca9b122ad237597fe712c0b0eb7", 0xaa}, {&(0x7f0000004340)="43d278d4dae0ea8a14a178dd2f3c9e61bbcf4ce5dda5f33958a91aa23af72a97ff9ef19e47e4c16dba09ec9c820570224964e3c5940eebb88891259894361490b4306b0ce2c8f4999e01", 0x4a}], 0x3, &(0x7f0000004440)=[@rights={{0x1c, 0x1, 0x1, [r4, r17, r2]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r23, 0xffffffffffffffff, r19, r7, r19]}}], 0x88, 0xc4}, 0x40880) (async) sendmsg$unix(r25, &(0x7f0000004500)={&(0x7f00000041c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000043c0)=[{&(0x7f0000004240)="8e9fdba1c91cbefb48324c3aecba922812b5f9467bba9ed675867bca04e41e17b8eb4e37e331", 0x26}, {&(0x7f0000004280)="19344c8660ee872c0911494c5ce3975061c6ae9cf267c7caad2ec798fc15c7e0b08bbfaafd4a8347d21d68ad5ac148e4e41a6678a68ed416a34f21ddd61faedd0b22a63e1c873b24939e835847a72a03338403090b29c3e0bebd80748c5bdad43b9148306ee5b4989b4b86ba2a1ed590a918b94b428c03969ea3a11e509eed80cc7fcff88342bc4f30f83ae04df3f1c12fc2a5b0b482eca13f8ad6b9fca9b122ad237597fe712c0b0eb7", 0xaa}, {&(0x7f0000004340)="43d278d4dae0ea8a14a178dd2f3c9e61bbcf4ce5dda5f33958a91aa23af72a97ff9ef19e47e4c16dba09ec9c820570224964e3c5940eebb88891259894361490b4306b0ce2c8f4999e01", 0x4a}], 0x3, &(0x7f0000004440)=[@rights={{0x1c, 0x1, 0x1, [r4, r17, r2]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r23, 0xffffffffffffffff, r19, r7, r19]}}], 0x88, 0xc4}, 0x40880) 1.110183755s ago: executing program 1 (id=12777): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b000000050000000200000004000000050000005fb85a9761210f432b8d7981dc74dd78f8d48a8695f8293eebe3f39262c3b6a37d0874e91b1e6b0e883d781769c6eaddad905db2aad15fd8886e4d11da45549f8b7f3f5e695c533fbcf168cc24c77318da4c8a13fe92d8c91d5b07c22439437d48d9df8b9d9ba091b214742cf814604ff461ee711f371850f07c5523199b68c835", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f00000016c0)=ANY=[@ANYBLOB="1800000000000000000000000400000018110000", @ANYRES32=r0, @ANYBLOB="ff00000500000000b7080000060000007b8af8ff00000000bfa2008b0000000000070200aaa417dfffb703000008000000b704000000000000850000000300000095241657d6000069166febdb2d89c0130d72e278227f136bc22954e30a4f24549b9f739054e0d2d6cfdf74e49df7da5ca5c7a8c33cd484cc16c24f35ad30488709f0a29d9dc115f6b198436bc1383f5ed0c493bce92349c03db2daee4d7ac229de6ac4a45a660d3398cf53dd97d8746160dc3731473bc90505a0e6f0fa8a9bbfb43523bd54a8f3922b52d5cd97957a13079824631cf1698b5162376a0cca34783d06371cf026d3a287761972f360584232a4d15a147be6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd", 0x0, 0x2, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="00000000020000f7ff000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r5, &(0x7f0000000780)="36c887a4", 0x0}, 0x20) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_devices(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270e7120000000000000000000000000000ac1414cf14"], 0xffdd) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x3, {0x4e22}}, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) 1.058221358s ago: executing program 0 (id=12778): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0100000003000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000002fc3e854ed091517cf700000000000000000000007bfa3583"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='scmi_rx_done\x00', r2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f00000002c0)=@base={0x10, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r12}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r0}, 0x10) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32=r13, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x23, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r14}, 0x10) 1.02638704s ago: executing program 4 (id=12779): r0 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x2}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x3, 0x8, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a13bb5c89c7a9e0af98cf511c4"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r9}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r5}, 0x4) 712.510598ms ago: executing program 0 (id=12781): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8040, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@ifindex, 0x1e, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0x15, &(0x7f00000002c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x5, 0x9, 0x5, 0x1ff, 0x10000}, @snprintf, @cb_func={0x18, 0x3, 0x4, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x8, 0x5, 0xe, 0x6, 0x800}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x3}], &(0x7f0000000380)='GPL\x00', 0x9f, 0x0, &(0x7f00000003c0), 0x41100, 0x8, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[0x1], &(0x7f0000000480)=[{0x5, 0x4, 0xe, 0x1}], 0x10, 0x4}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@ifindex=r3, 0xffffffffffffffff, 0x22, 0x4004, 0x0, @void, @value=r4, @void, @void, r1}, 0x20) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001780)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001800)={&(0x7f0000000580)="4d1d698be7423ec2f7fe00f85060345816c9b044730942c29d750167752ce6b1f05747c9f1b375e15b4891efd9e1309545", &(0x7f00000005c0)=""/4096, &(0x7f00000015c0)="9df4a07da9eb3732c90cd2d2de78d379dcf63eb51df94458faa381dfa46d0cdbafcd2bd21718e7d61011103f96116e4899df48eec0491d431465e5b74981a5574fc65cebd4a13215184e9523703d4bc30ebcc83d0d36eed0c7d04efac56915856d5df9e3eeeb78c02d463cfe0e9fe134d897ef3a8c64906c373ac1057028a169f601ebbbb54a9d026a77558fb4", &(0x7f0000001680)="511ad50e3cc406bc0ae817474b4271da8d5d00fa0f11454d164ebd358eaa456757536e0bb46767dfa7db6cbe29414e9ed9b7e9b74fcf2e98bdf7109d4fd6108897390444274e49f0fd01f58dfa458659028e71b00b5fac8c4eed137b21eedacdb22a32f8debe842344457296812884fc85b9009b23f273fc496a82a927c4223dfcbe6d9baacca95271cce4ff521a9ff44a7290cf23dc534ffda7dd1cbd578b9dcfa37b73c9d05a281efceae13f2776e1e4b89f5d00dd24b63c7bbbb90fda12f0f54c80c0f8d11be05f88", 0x6, r5, 0x4}, 0x38) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000001840)={'xfrm0\x00'}) openat$ppp(0xffffffffffffff9c, &(0x7f0000001880), 0x402, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=@bloom_filter={0x1e, 0xd3, 0x8000, 0x464c, 0x42032, r5, 0xffff, '\x00', r3, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0x3}, 0x50) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000001940), 0x20000, 0x0) ioctl$TUNGETVNETBE(r7, 0x800454df, &(0x7f0000001980)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c40)=@bpf_lsm={0x1d, 0xb, &(0x7f0000001a40)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @jmp={0x5, 0x0, 0x4, 0xb, 0x0, 0x0, 0x1}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x86e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x0, 0xc, 0x3, 0x3, 0x2, 0xfffffffffffffffc}], &(0x7f0000001ac0)='GPL\x00', 0xd, 0x0, 0x0, 0x41100, 0x56, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001b00)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001b40)={0x1, 0xa, 0xfffffff8, 0x3}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001b80)=[r5, r6, r5, r6, r5, r5, r5, r0], &(0x7f0000001bc0)=[{0x2, 0x5, 0x8, 0xb}, {0x1, 0x4, 0x2, 0x2}, {0x4, 0x3, 0x8, 0xa}, {0x0, 0x2, 0xf, 0x2}, {0x1, 0x4, 0x10, 0xc}, {0x5, 0x4, 0xa, 0xb}, {0x1, 0x1, 0x10, 0x1}], 0x10, 0x3ff}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d40)={{r6, 0xffffffffffffffff}, &(0x7f0000001a00), &(0x7f0000001d00)=r9}, 0x20) r11 = getpid() r12 = perf_event_open(&(0x7f0000001e40)={0x3, 0x80, 0x4, 0x1, 0x6, 0x2, 0x0, 0x8, 0x20080, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x2116, 0x2, 0x7, 0x7, 0x1, 0x1, 0x2, 0x0, 0xffff, 0x0, 0x3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x9, 0x4, 0xb6, 0x9, 0x0, 0x4, 0x44, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x0, 0xf}, 0x10c10, 0x7, 0x8, 0x2, 0x0, 0x8000, 0x9, 0x0, 0x6, 0x0, 0x9}, r11, 0x9, r12, 0x9) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001ec0)={r2, 0xfffff801, 0x8}, 0xc) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001f00)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r13, 0x401054d5, &(0x7f0000001fc0)={0x9, &(0x7f0000001f40)=[{0x5, 0x6, 0x9, 0x101}, {0x2, 0xd, 0x2, 0x6}, {0xf0fc, 0x68, 0x10, 0x19faac83}, {0x1, 0x5, 0x9, 0x40}, {0x2, 0x0, 0x1, 0x2}, {0xff, 0x7, 0x8, 0x4}, {0xfff9, 0x0, 0x3, 0x7}, {0x401, 0x4, 0x6, 0x6}, {0x8, 0xae, 0x66, 0x3}]}) bpf$TOKEN_CREATE(0x24, &(0x7f0000002000)={0x0, r13}, 0x8) ioctl$TUNSETDEBUG(r8, 0x400454c9, &(0x7f0000002040)=0x7) mkdir(&(0x7f0000002080)='./file0\x00', 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002140)={r6, 0x58, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002180)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0xfff, '\x00', r14, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x50) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000002200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002240)={0xffffffffffffffff}, 0x4) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000002280)=0x9e12) 711.551899ms ago: executing program 3 (id=12782): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000007000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='rxrpc_rx_done\x00', 0xffffffffffffffff, 0x0, 0xffff}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000084000000000100000100000000", @ANYRES32, @ANYRESHEX=0x0], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x15, 0x4, 0x4, 0x2, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=r2], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)='U', &(0x7f0000000540), 0x80000000, r10}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000600)='ext4_request_blocks\x00', r12, 0x0, 0x100}, 0x18) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r13}, 0x10) 710.200288ms ago: executing program 2 (id=12783): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff0000ffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x94) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000c00)="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", &(0x7f00000005c0)=""/155}, 0x20) (async, rerun: 64) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040, 0x80000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000a00)={0xffffffffffffffff, r0, 0x0, r2}, 0x10) (rerun: 32) close(r4) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x16}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async, rerun: 64) perf_event_open$cgroup(&(0x7f0000000500)={0x7, 0x80, 0x1, 0x49, 0x7, 0xbe, 0x0, 0x10, 0x30008, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffff8, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x4600, 0x38f5, 0x6, 0x8, 0x4, 0xc, 0x1, 0x0, 0x80000000, 0x0, 0x4}, r3, 0x2, 0xffffffffffffffff, 0x16) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001000)={0x3, 0xc, &(0x7f0000001140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r4, @ANYRESDEC=r2, @ANYRESHEX=r6, @ANYRESDEC=r1], 0x0, 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0xc, &(0x7f0000000dc0)=ANY=[], &(0x7f00000009c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000900)='devlink_trap_report\x00', r7, 0x0, 0x1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES8=r5], 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x5, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_pid(r10, &(0x7f0000000980), 0x20000992) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000280)={&(0x7f0000000b00)="af2b3cdbfc80a281b34aa7bc9660691e52f3b8a3418bb373bffdade5e5aec12e06827c6a69193b01c402c6d161a41489d789af230efd1af20302da3ebaa9e155829001993ec5e75816af61f4f97e1978a2ae973d366a2b39b2f106f4d533f421164a4698050e35b7be29680c4561079c7680e2dcd524b3871cae79f4889a61343ee79081f4442f8b5f8bb431f7e60311a79a18d28cf32a467fa13fa2fa34d820918714103033f23b413f509b7a1a4ff72c0ad2bdc82f9245ba07bb", &(0x7f0000000680)=""/142, &(0x7f0000000840)="faa51d072ea216de2ddd9fc7dd9404c585c49874ecb2286abf2a24ee3faf492ae7ce650012d4738feaf53f28596686f42e038a96c63fe42648082b0c311b237e16a53722bd38e87a0fced17cf61def282ef46b3fa90118e296107381c2faa8e5805fcdfac492b71f0edb9acf8e4128fa42f197066605b4256f16153f237c0a452fb6f80cc3e159dfbff87771aca8645c9d81902e2b600fed438a82f70c2b83cf37339fa01ef4b7dda40a4ab3951a6e37f0384f24d711d92eedbf42e9b2", &(0x7f0000000f00)="6d3eb86eb95edf29f59323498113b59540e7afb168771f111688280b69eed39c0b55567b80f3e21e60dfaa230a31c393d4dcc37fcff3e82f32c8e2df9c3432cd351f12b8053408224d3d1243cb42188d1b3e160419de707673c9b2ca4df85ea8233ade362c47ac30b66df68c89f2c9d4c800b20ecb1b3d70f62b0434db371790ae0e54d727436385a78477acfbead7a296ef5595a01cc0c0fb8e925cfc5dc2b31a8e6ebf8096a659b924b7888ebfcdac61225cbce0260039779d9aeaada9775331f012615de8a3", 0x7, 0xffffffffffffffff, 0x4}, 0x38) 666.266821ms ago: executing program 4 (id=12784): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@fallback=r2, 0x2, 0x0, 0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0]}, 0x40) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0xd2, 0x0, 0x0, 0x60300, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x8000, 0xc8, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC, @ANYRESDEC=r1], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x8000, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) 660.616102ms ago: executing program 0 (id=12785): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x2b}, 0x1f) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r2 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = gettid() sendmsg$unix(r3, &(0x7f0000001200)={&(0x7f0000000e00)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001100)=[{&(0x7f0000000e80)="b1640230ee7161d223f5675c69d0486b76b4f4bcbccc6adbfd0af49e809025f09a3f794a0924bdc0e59b40d21735b8c21fe18c6501ccd89859f8d945b0262ed215b1d69dbad34b6e48fda763a9ab0f67c37b46320fcc7dd172018022c455b8b6156c2c962bf67f07abd9375da95ada76369824c1eeadc77d2bb748224e15000bb6463b99c5bd26242dfd2f2598b4630aee40debdaa8889efade17bbc8b8d436625", 0xa1}, {&(0x7f00000000c0)="fd434fdaf8242685019c336818bd62646af5b9", 0x13}, {&(0x7f0000000f40)="210f93dcaefd6201c04c3f33ead893dbaf0d5a615a5bad110084914c30a3df1e674d23fdd1699744ad2e9b1bfbe7fe27e4543602bb842f52c9604eae1e74ac7549f814744cb279ba75a48314a0e3b103a91d6afa54bebc05adb50d2083d7d16c95daf9e735b67b51a8ec7693472ec56989f80357931c88e683d29653510eb2b46cae7f56badf95e30004c2fbd7f5ea57823dd7fd9a0bd547e6eab17f634403d891e59744c3b30524c3c6a2c7c3d5ee153908fe36ce", 0xb5}, {&(0x7f0000001000)="3aae27a3f4017bbb6aceb419bfd164b94059f970c930044c7b98ce18f491e59bc6a07c5902335dae40712bdb65b622305b10314e1a966e0e90894b9d80b4a8647f2abbe5a0e494127cebd2b7401d319f1481ead14deecada02f2441a87a3c6af87744cea1d94db6c24d436f538cda4354b369f17df0aaa3787e4b9c570a0141c3125ba8cb668fd289a104479ff225f5810bf68832aa9e4cd5de3b4847b070aa65389a13d3e593863a7ac17ec0b4393b2b9755f6b3c14141c97e1629a647627efadd84673bce219935a3faa3c71b799da9823d4c7d42bbe64ad23c3c56763d690db5d8080da62c444eb0ce5789f4b6fd8", 0xf0}], 0x4, &(0x7f0000001140)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee01}}}, @rights={{0x34, 0x1, 0x1, [r1, r0, r0, r0, r0, r0, r0, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x90, 0x2404c010}, 0x1) 656.958652ms ago: executing program 2 (id=12786): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000faf5ffff0000000000000000850000002c000000850000002a0000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x28, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7, 0x0, 0x89}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYRESHEX], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/mnt\x00') ioctl$TUNSETIFF(r3, 0xb701, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18ecffffcffe00000000000000000000000100"/28, @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000003d9b300008000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x94d, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018b4c1a4", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) 654.308082ms ago: executing program 3 (id=12787): bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="d60a00000000000061118c0000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x2f, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, [@btf_id={0x18, 0x2, 0x3, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xc74d}}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc81}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}]}, &(0x7f0000000200)='GPL\x00', 0xfffffffd, 0xa4, &(0x7f0000000240)=""/164, 0x40f00, 0x4c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x3, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, r0, 0xffffffffffffffff], 0x0, 0x10, 0xfffffff8}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000500)=r1, 0x4) 568.105427ms ago: executing program 3 (id=12788): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0xfffffffffffffd83, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) mkdirat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x1ff) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) write$cgroup_int(r4, &(0x7f0000000100)=0x1, 0x12) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={0x0, r6}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000340)={r2, r4}, 0xc) bpf$MAP_CREATE(0x2000000000000000, &(0x7f00000007c0)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="aa00"], 0x48) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 504.946131ms ago: executing program 2 (id=12789): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000003000000040001000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="000001000000000001000000f9"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000003000000040001000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="000001000000000001000000f9"], 0x50) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r3, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x82745, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext={0x1, 0x89}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x401}, r3, 0x1, r2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041800f3fe"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40202, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) socketpair(0xb, 0x1, 0x0, 0x0) (async) socketpair(0xb, 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x1d, &(0x7f00000001c0), 0x4) write$cgroup_devices(r7, &(0x7f0000000000)=ANY=[@ANYRES32=r1], 0xffffffffffffffd7) (async) write$cgroup_devices(r7, &(0x7f0000000000)=ANY=[@ANYRES32=r1], 0xffffffffffffffd7) 503.479371ms ago: executing program 0 (id=12790): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f00000003c0)=""/246, 0x26, 0xf6, 0x1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000001a00000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="76389e6a65585578f830e9000000", 0x0, 0x10001, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 501.713951ms ago: executing program 4 (id=12791): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b0000000700000001000100080000000100", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x0, 0xb5, 0x3f, &(0x7f00000004c0)="67c6ee34d1caeb71c7e4009a9bf1f027f557af2413fb38e5d2487a646a0f25d10d369831d4bc3aee890f47a6a938b94cdcad86b7fdbf91c970654b6b41f0882ee95e30660a02fd05fb5c0633f1842ed8a35f730d87c1a2d0156e7d90ae9e425810fd0d8cd7c4a6cf6a77ad20aa75c9ad24cde116b06558fa1db421b1e22c2cddaabd230e94c4cf88a2ee843c132e251fce66199675a8852128d6c88a0fc52f2936b42d8e51c178a6e9e370da6386105f693dc9cedc", &(0x7f00000002c0)=""/63, 0x6, 0x0, 0xbe, 0x97, &(0x7f0000000580)="063eaeff9a3716fe64b8e42ca8b501f5f2614af1a982aed24449ea1848fbb88d47b6e6b7ca4876fe8216ece610b42b2f5604ee24bd750fa7fa2852b070c412f5058be7c65d785bc7e39d26c13f0ffc9d53fdeaf103ca87b1338bbaf7e1efceb4cac2e9251acff51c1cf193fdf7b1902a4ea121f9df56cd7951dfa75a70763e4f15e632ac32e6ee4ae603773a0891df6965c414ede7e5faaaa897c41b5b0f9c8350f08d480b112ce3cf6ac313c6a019198e90699bea243a4b26ee5704026e", &(0x7f0000000680)="354eebd00c6eaf0abd9a1be355a12d46d429d4647fda7cd48dec5df6045a37384f84aefb3777dd8698df43b7fe45a22dd5e717532fa9c894d179a08232cf7e74b0bb9041bbd1407109e7c84253aa9bea3e715e469ed9dc2cc47c4253441981c1ad04e2ec47e3cf9468390bb52865d184e5172674038e1c66bab60f7db262ded1332b186e9be33b9a64b504cd9bb686c267e1e36e3a9fff", 0x0, 0x0, 0xf2}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) 399.789747ms ago: executing program 4 (id=12792): ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x3, [@struct={0xb, 0x6, 0x0, 0x4, 0x1, 0x0, [{0x2, 0x2, 0x1}, {0x5, 0x0, 0x2}, {0x10, 0x1, 0x2}, {0x4, 0x2, 0x5}, {0x3, 0x5, 0x22a}, {0x3, 0x0, 0x80000001}]}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x6f, 0x0, 0x70, 0x1}, @float={0x8, 0x0, 0x0, 0x10, 0xc}, @struct={0x5, 0x3, 0x0, 0x4, 0x0, 0x100, [{0xc, 0x1, 0x3}, {0xd, 0x2, 0x5}, {0x7, 0x2, 0x6}]}]}, {0x0, [0x5f]}}, &(0x7f0000000400)=""/238, 0xbb, 0xee, 0x1, 0x3ff}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x4, 0x7, 0x8000, 0x4, r1, 0xd, '\x00', r2, r3, 0x3, 0x2, 0x3, 0x9}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000a4000000000000000700008018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[], 0xfdef) 380.798978ms ago: executing program 2 (id=12793): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRESHEX], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x51) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r1, 0x0, 0x2, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000580)="d502bc8c7b27155835bd917d2e351b022241a824c9b3180053614869563b00"/41, 0x29}, {&(0x7f00000007c0)="a60b2749c6512d70d18111da33c9520f93a40a2c620e6ec77348754dea8be9489596d85faca829097b1a53121372a71c860dd7dd537bac6721f197b0eb227991abd8a61492de63d07e9d0cddb40c58bbfef4f5708c9c22b9ab9d4ce6398a9ab3a51d395f62b81242dd9233bd7089d88f0b5ecca12d503463f4d1c774db770aa34982f1cf407c6add593b201a399e8570f4c2421590f9942be47d3de83b5b75346aae056cbf5f28c1b8e673c252274cd117b8df1a5e256c25b129a818e20ecafdbf6667f8d1b9c471b181851941626d7c6ed52f159eaa", 0xd6}, {&(0x7f0000000500)}], 0x3, &(0x7f00000008c0)="1a7b9b52267f3413a5c5110bc0058b6629b884b9975c8ab48f13b8befd06585d77b74e39ad0ab036324e5065bb7f7479c14fec8b88d6ced06a27ce6bad0d1d2c370d14632b2972d56e3e5c50bef6b9f796ab737a429f6d3e11285b6c8ebc68ce", 0x60, 0x4000}, 0x4005) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000540)=ANY=[@ANYRES8=r3, @ANYRESDEC=r1], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYRES8], 0x0, 0x28, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="0900000006f50200080000000800000040000000b9d208632f38ccda2c400cf8d31f7527bb0893d78c6e59f38bb3b7669bdef13bfaa09a3beb29d833203cbd95955c171ed29717676e81b87ab719058eb187b594d81d7bd5629e274cf4c28e79bf7b9484da4c1427cfdf3918ac35b20270aedef1f5432056f603655f8f76fa928c80e2b147b71e2fe41df7bf715b9245c408e7f559dfa971bc3d9eece30fcd9c845da35904249d4f64650d519defda1195e0d3426c76bfdf7a6bcb557835ae5cf09935066bb4f1291471bcce7a2713840ffe283d00a167", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18ff7f000000000000000000000000001c120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0xfffffffffffffffd, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 300.323753ms ago: executing program 4 (id=12794): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_type(r5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000001000f3ff01000000001e007b02003000309030002e5f00"/50], &(0x7f0000000440)=""/64, 0x32, 0x40, 0x1, 0x1}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0xc, &(0x7f0000000200)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x1, 0xd, 0x2, 0x1, 0xfffffffffffffec9, 0x1}, @generic={0x5, 0xe, 0x1, 0x800, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x4}, @jmp={0x5, 0x1, 0x5, 0x7, 0x7, 0xffffffffffffffff}], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0xc2c00, 0x46, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000540)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x45, 0x3, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x10, 0x1}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xf8}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5c67cd4f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @generic={0x8, 0xa, 0x8, 0x5, 0xfffffff8}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x6}, @alu={0x7, 0x1, 0x4, 0x6, 0x7, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x80, 0x1000, &(0x7f0000001340)=""/4096, 0x41100, 0xb, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x5, 0xa}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x3, 0x4, 0xc, 0x7}, {0x2, 0x1, 0x6, 0x4}, {0x5, 0x5, 0x4, 0xc}, {0x0, 0x2, 0x4, 0x1}, {0x4, 0x5, 0x3, 0xc}, {0x1, 0x4, 0xc, 0xc}, {0x1, 0x1, 0xe, 0x7}, {0x0, 0x3, 0x0, 0xb}, {0x1, 0x3, 0xc, 0x6}, {0x3, 0x3, 0xc, 0x6}], 0x10, 0x8}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', r6, r5, 0x2, 0x5, 0x5}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) 298.774163ms ago: executing program 0 (id=12795): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='spmi_write_end\x00', 0xffffffffffffffff, 0x0, 0x10000}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x62, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)='/proc/sys/net/ipv4\x00\x00s/sync_\xe6ke\xf44.\xab%\xc0\x92\xb5\xd1\x1fnN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={0xffffffffffffffff, r2}, 0xc) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00), 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={&(0x7f00000003c0)="f51f559c934242a941825ff2ab27f7a982883cc9f9f8cb8b459a5134f8a3aae2f140754b348d5087ee64e882d928b6969c41c4ae0c47b0e15d8794e9a6a3e420842dff5f16ba1ee0b47fc25ee8b52ee6d6625f58307a28820c338914764b51be3557a841378d88ae4ee1f150332ad6f8510733639b3d14b2e7fd57c5039cf555beed5c9f3ff9992b4a20a3a9af7164cf7f2b11c44b30720dbc5fc49cf88a77b4c6ba9980d891bfbed094974187840e67a3ae54a6f3bbdaa2617e6b1b8a8ca4dc57fb039f48d035928ef07e158a", &(0x7f0000000900)=""/170, &(0x7f0000000c40)="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", &(0x7f0000000a40)="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", 0x80000001}, 0x38) mkdirat$cgroup(r4, &(0x7f0000000b80)='syz0\x00', 0x1ff) bpf$TOKEN_CREATE(0x24, &(0x7f0000000c00)={0x0, r1}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair(0x18, 0x2, 0x1, &(0x7f0000000000)) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 156.769491ms ago: executing program 2 (id=12796): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000007a53000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x2, 0x400, 0x6c940172, 0x4020, r0, 0x3, '\x00', r1, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x50) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={&(0x7f0000003600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xb, [@enum={0x4, 0x2, 0x0, 0x6, 0x4, [{0x3}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x61, 0x5f, 0x5f, 0x2e, 0x30, 0x5f]}}, &(0x7f0000003680)=""/4096, 0x3f, 0x1000, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000600000061114c0000000000850000001e0000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10, &(0x7f00000019c0)=[{&(0x7f0000000580)="ba41c98c53537e9b81c212189824ad6073c6828037ba98ad3a56bdef56fbab536159d024076e83e6c44076339bf920edd2bb07abc984edde061693283052f37d322247ef65ad07478c1bb55ba84217b8a16a5e47476c5aa1661074fca8eb1a35be93133e4331882e5d3d253b112977e986cc9010d5d6d95ec5600b7fb7aacfa58aa6102cf3e1d016268ddf4813ab8d634693a8779a6dca2d0f242211421675e333cd527522d251d941440079f7c523293f1f667da1a5eca0d86ec0199061e5ff2b2d62321f6f9a12c12a6f24c5a5284e62cb4234cc6ef8dc882fe4a46e86c66589dff10ac8cb69be3797729bda5a28b5d0aba431", 0xf4}, {&(0x7f0000000680)="9197dcfbc4a761dd4442ba567e495b69906bd9d42f199ce06ce16b072640684a0a66bd662be3939ba408aaf6b284cc7d59eed1830ab2a5e47a42d5149befd7893a8ddcd2dd8b7de062cbe45050a2d1eea85e718a45d6cd2a7fde0229cf064fb4db0016cea6520ce7b869a0fded868bbf2454f16fc1d8013b0ee06b4df6cd4d26a07bffab2192754f339bcf9985fc67ebe6", 0x91}, {&(0x7f0000000740)="743c70e1a5b7778df1028cd93e47db6fd9ddf69c238c0081cf40f40e1119f6e382c2c39e82b85359e2c73633f031704bff1ac5094b6ae499f33d26875dbc6345a11a7eea5798af27cee1ed74bbade6787ea561e250cd284e490ce429c6434d6894faf3bfe2e6f5793da7f288e56e0cb46e48169cb236ffa78688c56723da1dc6aceed88a5ce1462e616de9d31dc4b8488a95f19121ddfba6e2e5116bfa662a9bda91080486a1676194f977d95a103c31f157c72492ddecdbde2a903924d58a629182a6028aa6049be72447d3601d7aba7297a2c2e5c1a88f7c", 0xd9}, {&(0x7f0000000840)="369e122e67ca006c5b7fec2134a71e39fa7a11e0c6bd84549d68b19054645134eae0f233471ab36222eea37b6309ea45f1fd609e09c62fee14c8ff67f39e0ad46659fc37171cf4ae3d8dea47c93b9a9575228ef38b6ddcf85d15cb929c135064912e56ab5c2992ae9018fbf56eca17854dbdc7e2fc4be92375fea8dc1bafb2039b498c2f8c2933c528e476a0e9b6d61138eb665eabaa6fd6f3af396b9c0ff9cbca2a6f86ac346c40dcd19c7c482b75663f929b36570ed4d8b58a43794dd108fc954733dd0d30be40f3ed202f7351deeef3294ace0a60586d8d6593712a5f623610f182d70c4b807cf53e", 0xea}, {&(0x7f00000003c0)="76bc22d001d04f09f35fea4445fd82e5438ed73f3af1a9d40f780fa350c9cfcfe46d8f51f3043e12fa65a57406", 0x2d}, {&(0x7f0000000940)="01257828ccfe1c936ca1fe97737c4c7f2cee8cc1c6b3cfbec4fb162e073ef31e34f892a46387a575d6f0afcc17f2ce6d4253e5d47c28a2892403ad18de8ad8ce55fbbeea669250cb8ca9ebd9c962c15fea39f1e090da783ed279c54a5fb280f2d6b5fd52c3963b1e6d2d8fdbed8b9adfa789f04a76b9650d82c55751296645e0ddc5e82a2ecfe8206f49f18e47081b32d343e9fc3a756ea1713eb7aac16b90ba6fb3d222a3d73c51d5f92b7065b1125a3b45c4a97cbfb1836f120f0e1c3c693c577aa5324091dfc8fd203a5483ded0191ce848a51da6f12022e832b2f4e508a5f2dee0fcedc77d3ee17ebccc8a735eefce17ac9bf8827c3ec6a19aec9ef7abb4e15067f57c8fdfcf1affeb47db6809981cdb7f8864feef735a9034dc834f5b77106513614c29455165c786bc32a22618650758af1e1efa3c1798d67175a66ff1f22d8983e7ab8f6d8a905f2c0500bf7fec8ef639fc47580d50e147538b59b626b11e24d1d2c42193f1359cb4eddb158adc1ba7fab362a0014e5b4158da547e39e97cef4a46add182023103e43b702f807a733b0ab9225a56fc68a6065ad9a52f8338d41753e6d2983320ced0a6b7d95bd1f50090e986d4873bf86e291942cdc20d3ee10d36ab4bdbb7343bf384bc25201268b390989f3d8a37d313ea8eee7be012e7b27214a452258c62c5044f712e341b581d7298241f8b12ba34460f03c12ff8cbacf3cfd590adfd0694870dce6afc93cf4390404b993f28888d51da4d9269fa53ec700a3c0a3bf4d785725ea17cd234323615319b3238b1500bcbb9b4886aa73d4792a1c8f20ab5263c263a4476545f817f7d8825bd8ad22f0465a1a4a5c0a565b6c23719dac5af4e78bbd0d8d9e3143de0ea85a183e68e0763a3f3e1f949826ec00b8258d777f2fe28584aa8c1c18ccf506c73e937f586af4ae26f143f847b395ea29c09ede700e8426f681b399068741865f1cc24a411f96a2d8227a9af10cf47c42724a441b5cbd35cb4b321754bfe8957c69cb9cea00e856459ca9c03e6fb92e25f80bfacd428615bf2a9214e23fbe4ede88345c463440d876fe02c9ee7ed7bc049d476f4853d2a99f8225efc75bd7428b38158ffbf0c15b0c3760ac177380184222013965f62dd1030ab66ae5143f80a17fc5c2d24268a7a5866476eb0152f24ddaed914b66e1c963e17a4568153d83f151e07b8ab4f13da1ee6f957a4c677fb0c67f5d88abe77e0ceaa3cc29b24ed1bc1278d3555e42bfb0a2b4fe949289e2c14caf3e8ad15c496451af95f51db1edf297c95ef10c86f9dffb99ab4ee165338180256c285e5dc4fe22e942c1371725ae9f5173dc8483bcdc91f42eaae8c46eb29135f15d9adae580997b285cbb8cafb26c726f39df623adb033ec0bf13b48d005971ebb00a3f2c1d5894a167721064b04bad7bc147a2fbb3498d8a586f81338d3ba1b79e43114b43e493bfe93e87d64471e5cb1ecf36744dcc5e46b3a56caaad4ff5c0f33faff996ce8971d292bc9992360ab4b6a734c6bffab8b789604b50cae6922e990e92ad9ec869a62c7ce87c748fc3aeccfebb42c99ff479d222e46a814a5cb04bf3fd620a988e38c27e757b846a5a71d601710512e601437158795f857cb63810cdb56899c86fe841b7f3dd0c84703a438b9e17d4bcd84a09c986ebfa71c864a164cefaae2760df9366e93db5dd58d29f1894b7df387ee3991ca34aa73c3bac68c40030ca5a20357288e77cc8cadfaee1d3d51a23903e135f48cc34c53fe3f19f2c54f6e5672f479da42a8bcb93d8ca46b4b8562d5140ec64fd5c3a255f2a1d7a456ea97d76e28411a9f5d0504f75f2d734f5f97dbe7f84ccedbaca489ec5f117cc04f1cf7fe3a3069c4ae91468ecefc1eb95e596409ec7d18bc0d291ae20c7f74cbce3f1421f9af747bf19e90f42d852d9d7099b91825824f428ed19cbef0bf29f984ad4ef8fcbd5a9657fa296da48a10d5f09997b3495ac4286b7ad85a3c077f3e2840fc950f657a0e92acf4b3f987a79656aeefe3f5ae994ba31a7ea15bb913544f1f95ef2406f475d784deafd5319a2a260d90dcceb2c0ad6a9f4352ae17e86969192830498a5e7ee5f5d200f810aab73c0d38f58b4c7fc6bb8b968095a804e1d496bc33623211136becc9e9ed4fe162634f28f126e3902d7ac0be10ff1289479a689069402138c22fac986c306a1fe023b3b71959d7cd618a8719640d38db21a8692f8e6dc40498d6d36cafdffc08a06e004fe40a2c6bb294b329654acea0117b33e3ae20639e1f0812e3f19f21faa38703d8edc680a788b3c558ac6d12b74252afe2f517b86acda7d6eff970ddb3913d61733263371325412bf9857dd885106f5d822ed173868dc28fda83a6a67acba927eb870da66a301b4016179d8971d26f42358a45bd7c2112eb16b98e2aa5c780e91fdc8d46343b1dec29a9b39571704bd0967368f5991866b145ea700e2ef8ba97793c675f12f4773cc1358205ec0140d9933679a7cbbd9683d29925ce61e55f1f6441d4ffcb7fd313095034049bd10c45c636ea5d512309d8964c3af19bd4c58eef7fa3d1eb6d6da3705332bcaa22edc956ba708166452d163413532b762cc3e26c10c36250c7e52ad1abc8d2c2580fc572445ee46e146e4ef1b609b51926735147f175703862c25d0485c94477e43b5f72012ee01f058db7bdb7d9e06117da2d97db41e594177130c24f0bec9e03ad355fae62cdfbc1b688b9c7829b92e369d3666facea2f93b6dc72e6031a72490bbe49e53782215bceab34439cca27e26b295b5a0d95ff0bf2afaa0779b8242975cee11b99e7dd8b354759ce34c46a620ae283e0ce2d1e05923e0b81f1ef4d5739b62c89a2e16da4a16cf0babd299b42b030bc89e513f36ed715252e533822b005f40f8947c874a203b1c2de82ce2ec2df9c2195e8ab0abcc34c2b4463235a05edeebe39090150d1633fa46963dd74e73025bee207f04721d1c397cabc570c4ac38015cf43d475bcb4af14bffbaa3425a837b69927ee12e8d52d5ff0c893fdb48e03bb8813ad32680e5ac934efe9259b98f379cbd8fc42a98da61ccaf0b502098009bc04a0457d6beadedfa14c138d0c03fc1a69dace7f9075e0ed039623ac0d174d8186d24a0937a69ace1108fdbdfa4de3ac0f66de0ad4202757a256540d79914e1f72137862a6e1e2a81ae42c49628be9014452ad0c1eb72fcdd6a7b9d4d9bf8c11545354bbe0946cc2b1286cbbf67f243e3a2f0c1288e5b7838d432efb0b84e6bb02466134055aeecfb359f800a39a24d19cd07c03928f2d5b7673f43f7992750f8a8b82c3716d08369b53921c149d672a25981cf5c70d2474266e50dfb5c0c45b3889d2addea5a45cbc981d3c6b6928c2eace0e5449cfbdff49c3977b406a6e6da0f679121bc16b799ae26467c3427d825e59fe1b9f0c7fadfbf09a0c1265eeadea4d3f426fc0c2ba6ff667e2c6eced1a7f67f10d6296bc8aa8730e6c9cd17641784e48e3eede6696f6b9b0491f5e5f3ef7f70baccb94aa1f97567fe1f959bfe4dbf085e4988cdede3083b76ce7a7282a6057a78fd4d7a331b3078230f697eb9764114e6fc3a771f74f72399d3eac26fbbd3e82e872bd0653c6cc9ab5c6b5c80a75bd5168e03319fb20586b106735df40c998456d27b504f6486b7e2275727b406b83ae0839d9e8fb8f3ade56495c1655ddb8a98856b0788a288ba0e955cbcaf0cd0706c09634fedf32500a928fe57d4d404c7d4185f3cad2aff5bbce416079b209b243b158fa929c8118f2595adc8c03564c0135d567ecb0ddbd3c6955b100b78c60a9d07edfb1e811d965813c3723d0b5da95601332578c76c603b1a64601bc5d54ddadc212aa7b8552a73314d3871068666031b81b3e575e89b764d82319e751a52973bb255dde0e817b1b7aecd38bbdd7322f713fa9a9cfe686c1ecf0632dcba6d4137ab2b6457dc7948f34f3b155713391dee4a394758d731f47b58b2eadce0847ba8e0d8b185bc3899403aa61d87054c82589078bbc517565e4a2b654525341faec4f095d1fda75b4e0ad5e74bf931890cdbf68a6bfa3490fb816d66e6ba831748a1dc2722ab2944697697a0a0520d9198ea54eb78c23604c151775a18093a280839b74c27d2ca8f55e686631158386b6d5408556081076576cecd0eb178ed80f72a2de9e870370d95106bddc264fa85671dda354d85662b81a4200935c5a87887306b88f142594036f1bcf08ec8b6ca8267d7f11f43f1ccee89e83412806e2787cf22395d839c2f17ba655a6784150c0c9803ad359cfa98d8d80689abdd8fc1aa2ef33f9189f36c84cadda0be295bcb437a9363c5eb98c343061aa342aa3ba167fbd4b3a8b2e3dbc3ea515ca26a4d9b5134f382c236edba583eec28e3cc8f63860b267e6bb4009e14c8bcbe1b5a9fbd1cfc3f23a11265da5ab7899f6d8d1e1885374315ff632dce74e643cd22ca92b19e647231639f64d4a0d4c31847fc27141fac2bf49d8e48e71b34af7b66a18d90fa738a06a0be9aaca6bd1e3a79d99318eefae2981e643eecca0c90325c9d0386165221b68c612a45a2e1cd1aea92d5568eca5dc83862860f448ffbf4ed3a9d7c80d67d08b3f0ae06345cf9481129fce1d00210f1c930c327628c42a87987408174ee4ded47396762c472ca70d32d8ea203fa83123e532342ac9c5a4394f986e5d2ed447c070dfa2e86e93af9769377369764954b2c2b161bf4804e8ba9d9004ecce9bfba39914e6a19462bffc1bcbce4d7138ad173ba4eaf61f6fc24e4b14fb25a99f5c10b5a2c6cbce3deef9ac5b7d0e4b827a38b8d9baedd99f2aee680b63bf6cf708a6ed6951249dda93eaa034f1e6a8f3d33c72fc80e24db7ad09f5d48a97cb024d7c9b4d4a72146a9f490aac13c65eb196bf45809e8b78ca45a33ab529fe4e5855e9243052a6e277376ecefa44c37e2895461b5b593bc3a926d6ce8347e40e3b5d68a6e674760cbea13fe176295a64812a4eb7e7003fcbac01aa059955a45e8578172c09649e63f9b0421670847bba2c8266d8e36fc7330409cd5cda2e5cfee2fc097948eb4e6cca580093d620e263e6635ce504e311043d9b9b22d5df9ae6f65b48f1de7f495dcc4511c17f0981dff230d3dd5b066148ea08383d6c8c97cdab0c06e7e432787687098027482e9d14dd9974afec6b1278a848d18e6810b5b781bed9f2440deb4e84d454922222e37cb83193d52a268fc9b2a4ba8e79ea0435e020f7ab4da103d11046e9d2eb0ceb4a32e809bca42f97fedf4b54f2067de28951eca7e6a325490311c11d751c3e7d727fb74c1b0118a10b1f496318f9142b0ba23fce3c68a56788f42ea69940c542a6cd84364d355828c104740c58ba85d19304ec353762b26c11af539e433628455387075e5a1ad60567661e79124ed2ea9dd69549797c3e9ee404b2b3fbb2431b02da658232da3d344e2c182ca96b9f2e493371a366c66728e199bfae3af1f3dfbbf612ee542354a80d8853dd86c9975765bec6a46953884d8eeff73b10288ccb40fecef2391c0ffb3d1ac0591895a55d725c9e0a5452d4daa5283fb10801d286ff0b33808a530456ef363e71e5970ff07e785ccaa8bbccbbf289afc0855cc75b3de2f85b9c9544c073935e92fece11b68ba6429eab826ffdd4ecd9f8b07014c864048aa480a090ffe92dff2929d9dcaa747b25a5b56c25b57b9f09e9980ae0bc1fdedeb1cbbd4bf21f35fe237a23d79044f4491f8397a86c92614d7fb86b80e48229c431b6d6ed2a3656538d546c3576", 0x1000}, {&(0x7f0000001940)="2b8eadc1b87c9ed5ec7357115012331cb0a4d3b802470bda80374296525660430c69a65149f2f06cfaa2d3c603b07482298a670633d4e343c44790955165330d3ff8b8c2b8a1bdcb6a4e0a455184e8249e88d91abb5297bd54163f858aad3c08483a256b7cc6961b543039770843d6b8", 0x70}], 0x7, &(0x7f0000001a40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @loopback, @empty}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100}}}, @ip_tos_u8={{0x11}}], 0x70}, 0x2000894) (async, rerun: 32) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x3d) (async, rerun: 32) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) 69.679006ms ago: executing program 3 (id=12797): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff14000007"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1a00000001010000ff7f0000cc00000000010000", @ANYRES32, @ANYBLOB="0000000000c39f803a016a6d170000000000000000000000000000009aae7ee490d4a6b0e78cba802429fe40807b231316cf", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000fdffffff0100"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='svcrdma_post_send\x00', r3, 0x0, 0x7}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r5}, 0x3d) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x5, 0x8, 0xf}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r7}, 0xc) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073013b00"/32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) (rerun: 64) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1051e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 9.218399ms ago: executing program 2 (id=12798): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000037c0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b79da42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4f000093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e63fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5649209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9eb0641fd6d5e80979a3d985089e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f000000000100000000d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469f242119ad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ae2a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08e01dc5e8c6732e6d"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6, 0x10, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xb2, 0x50, 0x0, 0x0, 0x0, 0x80000000000, 0x2, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x9}, 0xc42a, 0x900000000000000, 0x4, 0x8, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0x5, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x97}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004743d, 0x110e22fff6) close(r2) 8.633459ms ago: executing program 3 (id=12799): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={&(0x7f0000000180), 0xa}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xaf}}, &(0x7f0000000480)='GPL\x00'}, 0x80) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x47) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000640)="4d8a612c5346cf2e0dcd5f89ca8775b9a69ebb2a5bfe61472af450b62a43a8cff602857bb89d6a8b53928db27bdd172a035fb1bdc8954459f90f414188432369a28e5a29e1e4789aafc4e07fe0af393fa95a05349002", &(0x7f0000000480)=""/10}, 0x20) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@cgroup=r3, 0xa, 0x0, 0x9, &(0x7f00000001c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600)={@fallback=r5, r6, 0xe, 0x0, 0xffffffffffffffff, @void, @value=r1, @void, @void, r7}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000780), &(0x7f00000007c0)=[{0x2, 0x2, 0x3, 0x5}, {0x2, 0x3, 0xb, 0x3}, {0x2, 0x4, 0x3, 0xb}, {0x4, 0x5, 0x3, 0x1}], 0x10, 0xb}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = syz_clone(0x2a020600, &(0x7f0000000440)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f60bdd3c2aa9601456e3bdfd0d883f01ff4b38bc7e0302ffc3a39", 0x33, &(0x7f0000000280), &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0xff, 0x32, 0x2, 0xfc, 0x0, 0xff, 0x8, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000300), 0x8}, 0x300, 0x1, 0x5afc3411, 0x6, 0x1, 0x40000008, 0x2, 0x0, 0x4, 0x0, 0x8}, r9, 0x7, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) 6.39991ms ago: executing program 4 (id=12800): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000180)='task_newtask\x00', r1}, 0x18) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=ANY=[@ANYBLOB="18040000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006208000000000000180000000003000000000000000000009500000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xda, &(0x7f0000000340)=""/218, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x800, 0x8}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000b00)=ANY=[@ANYBLOB="3d500200000000008520000002000000b70800bff11a88507700000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000000029b28de261216f71ffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000070000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0}, 0x94) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, 0x0, &(0x7f00000001c0)=r9}, 0x20) 0s ago: executing program 1 (id=12801): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x2101, 0x1}, 0x50) socketpair(0x2a, 0x1, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000280), &(0x7f0000000240)=r2}, 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) (async) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x8000c, 0x8}, 0x410, 0x2000001, 0xfffffffc, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) (async) close(r0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) close(r7) kernel console output (not intermixed with test programs): ][T27794] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.309085][T27794] device bridge_slave_0 left promiscuous mode [ 646.345626][T27794] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.473971][T27798] device veth0_vlan left promiscuous mode [ 646.505746][T27798] device veth0_vlan entered promiscuous mode [ 646.998807][T27812] : port 1(veth0_to_team) entered blocking state [ 647.067284][T27812] : port 1(veth0_to_team) entered disabled state [ 647.074786][T27812] device veth0_to_team entered promiscuous mode [ 648.089425][T27873] device veth0_vlan left promiscuous mode [ 648.130991][T27873] device veth0_vlan entered promiscuous mode [ 648.462789][T27895] FAULT_INJECTION: forcing a failure. [ 648.462789][T27895] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 648.530228][T27895] CPU: 0 PID: 27895 Comm: syz.1.8294 Tainted: G W syzkaller #0 [ 648.539125][T27895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 648.549297][T27895] Call Trace: [ 648.552603][T27895] __dump_stack+0x21/0x24 [ 648.556944][T27895] dump_stack_lvl+0x1a7/0x208 [ 648.561630][T27895] ? show_regs_print_info+0x18/0x18 [ 648.566841][T27895] dump_stack+0x15/0x1c [ 648.571092][T27895] should_fail+0x3c1/0x510 [ 648.575526][T27895] should_fail_alloc_page+0x4f/0x60 [ 648.580728][T27895] __alloc_pages_nodemask+0x119/0x620 [ 648.586107][T27895] ? do_syscall_64+0x31/0x40 [ 648.590714][T27895] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 648.596788][T27895] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 648.602349][T27895] ? _raw_spin_trylock_bh+0x150/0x150 [ 648.608267][T27895] __get_free_pages+0xe/0x30 [ 648.612866][T27895] kasan_populate_vmalloc_pte+0x29/0x120 [ 648.618598][T27895] __apply_to_page_range+0x74e/0x9e0 [ 648.624000][T27895] ? kasan_populate_vmalloc+0x70/0x70 [ 648.629405][T27895] ? kasan_populate_vmalloc+0x70/0x70 [ 648.634786][T27895] apply_to_page_range+0x3b/0x50 [ 648.639735][T27895] kasan_populate_vmalloc+0x60/0x70 [ 648.644950][T27895] alloc_vmap_area+0x18e0/0x1a20 [ 648.649924][T27895] ? vm_map_ram+0x9c0/0x9c0 [ 648.654444][T27895] ? __get_vm_area_node+0x113/0x450 [ 648.659658][T27895] __get_vm_area_node+0x147/0x450 [ 648.664704][T27895] __vmalloc_node_range+0xe0/0x790 [ 648.669824][T27895] ? btf_new_fd+0x1e4/0xa00 [ 648.674337][T27895] ? kmalloc_order+0x112/0x160 [ 648.679107][T27895] ? kmalloc_order_trace+0x16/0x80 [ 648.684221][T27895] ? btf_new_fd+0x1e4/0xa00 [ 648.688730][T27895] __vmalloc_node+0x7f/0x90 [ 648.693238][T27895] ? btf_new_fd+0x1e4/0xa00 [ 648.697748][T27895] kvmalloc_node+0xd7/0x130 [ 648.702260][T27895] btf_new_fd+0x1e4/0xa00 [ 648.706681][T27895] bpf_btf_load+0x5e/0x70 [ 648.711024][T27895] __se_sys_bpf+0x4ea/0x740 [ 648.715532][T27895] ? __x64_sys_bpf+0x90/0x90 [ 648.720199][T27895] ? __bpf_trace_sys_enter+0x62/0x70 [ 648.725500][T27895] __x64_sys_bpf+0x7b/0x90 [ 648.729933][T27895] do_syscall_64+0x31/0x40 [ 648.734357][T27895] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 648.740257][T27895] RIP: 0033:0x7fc797cd1cb9 [ 648.744687][T27895] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 648.764388][T27895] RSP: 002b:00007fc79672e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 648.772807][T27895] RAX: ffffffffffffffda RBX: 00007fc797f4cfa0 RCX: 00007fc797cd1cb9 [ 648.780787][T27895] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 648.788767][T27895] RBP: 00007fc79672e090 R08: 0000000000000000 R09: 0000000000000000 [ 648.796749][T27895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 648.804754][T27895] R13: 00007fc797f4d038 R14: 00007fc797f4cfa0 R15: 00007ffe7d17f898 [ 649.006655][T27920] : renamed from bond_slave_0 [ 651.355426][T27999] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.438462][T27999] bridge0: port 1(bridge_slave_0) entered disabled state [ 651.446068][T27999] device bridge_slave_0 entered promiscuous mode [ 651.588896][T27999] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.596034][T27999] bridge0: port 2(bridge_slave_1) entered disabled state [ 651.619133][T27999] device bridge_slave_1 entered promiscuous mode [ 651.892406][T27999] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.899526][T27999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 651.906846][T27999] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.913915][T27999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 652.058367][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 652.082927][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 652.106450][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 652.132161][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 652.191922][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 652.234630][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 652.291777][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 652.354901][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 652.403753][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 652.430838][T27999] device veth0_vlan entered promiscuous mode [ 652.486602][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 652.504624][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 652.552693][T27999] device veth1_macvtap entered promiscuous mode [ 652.592000][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 652.611830][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 652.710312][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 652.810145][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 652.820578][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 652.838983][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 652.847445][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 653.431724][ T455] device dummy0 left promiscuous mode [ 653.437280][ T455] : port 1(dummy0) entered disabled state [ 653.499227][ T455] device veth0 left promiscuous mode [ 653.524240][ T455] bridge0: port 3(veth0) entered disabled state [ 653.565893][ T455] device bridge_slave_1 left promiscuous mode [ 653.572318][ T455] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.584050][ T455] device bridge_slave_0 left promiscuous mode [ 653.590395][ T455] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.599513][ T455] device veth1_macvtap left promiscuous mode [ 654.425961][T28121] device syzkaller0 entered promiscuous mode [ 655.750375][T28150] device wg2 left promiscuous mode [ 655.774068][T28146] device wg2 entered promiscuous mode [ 655.910671][T28172] device sit0 entered promiscuous mode [ 656.743045][T28208] device sit0 left promiscuous mode [ 656.801201][T28209] device sit0 entered promiscuous mode [ 657.431371][T28224] device syzkaller0 entered promiscuous mode [ 657.511045][T28242] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.518321][T28242] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.526475][T28242] device bridge_slave_0 entered promiscuous mode [ 657.533918][T28242] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.551253][T28242] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.564278][T28242] device bridge_slave_1 entered promiscuous mode [ 657.607641][T28262] device syzkaller0 entered promiscuous mode [ 657.634832][T28265] FAULT_INJECTION: forcing a failure. [ 657.634832][T28265] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 657.649777][T28265] CPU: 0 PID: 28265 Comm: syz.3.8412 Tainted: G W syzkaller #0 [ 657.658768][T28265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 657.668932][T28265] Call Trace: [ 657.672259][T28265] __dump_stack+0x21/0x24 [ 657.676618][T28265] dump_stack_lvl+0x1a7/0x208 [ 657.681327][T28265] ? show_regs_print_info+0x18/0x18 [ 657.686645][T28265] dump_stack+0x15/0x1c [ 657.690823][T28265] should_fail+0x3c1/0x510 [ 657.695304][T28265] should_fail_alloc_page+0x4f/0x60 [ 657.700529][T28265] __alloc_pages_nodemask+0x119/0x620 [ 657.705936][T28265] ? do_syscall_64+0x31/0x40 [ 657.710559][T28265] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 657.716670][T28265] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 657.722253][T28265] ? _raw_spin_trylock_bh+0x150/0x150 [ 657.727692][T28265] __get_free_pages+0xe/0x30 [ 657.732493][T28265] kasan_populate_vmalloc_pte+0x29/0x120 [ 657.738142][T28265] __apply_to_page_range+0x74e/0x9e0 [ 657.743431][T28265] ? kasan_populate_vmalloc+0x70/0x70 [ 657.748816][T28265] ? kasan_populate_vmalloc+0x70/0x70 [ 657.754191][T28265] apply_to_page_range+0x3b/0x50 [ 657.759134][T28265] kasan_populate_vmalloc+0x60/0x70 [ 657.764627][T28265] alloc_vmap_area+0x18e0/0x1a20 [ 657.769603][T28265] ? vm_map_ram+0x9c0/0x9c0 [ 657.774213][T28265] ? __get_vm_area_node+0x113/0x450 [ 657.779515][T28265] __get_vm_area_node+0x147/0x450 [ 657.784555][T28265] __vmalloc_node_range+0xe0/0x790 [ 657.789685][T28265] ? btf_new_fd+0x1e4/0xa00 [ 657.794196][T28265] ? kmalloc_order+0x112/0x160 [ 657.798969][T28265] ? kmalloc_order_trace+0x16/0x80 [ 657.804102][T28265] ? btf_new_fd+0x1e4/0xa00 [ 657.808607][T28265] __vmalloc_node+0x7f/0x90 [ 657.813110][T28265] ? btf_new_fd+0x1e4/0xa00 [ 657.817619][T28265] kvmalloc_node+0xd7/0x130 [ 657.822126][T28265] btf_new_fd+0x1e4/0xa00 [ 657.826633][T28265] bpf_btf_load+0x5e/0x70 [ 657.830964][T28265] __se_sys_bpf+0x4ea/0x740 [ 657.835477][T28265] ? __x64_sys_bpf+0x90/0x90 [ 657.840083][T28265] ? debug_smp_processor_id+0x17/0x20 [ 657.845453][T28265] __x64_sys_bpf+0x7b/0x90 [ 657.849873][T28265] do_syscall_64+0x31/0x40 [ 657.854300][T28265] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 657.860192][T28265] RIP: 0033:0x7f0c21205cb9 [ 657.864613][T28265] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 657.884219][T28265] RSP: 002b:00007f0c1fc62028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 657.892644][T28265] RAX: ffffffffffffffda RBX: 00007f0c21480fa0 RCX: 00007f0c21205cb9 [ 657.900625][T28265] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 657.908606][T28265] RBP: 00007f0c1fc62090 R08: 0000000000000000 R09: 0000000000000000 [ 657.916587][T28265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 657.924563][T28265] R13: 00007f0c21481038 R14: 00007f0c21480fa0 R15: 00007ffe01ebb648 [ 657.966770][T28266] FAULT_INJECTION: forcing a failure. [ 657.966770][T28266] name failslab, interval 1, probability 0, space 0, times 0 [ 657.990248][T28266] CPU: 0 PID: 28266 Comm: syz.2.8413 Tainted: G W syzkaller #0 [ 657.999150][T28266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 658.009261][T28266] Call Trace: [ 658.012570][T28266] __dump_stack+0x21/0x24 [ 658.016921][T28266] dump_stack_lvl+0x1a7/0x208 [ 658.021611][T28266] ? show_regs_print_info+0x18/0x18 [ 658.026817][T28266] ? debug_smp_processor_id+0x17/0x20 [ 658.032279][T28266] dump_stack+0x15/0x1c [ 658.036437][T28266] should_fail+0x3c1/0x510 [ 658.040903][T28266] ? kobject_uevent_env+0x272/0x700 [ 658.046118][T28266] __should_failslab+0xa4/0xe0 [ 658.050887][T28266] should_failslab+0x9/0x20 [ 658.055395][T28266] kmem_cache_alloc_trace+0x3a/0x2e0 [ 658.060698][T28266] ? kernfs_put+0x449/0x480 [ 658.065209][T28266] kobject_uevent_env+0x272/0x700 [ 658.070245][T28266] kobject_uevent+0x1d/0x30 [ 658.074756][T28266] __kobject_del+0xd7/0x2f0 [ 658.079275][T28266] kobject_put+0x1db/0x270 [ 658.083697][T28266] netdev_queue_update_kobjects+0x326/0x390 [ 658.089600][T28266] netif_set_real_num_tx_queues+0x15d/0x7c0 [ 658.095564][T28266] __tun_detach+0xb31/0x1450 [ 658.100167][T28266] __tun_chr_ioctl+0xada/0x1d00 [ 658.105049][T28266] ? tun_flow_create+0x320/0x320 [ 658.109997][T28266] ? __fget_files+0x2c4/0x320 [ 658.114708][T28266] tun_chr_ioctl+0x2a/0x40 [ 658.119270][T28266] ? tun_chr_poll+0x6b0/0x6b0 [ 658.124061][T28266] __se_sys_ioctl+0x121/0x1a0 [ 658.128755][T28266] __x64_sys_ioctl+0x7b/0x90 [ 658.133354][T28266] do_syscall_64+0x31/0x40 [ 658.137779][T28266] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 658.143671][T28266] RIP: 0033:0x7f66f3ac2cb9 [ 658.148097][T28266] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 658.167795][T28266] RSP: 002b:00007f66f251f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 658.176215][T28266] RAX: ffffffffffffffda RBX: 00007f66f3d3dfa0 RCX: 00007f66f3ac2cb9 [ 658.184207][T28266] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000008 [ 658.192196][T28266] RBP: 00007f66f251f090 R08: 0000000000000000 R09: 0000000000000000 [ 658.200172][T28266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 658.208148][T28266] R13: 00007f66f3d3e038 R14: 00007f66f3d3dfa0 R15: 00007ffe4feeaab8 [ 658.298669][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 658.306606][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 658.326867][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 658.336194][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 658.345286][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.352407][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.367078][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 658.375905][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 658.400735][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.407855][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.416477][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 658.459359][T28242] device veth0_vlan entered promiscuous mode [ 658.466016][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 658.475856][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 658.484813][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 658.492534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 658.507437][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 658.515956][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 658.541629][T28242] device veth1_macvtap entered promiscuous mode [ 658.565711][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 658.637212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 658.649021][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 658.689309][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 658.699155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 658.943015][T28316] FAULT_INJECTION: forcing a failure. [ 658.943015][T28316] name failslab, interval 1, probability 0, space 0, times 0 [ 658.959772][T28316] CPU: 0 PID: 28316 Comm: syz.0.8427 Tainted: G W syzkaller #0 [ 658.968665][T28316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 658.978855][T28316] Call Trace: [ 658.982255][T28316] __dump_stack+0x21/0x24 [ 658.986683][T28316] dump_stack_lvl+0x1a7/0x208 [ 658.991377][T28316] ? thaw_kernel_threads+0x220/0x220 [ 658.996699][T28316] ? show_regs_print_info+0x18/0x18 [ 659.001919][T28316] dump_stack+0x15/0x1c [ 659.006176][T28316] should_fail+0x3c1/0x510 [ 659.010604][T28316] ? kobject_get_path+0xbf/0x1f0 [ 659.015561][T28316] __should_failslab+0xa4/0xe0 [ 659.020342][T28316] should_failslab+0x9/0x20 [ 659.024858][T28316] __kmalloc+0x60/0x330 [ 659.029035][T28316] kobject_get_path+0xbf/0x1f0 [ 659.033844][T28316] kobject_uevent_env+0x28b/0x700 [ 659.038891][T28316] kobject_uevent+0x1d/0x30 [ 659.043401][T28316] __kobject_del+0xd7/0x2f0 [ 659.047921][T28316] kobject_put+0x1db/0x270 [ 659.052350][T28316] netdev_queue_update_kobjects+0x326/0x390 [ 659.058261][T28316] netif_set_real_num_tx_queues+0x15d/0x7c0 [ 659.064192][T28316] __tun_detach+0xb31/0x1450 [ 659.068801][T28316] __tun_chr_ioctl+0xada/0x1d00 [ 659.073663][T28316] ? tun_flow_create+0x320/0x320 [ 659.078612][T28316] ? __fget_files+0x2c4/0x320 [ 659.083304][T28316] tun_chr_ioctl+0x2a/0x40 [ 659.087743][T28316] ? tun_chr_poll+0x6b0/0x6b0 [ 659.092444][T28316] __se_sys_ioctl+0x121/0x1a0 [ 659.097132][T28316] __x64_sys_ioctl+0x7b/0x90 [ 659.101739][T28316] do_syscall_64+0x31/0x40 [ 659.106253][T28316] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 659.112165][T28316] RIP: 0033:0x7f110f706cb9 [ 659.116592][T28316] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 659.136223][T28316] RSP: 002b:00007f110e163028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 659.144672][T28316] RAX: ffffffffffffffda RBX: 00007f110f981fa0 RCX: 00007f110f706cb9 [ 659.152667][T28316] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000008 [ 659.160660][T28316] RBP: 00007f110e163090 R08: 0000000000000000 R09: 0000000000000000 [ 659.168650][T28316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 659.176637][T28316] R13: 00007f110f982038 R14: 00007f110f981fa0 R15: 00007ffdd6af85d8 [ 659.538491][T28336] device veth1_macvtap left promiscuous mode [ 659.544653][T28336] device macsec0 entered promiscuous mode [ 659.584935][T28344] syz.2.8437[28344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 659.585002][T28344] syz.2.8437[28344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 659.604188][T28346] syz.2.8437[28346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 659.634353][T28346] syz.2.8437[28346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 659.771647][T28362] device wg2 entered promiscuous mode [ 659.789272][ T455] device veth0_to_team left promiscuous mode [ 659.795387][ T455] : port 1(veth0_to_team) entered disabled state [ 659.846331][ T455] device veth0_vlan left promiscuous mode [ 660.540838][T28400] syz.1.8452[28400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 660.540906][T28400] syz.1.8452[28400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.104117][T28415] device syzkaller0 entered promiscuous mode [ 662.345631][T28456] device pim6reg1 entered promiscuous mode [ 662.641405][T28467] device pim6reg1 entered promiscuous mode [ 662.693151][T28466] FAULT_INJECTION: forcing a failure. [ 662.693151][T28466] name failslab, interval 1, probability 0, space 0, times 0 [ 662.808498][T28466] CPU: 1 PID: 28466 Comm: syz.1.8471 Tainted: G W syzkaller #0 [ 662.817399][T28466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 662.827471][T28466] Call Trace: [ 662.830792][T28466] __dump_stack+0x21/0x24 [ 662.835145][T28466] dump_stack_lvl+0x1a7/0x208 [ 662.839847][T28466] ? show_regs_print_info+0x18/0x18 [ 662.845104][T28466] ? __kasan_slab_free+0x11/0x20 [ 662.850066][T28466] ? slab_free_freelist_hook+0xc5/0x190 [ 662.855633][T28466] dump_stack+0x15/0x1c [ 662.859815][T28466] should_fail+0x3c1/0x510 [ 662.864246][T28466] ? kobject_uevent_env+0x272/0x700 [ 662.869549][T28466] __should_failslab+0xa4/0xe0 [ 662.874417][T28466] should_failslab+0x9/0x20 [ 662.878939][T28466] kmem_cache_alloc_trace+0x3a/0x2e0 [ 662.884244][T28466] ? kernfs_put+0x449/0x480 [ 662.888995][T28466] kobject_uevent_env+0x272/0x700 [ 662.894034][T28466] kobject_uevent+0x1d/0x30 [ 662.898638][T28466] __kobject_del+0xd7/0x2f0 [ 662.903159][T28466] kobject_put+0x1db/0x270 [ 662.907598][T28466] net_rx_queue_update_kobjects+0x3b5/0x420 [ 662.913506][T28466] ? netif_set_real_num_tx_queues+0x5e0/0x7c0 [ 662.919587][T28466] netif_set_real_num_rx_queues+0x107/0x1f0 [ 662.925506][T28466] __tun_detach+0xb67/0x1450 [ 662.930117][T28466] __tun_chr_ioctl+0xada/0x1d00 [ 662.934989][T28466] ? tun_flow_create+0x320/0x320 [ 662.939944][T28466] ? __fget_files+0x2c4/0x320 [ 662.944648][T28466] tun_chr_ioctl+0x2a/0x40 [ 662.949086][T28466] ? tun_chr_poll+0x6b0/0x6b0 [ 662.953780][T28466] __se_sys_ioctl+0x121/0x1a0 [ 662.958487][T28466] __x64_sys_ioctl+0x7b/0x90 [ 662.963090][T28466] do_syscall_64+0x31/0x40 [ 662.967523][T28466] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 662.973517][T28466] RIP: 0033:0x7ff8eced2cb9 [ 662.977954][T28466] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 662.997613][T28466] RSP: 002b:00007ff8eb92f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 663.006042][T28466] RAX: ffffffffffffffda RBX: 00007ff8ed14dfa0 RCX: 00007ff8eced2cb9 [ 663.014115][T28466] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000008 [ 663.022108][T28466] RBP: 00007ff8eb92f090 R08: 0000000000000000 R09: 0000000000000000 [ 663.030100][T28466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 663.038261][T28466] R13: 00007ff8ed14e038 R14: 00007ff8ed14dfa0 R15: 00007fff855866d8 [ 664.354556][T28528] @: renamed from bond_slave_0 [ 664.471028][T28539] device sit0 left promiscuous mode [ 665.851095][T28563] device syzkaller0 entered promiscuous mode [ 666.323339][T28571] device syzkaller0 entered promiscuous mode [ 666.575735][T28574] device pim6reg1 entered promiscuous mode [ 666.735689][T28579] device wg2 left promiscuous mode [ 668.839255][T28691] device pim6reg1 entered promiscuous mode [ 670.530886][T28789] device syzkaller0 entered promiscuous mode [ 671.396390][T28812] device bridge_slave_0 entered promiscuous mode [ 672.503838][T28838] device syzkaller0 entered promiscuous mode [ 672.899070][T28876] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.906298][T28876] bridge0: port 1(bridge_slave_0) entered disabled state [ 674.547120][T28971] device sit0 entered promiscuous mode [ 678.605734][T29190] device macsec0 entered promiscuous mode [ 680.735431][T29288] device syzkaller0 entered promiscuous mode [ 681.292968][T29322] device syzkaller0 entered promiscuous mode [ 683.454475][T29398] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 684.084643][T29418] device wg2 entered promiscuous mode [ 684.270466][T29421] device pim6reg1 entered promiscuous mode [ 684.593297][T29444] device dummy0 entered promiscuous mode [ 685.169823][ T24] audit: type=1400 audit(1768989946.850:175): avc: denied { setattr } for pid=29502 comm="syz.1.8784" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 685.556284][T29633] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.563745][T29633] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.571497][T29633] device bridge_slave_0 entered promiscuous mode [ 685.587478][T29633] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.594856][T29633] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.602517][T29633] device bridge_slave_1 entered promiscuous mode [ 685.629905][T29629] device pim6reg1 entered promiscuous mode [ 685.647133][T29643] device syzkaller0 entered promiscuous mode [ 685.751623][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 685.766814][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 685.782494][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 685.801688][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 685.812145][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.819244][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.826778][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 685.835721][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 685.844114][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.851310][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.882053][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 685.891286][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 685.899992][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 685.933421][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 685.942185][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 685.951678][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 685.959802][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 685.969874][T29633] device veth0_vlan entered promiscuous mode [ 685.990987][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 686.001704][T29633] device veth1_macvtap entered promiscuous mode [ 686.025198][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 686.038879][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 686.114991][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 686.233523][ T7] device erspan0 left promiscuous mode [ 686.249079][ T7] GPL: port 1(erspan0) entered disabled state [ 686.362090][T29681] device syzkaller0 entered promiscuous mode [ 686.797523][ T7] device veth0_vlan left promiscuous mode [ 687.885911][T29737] device wg2 left promiscuous mode [ 688.012613][T29741] device wg2 entered promiscuous mode [ 688.088530][T29751] device veth1_macvtap left promiscuous mode [ 688.206823][T29758] device veth1_macvtap entered promiscuous mode [ 688.246992][T29758] device macsec0 entered promiscuous mode [ 688.453646][T29760] device veth0_vlan left promiscuous mode [ 688.472481][T29760] device veth0_vlan entered promiscuous mode [ 688.530236][T29762] device sit0 entered promiscuous mode [ 692.178379][T29909] device syzkaller0 entered promiscuous mode [ 693.994014][T29984] device veth0_vlan left promiscuous mode [ 694.020702][T29984] device veth0_vlan entered promiscuous mode [ 694.152446][T29995] device pim6reg1 entered promiscuous mode [ 696.126101][T30171] device syzkaller0 entered promiscuous mode [ 696.958787][T30172] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.968011][T30172] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.976358][T30172] device bridge_slave_0 entered promiscuous mode [ 696.983973][T30172] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.991756][T30172] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.999671][T30172] device bridge_slave_1 entered promiscuous mode [ 697.411466][ T455] device bridge_slave_1 left promiscuous mode [ 697.417674][ T455] bridge0: port 2(bridge_slave_1) entered disabled state [ 697.486366][ T455] device bridge_slave_0 left promiscuous mode [ 697.546855][ T455] bridge0: port 1(bridge_slave_0) entered disabled state [ 697.597369][ T455] device veth1_macvtap left promiscuous mode [ 697.627391][ T455] device veth0_vlan left promiscuous mode [ 698.090081][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 698.099810][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 698.142534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 698.152661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 698.162323][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.169513][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 698.177279][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 698.186154][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 698.194866][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 698.201970][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 698.212527][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 698.256415][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 698.276875][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 698.351454][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 698.367974][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 698.393940][T30172] device veth0_vlan entered promiscuous mode [ 698.430512][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 698.447260][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 698.455863][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 698.464177][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 698.472938][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 698.480842][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 698.537463][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 698.552634][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 698.585739][T30172] device veth1_macvtap entered promiscuous mode [ 698.614746][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 698.637603][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 698.648105][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 698.661856][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 698.673096][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 699.877932][T30315] device syzkaller0 entered promiscuous mode [ 700.874687][T30356] device pim6reg1 entered promiscuous mode [ 701.071322][T30372] device wg2 left promiscuous mode [ 701.169603][T30372] device wg2 entered promiscuous mode [ 701.301747][T30411] tap0: tun_chr_ioctl cmd 1074025680 [ 701.374949][T30415] device sit0 left promiscuous mode [ 701.527971][T30422] device sit0 entered promiscuous mode [ 701.918539][T30455] tap0: tun_chr_ioctl cmd 1074025673 [ 701.934169][T30454] tap0: tun_chr_ioctl cmd 1074025677 [ 701.968482][T30454] tap0: linktype set to 780 [ 702.039642][T30454] device syzkaller0 entered promiscuous mode [ 702.590787][T30479] device veth0_vlan left promiscuous mode [ 702.602614][T30479] device veth0_vlan entered promiscuous mode [ 702.956795][T30511] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 704.421063][T30578] device sit0 entered promiscuous mode [ 704.613021][T30599] device veth0_vlan left promiscuous mode [ 704.648838][T30599] device veth0_vlan entered promiscuous mode [ 706.193805][T30703] : port 1(syz_tun) entered blocking state [ 706.239628][T30703] : port 1(syz_tun) entered disabled state [ 706.262763][T30703] device syz_tun entered promiscuous mode [ 707.460830][T30759] device pim6reg1 entered promiscuous mode [ 709.655220][T30845] bridge0: port 1(bridge_slave_0) entered blocking state [ 709.781330][T30845] bridge0: port 1(bridge_slave_0) entered disabled state [ 709.819442][T30845] device bridge_slave_0 entered promiscuous mode [ 709.956023][T30845] bridge0: port 2(bridge_slave_1) entered blocking state [ 710.007743][T30845] bridge0: port 2(bridge_slave_1) entered disabled state [ 710.036261][T30845] device bridge_slave_1 entered promiscuous mode [ 710.312326][T30894] device wg2 left promiscuous mode [ 710.380102][T30845] bridge0: port 2(bridge_slave_1) entered blocking state [ 710.387223][T30845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 710.394562][T30845] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.401630][T30845] bridge0: port 1(bridge_slave_0) entered forwarding state [ 710.547951][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.565636][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 710.686022][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 710.695499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 710.726931][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 710.735608][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 710.785942][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.793178][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 710.801253][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 710.893023][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 710.916670][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 710.923813][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 710.945698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 710.954009][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 710.962255][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 710.970909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 711.064839][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 711.074516][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 711.086067][T30845] device veth0_vlan entered promiscuous mode [ 711.093567][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 711.102067][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 711.118945][T30845] device veth1_macvtap entered promiscuous mode [ 711.126170][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 711.135838][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 711.144688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 711.153596][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 711.162826][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 711.180634][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 711.189672][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 711.199255][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 711.215713][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 711.450952][T30950] device macsec0 left promiscuous mode [ 711.458762][T30950] device veth1_macvtap entered promiscuous mode [ 711.466855][T30950] device macsec0 entered promiscuous mode [ 711.488870][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 712.407775][T30997] device veth0_vlan left promiscuous mode [ 712.488715][T30997] device veth0_vlan entered promiscuous mode [ 712.541973][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 712.554928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 712.567223][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 712.775874][T30997] device syzkaller0 entered promiscuous mode [ 712.884198][T31010] device veth0_vlan left promiscuous mode [ 712.891070][T31010] device veth0_vlan entered promiscuous mode [ 712.925014][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 712.944666][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 712.953012][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 713.927548][T31092] device pim6reg1 entered promiscuous mode [ 716.713315][T31237] device syzkaller0 entered promiscuous mode [ 719.437914][T31306] bridge0: port 3(gretap0) entered blocking state [ 719.451753][T31306] bridge0: port 3(gretap0) entered disabled state [ 719.476216][T31306] device gretap0 entered promiscuous mode [ 719.495101][T31306] bridge0: port 3(gretap0) entered blocking state [ 719.501909][T31306] bridge0: port 3(gretap0) entered forwarding state [ 719.955040][T31327] device sit0 left promiscuous mode [ 720.408808][T31347] device sit0 left promiscuous mode [ 720.548808][T31354] device sit0 entered promiscuous mode [ 720.705566][T31361] device wg2 entered promiscuous mode [ 720.712388][T31362] device pim6reg1 entered promiscuous mode [ 720.990010][T31375] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.999028][T31375] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.077239][T31375] device bridge_slave_1 left promiscuous mode [ 721.085942][T31375] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.133918][T31375] device bridge_slave_0 left promiscuous mode [ 721.173241][T31375] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.954465][T31408] device sit0 entered promiscuous mode [ 721.989027][T31421] device syzkaller0 entered promiscuous mode [ 723.925666][T31519] device syzkaller0 entered promiscuous mode [ 724.201398][T31544] device veth0_vlan left promiscuous mode [ 724.222847][T31544] device veth0_vlan entered promiscuous mode [ 724.243850][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 724.252682][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 724.260415][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 726.236211][T31637] device wg2 left promiscuous mode [ 726.314805][T31637] device wg2 entered promiscuous mode [ 730.199160][T31786] syz.3.9415[31786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.199221][T31786] syz.3.9415[31786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.642394][T31774] device syzkaller0 entered promiscuous mode [ 731.191790][T30172] device syz_tun left promiscuous mode [ 731.198407][T30172] : port 1(syz_tun) entered disabled state [ 732.047479][T31843] bridge0: port 1(bridge_slave_0) entered blocking state [ 732.074773][T31843] bridge0: port 1(bridge_slave_0) entered disabled state [ 732.096025][T31843] device bridge_slave_0 entered promiscuous mode [ 732.177933][T31843] bridge0: port 2(bridge_slave_1) entered blocking state [ 732.193951][T31843] bridge0: port 2(bridge_slave_1) entered disabled state [ 732.224278][T31843] device bridge_slave_1 entered promiscuous mode [ 732.400740][T31861] device pim6reg1 entered promiscuous mode [ 732.578036][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 732.590659][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 732.607876][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 732.616451][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 732.625316][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 732.632443][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 732.640085][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 732.651705][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 732.660482][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 732.669506][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 732.676611][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 732.705205][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 732.718745][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 732.732870][T31883] device wg2 entered promiscuous mode [ 732.755133][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 732.802079][T31843] device veth0_vlan entered promiscuous mode [ 732.846743][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 732.862747][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 732.887819][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 732.903841][T31843] device veth1_macvtap entered promiscuous mode [ 732.922580][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 732.965401][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 732.973937][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 733.000873][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 733.009345][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 733.147939][T31894] device wg2 entered promiscuous mode [ 733.251936][ T455] device bridge_slave_1 left promiscuous mode [ 733.258134][ T455] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.272955][ T455] device bridge_slave_0 left promiscuous mode [ 733.280844][ T455] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.293329][ T455] device veth1_macvtap left promiscuous mode [ 734.039888][T31949] device veth1_macvtap left promiscuous mode [ 735.254770][T32019] device ip6tnl0 entered promiscuous mode [ 737.094069][T32091] device veth1_macvtap left promiscuous mode [ 737.138542][T32092] device veth1_macvtap entered promiscuous mode [ 737.159178][T32092] device macsec0 entered promiscuous mode [ 739.324784][T32185] device syzkaller0 entered promiscuous mode [ 740.294931][T32227] device veth0_vlan left promiscuous mode [ 740.326824][T32227] device veth0_vlan entered promiscuous mode [ 742.694229][T32308] device veth0_vlan left promiscuous mode [ 742.715382][T32308] device veth0_vlan entered promiscuous mode [ 743.699129][T32337] device veth0_vlan left promiscuous mode [ 743.750254][T32337] device veth0_vlan entered promiscuous mode [ 744.339954][T32372] device pim6reg1 entered promiscuous mode [ 746.078030][T32457] device wg2 left promiscuous mode [ 746.141062][T32457] device wg2 entered promiscuous mode [ 753.305833][T32705] device pim6reg1 entered promiscuous mode [ 753.385743][T32702] device pim6reg1 entered promiscuous mode [ 756.669820][ T317] device veth0_vlan left promiscuous mode [ 756.676953][ T317] device veth0_vlan entered promiscuous mode [ 756.775417][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 756.814213][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 756.871902][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 758.436525][ T401] : renamed from vlan1 [ 759.430085][ T467] device wg2 left promiscuous mode [ 759.585051][ T467] device syzkaller0 entered promiscuous mode [ 760.030326][ T481] device wg2 left promiscuous mode [ 762.845847][ T539] device wg2 entered promiscuous mode [ 763.446768][ T559] device syzkaller0 entered promiscuous mode [ 763.726864][ T575] device syzkaller0 entered promiscuous mode [ 766.141474][ T671] device syzkaller0 entered promiscuous mode [ 766.691937][ T699] FAULT_INJECTION: forcing a failure. [ 766.691937][ T699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 766.818455][ T699] CPU: 0 PID: 699 Comm: syz.2.9826 Tainted: G W syzkaller #0 [ 766.827186][ T699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 766.837263][ T699] Call Trace: [ 766.840636][ T699] __dump_stack+0x21/0x24 [ 766.845161][ T699] dump_stack_lvl+0x1a7/0x208 [ 766.849906][ T699] ? show_regs_print_info+0x18/0x18 [ 766.855149][ T699] ? format_decode+0x1bb/0x1520 [ 766.860018][ T699] dump_stack+0x15/0x1c [ 766.864254][ T699] should_fail+0x3c1/0x510 [ 766.868705][ T699] should_fail_usercopy+0x1a/0x20 [ 766.873793][ T699] _copy_from_user+0x20/0xd0 [ 766.878659][ T699] kstrtouint_from_user+0xd3/0x220 [ 766.883889][ T699] ? kstrtol_from_user+0x2a0/0x2a0 [ 766.889153][ T699] ? memset+0x35/0x40 [ 766.893277][ T699] ? avc_policy_seqno+0x1b/0x70 [ 766.898191][ T699] ? selinux_file_permission+0x2a5/0x510 [ 766.903904][ T699] proc_fail_nth_write+0x8b/0x200 [ 766.908969][ T699] ? proc_fail_nth_read+0x220/0x220 [ 766.914322][ T699] ? rw_verify_area+0x1c0/0x360 [ 766.919198][ T699] ? proc_fail_nth_read+0x220/0x220 [ 766.924594][ T699] vfs_write+0x338/0xdc0 [ 766.928854][ T699] ? kernel_write+0x3c0/0x3c0 [ 766.933558][ T699] ? __kasan_check_write+0x14/0x20 [ 766.938759][ T699] ? mutex_lock+0x92/0xf0 [ 766.943109][ T699] ? mutex_trylock+0xa0/0xa0 [ 766.947761][ T699] ? __fget_files+0x2c4/0x320 [ 766.952463][ T699] ? __fdget_pos+0x2d2/0x380 [ 766.957074][ T699] ? ksys_write+0x71/0x250 [ 766.961511][ T699] ksys_write+0x149/0x250 [ 766.965861][ T699] ? __ia32_sys_read+0x90/0x90 [ 766.970665][ T699] ? debug_smp_processor_id+0x17/0x20 [ 766.976067][ T699] __x64_sys_write+0x7b/0x90 [ 766.980674][ T699] do_syscall_64+0x31/0x40 [ 766.985123][ T699] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 766.991033][ T699] RIP: 0033:0x7f66f3a8358e [ 766.995466][ T699] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 767.015092][ T699] RSP: 002b:00007f66f24dcfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 767.023696][ T699] RAX: ffffffffffffffda RBX: 00007f66f24dd6c0 RCX: 00007f66f3a8358e [ 767.031677][ T699] RDX: 0000000000000001 RSI: 00007f66f24dd0a0 RDI: 0000000000000006 [ 767.039661][ T699] RBP: 00007f66f24dd090 R08: 0000000000000000 R09: 0000000000000000 [ 767.047679][ T699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 767.055670][ T699] R13: 00007f66f3d3e218 R14: 00007f66f3d3e180 R15: 00007ffe4feeaab8 [ 767.671874][ T734] device veth0_vlan left promiscuous mode [ 767.734103][ T734] device veth0_vlan entered promiscuous mode [ 767.779945][ T727] device sit0 entered promiscuous mode [ 767.916064][ T746] device pim6reg1 entered promiscuous mode [ 768.734262][ T787] device wg2 left promiscuous mode [ 768.820492][ T795] device sit0 left promiscuous mode [ 769.032976][ T787] device wg2 entered promiscuous mode [ 770.968424][ T873] device veth0_vlan left promiscuous mode [ 770.974747][ T873] device veth0_vlan entered promiscuous mode [ 770.991829][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 771.009156][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 771.033688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 773.083026][ T938] : renamed from vlan1 [ 773.189094][ T946] device wg2 entered promiscuous mode [ 773.491331][ T961] device sit0 entered promiscuous mode [ 774.581011][ T995] device veth0_vlan left promiscuous mode [ 774.612099][ T995] device veth0_vlan entered promiscuous mode [ 774.727305][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 774.739756][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 774.772089][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 774.788097][ T1014] device pim6reg1 entered promiscuous mode [ 775.029303][ T1026] device syzkaller0 entered promiscuous mode [ 776.407487][ T1078] device veth0_vlan left promiscuous mode [ 776.484276][ T1078] device veth0_vlan entered promiscuous mode [ 776.628592][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 776.649106][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 776.792274][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 778.832530][ T1173] device syzkaller0 entered promiscuous mode [ 780.202332][ T1240] device syzkaller0 entered promiscuous mode [ 781.261478][ T1259] device syzkaller0 entered promiscuous mode [ 785.528075][ T1352] device sit0 left promiscuous mode [ 785.657096][ T1357] device wg2 left promiscuous mode [ 786.625521][ T1405] device pim6reg1 entered promiscuous mode [ 787.017107][ T1425] device sit0 left promiscuous mode [ 787.241639][ T1431] device sit0 entered promiscuous mode [ 788.752406][ T1478] device wg2 left promiscuous mode [ 792.638241][ T1557] bridge0: port 3(gretap0) entered disabled state [ 792.644824][ T1557] bridge0: port 2(bridge_slave_1) entered disabled state [ 792.652225][ T1557] bridge0: port 1(bridge_slave_0) entered disabled state [ 792.848035][ T1569] device gretap0 left promiscuous mode [ 792.938541][ T1569] bridge0: port 3(gretap0) entered disabled state [ 792.952223][ T1569] device bridge_slave_1 left promiscuous mode [ 792.958548][ T1569] bridge0: port 2(bridge_slave_1) entered disabled state [ 793.008746][ T1569] device bridge_slave_0 left promiscuous mode [ 793.015011][ T1569] bridge0: port 1(bridge_slave_0) entered disabled state [ 794.405378][ T1626] device syzkaller0 entered promiscuous mode [ 794.789070][ T1632] device pim6reg1 entered promiscuous mode [ 795.070128][ T1656] device syzkaller0 entered promiscuous mode [ 795.083852][ T1645] device wg2 entered promiscuous mode [ 795.092421][ T1658] syz.2.10115[1658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 796.030603][ T1688] device pim6reg1 entered promiscuous mode [ 796.121108][ T1701] device syzkaller0 entered promiscuous mode [ 796.179713][ T1708] device sit0 entered promiscuous mode [ 796.343945][ T1734] : renamed from vlan0 [ 796.959978][ T1775] device syzkaller0 entered promiscuous mode [ 798.348077][ T1848] device sit0 left promiscuous mode [ 798.376538][ T1848] device sit0 entered promiscuous mode [ 799.044638][ T1867] syz.0.10175[1867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 799.044707][ T1867] syz.0.10175[1867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 799.347489][ T1863] device syzkaller0 entered promiscuous mode [ 799.972293][ T1908] device syzkaller0 entered promiscuous mode [ 800.161635][ T1927] device sit0 entered promiscuous mode [ 801.376628][ T1971] device veth0_vlan left promiscuous mode [ 801.650796][ T1971] device veth0_vlan entered promiscuous mode [ 802.014547][ T1992] device syzkaller0 entered promiscuous mode [ 802.345958][ T2015] device pim6reg1 entered promiscuous mode [ 802.537500][ T2029] device sit0 left promiscuous mode [ 802.650321][ T2030] device sit0 entered promiscuous mode [ 803.545114][ T2068] device syzkaller0 entered promiscuous mode [ 805.832265][ T2152] device syzkaller0 entered promiscuous mode [ 809.170685][ T2296] device syzkaller0 entered promiscuous mode [ 809.979322][ T2354] device pim6reg1 entered promiscuous mode [ 812.988834][ T2443] device syzkaller0 entered promiscuous mode [ 814.221208][ T2478] : renamed from team_slave_1 [ 814.393245][ T2500] device sit0 left promiscuous mode [ 814.686856][ T2503] device sit0 entered promiscuous mode [ 815.620531][ T2543] device syzkaller0 entered promiscuous mode [ 816.663113][ T2596] device sit0 left promiscuous mode [ 816.799695][ T2605] device sit0 entered promiscuous mode [ 818.955502][ T2713] device syzkaller0 entered promiscuous mode [ 824.662283][ T2846] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.746112][ T2846] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.753844][ T2846] device bridge_slave_0 entered promiscuous mode [ 824.817773][ T2846] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.836332][ T2846] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.883097][ T2846] device bridge_slave_1 entered promiscuous mode [ 825.089269][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 825.117126][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 825.172813][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 825.234384][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 825.254156][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.261264][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.277710][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 825.303667][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 825.312063][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.319131][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.326629][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 825.429934][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 825.451049][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 825.513127][ T2846] device veth0_vlan entered promiscuous mode [ 825.530708][ T2846] device veth1_macvtap entered promiscuous mode [ 825.546953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 825.569649][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 825.732836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 825.802981][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 825.811481][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 825.819225][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 825.826909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 826.851410][ T455] device veth1_macvtap left promiscuous mode [ 827.320615][ T2925] : renamed from vlan0 [ 827.822976][ T2948] device macsec0 left promiscuous mode [ 827.867527][ T2953] device veth1_macvtap entered promiscuous mode [ 827.874361][ T2953] device macsec0 entered promiscuous mode [ 827.881186][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 827.955579][ T2955] device pim6reg1 entered promiscuous mode [ 828.232437][ T2968] device veth0_vlan left promiscuous mode [ 828.241317][ T2968] device veth0_vlan entered promiscuous mode [ 828.348454][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 828.369151][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 828.449381][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 828.626936][ T2985] device sit0 left promiscuous mode [ 828.782662][ T2992] device sit0 entered promiscuous mode [ 830.653693][ T3074] device pim6reg1 entered promiscuous mode [ 831.933571][ T3136] device sit0 left promiscuous mode [ 832.061000][ T3142] device sit0 entered promiscuous mode [ 832.151109][ T3149] device pim6reg1 entered promiscuous mode [ 832.520073][ T3166] device syzkaller0 entered promiscuous mode [ 833.012050][ T3183] device syzkaller0 entered promiscuous mode [ 833.059558][ T3187] device pim6reg1 entered promiscuous mode [ 835.072368][ T3254] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.079671][ T3254] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.142201][ T3244] device bridge_slave_1 left promiscuous mode [ 835.150974][ T3244] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.166762][ T3244] device bridge_slave_0 left promiscuous mode [ 835.174598][ T3244] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.328962][ T3301] device wg2 left promiscuous mode [ 836.363227][ T3301] device pim6reg1 entered promiscuous mode [ 836.377844][ T3301] device wg2 entered promiscuous mode [ 838.111712][ T3362] device wg2 left promiscuous mode [ 839.605835][ T3379] syz.1.10632[3379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 839.605901][ T3379] syz.1.10632[3379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 840.377671][ T3384] device veth0_vlan left promiscuous mode [ 840.401149][ T3384] device veth0_vlan entered promiscuous mode [ 840.922621][ T3417] ref_ctr_offset mismatch. inode: 0x8a7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 841.725002][ T3476] device sit0 entered promiscuous mode [ 842.465636][ T3516] device wg2 left promiscuous mode [ 842.484562][ T3516] device wg1 entered promiscuous mode [ 844.098497][ T3590] device syzkaller0 entered promiscuous mode [ 845.149824][ T3647] syz.3.10715[3647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 845.149888][ T3647] syz.3.10715[3647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 845.996984][ T3675] device veth1_macvtap left promiscuous mode [ 846.015742][ T3675] device macsec0 left promiscuous mode [ 846.071061][ T3675] device veth1_macvtap entered promiscuous mode [ 846.078276][ T3675] device macsec0 entered promiscuous mode [ 846.088703][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 846.099164][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 846.888944][ T3707] tap0: tun_chr_ioctl cmd 1074025680 [ 847.383410][ T3733] bridge0: port 1(bridge_slave_0) entered blocking state [ 847.408477][ T3733] bridge0: port 1(bridge_slave_0) entered disabled state [ 847.416040][ T3733] device bridge_slave_0 entered promiscuous mode [ 847.423530][ T3733] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.430783][ T3733] bridge0: port 2(bridge_slave_1) entered disabled state [ 847.439725][ T3733] device bridge_slave_1 entered promiscuous mode [ 847.905117][ T3733] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.912253][ T3733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 847.919574][ T3733] bridge0: port 1(bridge_slave_0) entered blocking state [ 847.926630][ T3733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 848.045496][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.058827][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 848.336502][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 848.348142][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 848.427406][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 848.436128][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 848.445083][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 848.452180][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 848.464055][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 848.473416][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 848.482012][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 848.489090][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 848.496642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 848.505274][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 848.513565][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 848.522240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 848.530624][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 848.539190][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 848.558506][ T3733] device veth0_vlan entered promiscuous mode [ 848.630820][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 848.643649][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 848.660049][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 848.667712][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 848.691861][ T3771] device syzkaller0 entered promiscuous mode [ 848.700723][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 848.709492][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 848.770405][ T3733] device veth1_macvtap entered promiscuous mode [ 848.844658][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 848.861386][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 848.870074][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 848.904402][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 848.917407][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 849.484565][ T455] device bridge_slave_1 left promiscuous mode [ 849.496552][ T455] bridge0: port 2(bridge_slave_1) entered disabled state [ 849.516627][ T455] device bridge_slave_0 left promiscuous mode [ 849.531594][ T455] bridge0: port 1(bridge_slave_0) entered disabled state [ 849.552194][ T455] device veth1_macvtap left promiscuous mode [ 849.577133][ T455] device veth0_vlan left promiscuous mode [ 850.012668][ T3807] device pim6reg1 entered promiscuous mode [ 850.536264][ T3820] sock: sock_set_timeout: `syz.2.10765' (pid 3820) tries to set negative timeout [ 851.077721][ T3831] device syzkaller0 entered promiscuous mode [ 852.100316][ T3860] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.107617][ T3860] bridge0: port 1(bridge_slave_0) entered disabled state [ 852.201936][ T3862] device bridge_slave_1 left promiscuous mode [ 852.245877][ T3862] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.253974][ T3862] device bridge_slave_0 left promiscuous mode [ 852.260213][ T3862] bridge0: port 1(bridge_slave_0) entered disabled state [ 853.919599][ T3943] syz.2.10799[3943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 853.919664][ T3943] syz.2.10799[3943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 854.833019][ T3987] device sit0 entered promiscuous mode [ 855.390270][ T4011] device syzkaller0 entered promiscuous mode [ 855.443835][ T4008] device syzkaller0 entered promiscuous mode [ 855.619231][ T4025] device syzkaller0 entered promiscuous mode [ 856.616947][ T4058] device sit0 left promiscuous mode [ 856.763574][ T4061] device sit0 entered promiscuous mode [ 856.976941][ T4072] device sit0 left promiscuous mode [ 857.437637][ T4093] bridge0: port 2(bridge_slave_1) entered disabled state [ 857.447673][ T4093] bridge0: port 1(bridge_slave_0) entered disabled state [ 857.709938][ T4094] device syzkaller0 entered promiscuous mode [ 859.602601][ T4161] device sit0 left promiscuous mode [ 859.655267][ T4161] device sit0 entered promiscuous mode [ 861.267319][ T4197] device syzkaller0 entered promiscuous mode [ 861.930323][ T4225] device veth0_vlan left promiscuous mode [ 862.007539][ T4225] device veth0_vlan entered promiscuous mode [ 862.136790][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 862.155524][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 862.205831][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 863.581028][ T4276] device syzkaller0 entered promiscuous mode [ 864.874751][ T4355] : renamed from pim6reg1 [ 865.138179][ T4373] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 865.185339][ T4373] device syzkaller0 entered promiscuous mode [ 865.956379][ T4431] device pim6reg1 entered promiscuous mode [ 866.208551][ T4435] device syzkaller0 entered promiscuous mode [ 870.132888][ T4468] device syzkaller0 entered promiscuous mode [ 873.310428][ T4604] device pim6reg1 entered promiscuous mode [ 873.320268][ T4596] device veth0_vlan left promiscuous mode [ 873.333842][ T4596] device veth0_vlan entered promiscuous mode [ 873.370133][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 873.385089][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 873.393019][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 873.474319][ T4610] device sit0 entered promiscuous mode [ 873.710374][ T4617] device sit0 left promiscuous mode [ 874.274795][ T4633] device wg2 left promiscuous mode [ 874.354376][ T4633] device wg2 entered promiscuous mode [ 877.459738][ T4741] device syzkaller0 entered promiscuous mode [ 880.191950][ T4796] device sit0 left promiscuous mode [ 880.870164][ T4847] device veth1_macvtap left promiscuous mode [ 881.027726][ T4852] syz.1.11063[4852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 881.027815][ T4852] syz.1.11063[4852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 882.155791][ T4908] device syzkaller0 entered promiscuous mode [ 882.537850][ T4916] device pim6reg1 entered promiscuous mode [ 883.237467][ T4958] FAULT_INJECTION: forcing a failure. [ 883.237467][ T4958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 883.275037][ T4958] CPU: 0 PID: 4958 Comm: syz.3.11096 Tainted: G W syzkaller #0 [ 883.283943][ T4958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 883.294027][ T4958] Call Trace: [ 883.297372][ T4958] __dump_stack+0x21/0x24 [ 883.301831][ T4958] dump_stack_lvl+0x1a7/0x208 [ 883.306525][ T4958] ? show_regs_print_info+0x18/0x18 [ 883.311750][ T4958] dump_stack+0x15/0x1c [ 883.315972][ T4958] should_fail+0x3c1/0x510 [ 883.320398][ T4958] should_fail_usercopy+0x1a/0x20 [ 883.325448][ T4958] _copy_from_user+0x20/0xd0 [ 883.330122][ T4958] sock_ioctl+0x678/0x760 [ 883.334475][ T4958] ? sock_poll+0x350/0x350 [ 883.338939][ T4958] ? __fget_files+0x2c4/0x320 [ 883.343653][ T4958] ? security_file_ioctl+0x84/0xa0 [ 883.348775][ T4958] ? sock_poll+0x350/0x350 [ 883.353223][ T4958] __se_sys_ioctl+0x121/0x1a0 [ 883.357907][ T4958] __x64_sys_ioctl+0x7b/0x90 [ 883.362520][ T4958] do_syscall_64+0x31/0x40 [ 883.367849][ T4958] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 883.373762][ T4958] RIP: 0033:0x7fbad51c9cb9 [ 883.378289][ T4958] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 883.397909][ T4958] RSP: 002b:00007fbad3c26028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 883.406414][ T4958] RAX: ffffffffffffffda RBX: 00007fbad5444fa0 RCX: 00007fbad51c9cb9 [ 883.414399][ T4958] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 883.422385][ T4958] RBP: 00007fbad3c26090 R08: 0000000000000000 R09: 0000000000000000 [ 883.430376][ T4958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 883.438441][ T4958] R13: 00007fbad5445038 R14: 00007fbad5444fa0 R15: 00007ffc0fd8f4a8 [ 884.394304][ T4997] FAULT_INJECTION: forcing a failure. [ 884.394304][ T4997] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 884.490255][ T4997] CPU: 0 PID: 4997 Comm: syz.0.11108 Tainted: G W syzkaller #0 [ 884.499155][ T4997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 884.509234][ T4997] Call Trace: [ 884.512548][ T4997] __dump_stack+0x21/0x24 [ 884.517070][ T4997] dump_stack_lvl+0x1a7/0x208 [ 884.521773][ T4997] ? show_regs_print_info+0x18/0x18 [ 884.527006][ T4997] ? kasan_set_track+0x5b/0x70 [ 884.532870][ T4997] ? avc_ss_reset+0x280/0x280 [ 884.537579][ T4997] dump_stack+0x15/0x1c [ 884.542221][ T4997] should_fail+0x3c1/0x510 [ 884.546748][ T4997] should_fail_usercopy+0x1a/0x20 [ 884.551794][ T4997] _copy_from_user+0x20/0xd0 [ 884.556464][ T4997] vti6_ioctl+0x3b4/0xe30 [ 884.560815][ T4997] ? vti6_tnl_xmit+0x1620/0x1620 [ 884.565787][ T4997] ? full_name_hash+0xbd/0xf0 [ 884.570555][ T4997] dev_ifsioc+0x6b4/0xa90 [ 884.575342][ T4997] ? dev_ioctl+0xb80/0xb80 [ 884.579781][ T4997] dev_ioctl+0x5ea/0xb80 [ 884.584063][ T4997] sock_ioctl+0x6ce/0x760 [ 884.588428][ T4997] ? sock_poll+0x350/0x350 [ 884.592870][ T4997] ? __fget_files+0x2c4/0x320 [ 884.597572][ T4997] ? security_file_ioctl+0x84/0xa0 [ 884.602699][ T4997] ? sock_poll+0x350/0x350 [ 884.607131][ T4997] __se_sys_ioctl+0x121/0x1a0 [ 884.611925][ T4997] __x64_sys_ioctl+0x7b/0x90 [ 884.616546][ T4997] do_syscall_64+0x31/0x40 [ 884.620985][ T4997] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 884.626907][ T4997] RIP: 0033:0x7f110f706cb9 [ 884.631400][ T4997] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 884.651116][ T4997] RSP: 002b:00007f110e163028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 884.659557][ T4997] RAX: ffffffffffffffda RBX: 00007f110f981fa0 RCX: 00007f110f706cb9 [ 884.667566][ T4997] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 884.675562][ T4997] RBP: 00007f110e163090 R08: 0000000000000000 R09: 0000000000000000 [ 884.683549][ T4997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 884.691535][ T4997] R13: 00007f110f982038 R14: 00007f110f981fa0 R15: 00007ffdd6af85d8 [ 885.752596][ T5036] device pim6reg1 entered promiscuous mode [ 885.773300][ T5035] FAULT_INJECTION: forcing a failure. [ 885.773300][ T5035] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 885.797105][ T5035] CPU: 0 PID: 5035 Comm: syz.4.11121 Tainted: G W syzkaller #0 [ 885.806015][ T5035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 885.816126][ T5035] Call Trace: [ 885.819440][ T5035] __dump_stack+0x21/0x24 [ 885.823783][ T5035] dump_stack_lvl+0x1a7/0x208 [ 885.828481][ T5035] ? show_regs_print_info+0x18/0x18 [ 885.833782][ T5035] ? finish_task_switch+0x12e/0x5a0 [ 885.839035][ T5035] dump_stack+0x15/0x1c [ 885.843222][ T5035] should_fail+0x3c1/0x510 [ 885.847668][ T5035] should_fail_usercopy+0x1a/0x20 [ 885.852711][ T5035] _copy_from_user+0x20/0xd0 [ 885.857318][ T5035] vti6_ioctl+0x3b4/0xe30 [ 885.861671][ T5035] ? vti6_tnl_xmit+0x1620/0x1620 [ 885.866638][ T5035] ? full_name_hash+0xbd/0xf0 [ 885.871332][ T5035] dev_ifsioc+0x6b4/0xa90 [ 885.875758][ T5035] ? dev_ioctl+0xb80/0xb80 [ 885.880224][ T5035] dev_ioctl+0x5ea/0xb80 [ 885.884634][ T5035] sock_ioctl+0x6ce/0x760 [ 885.888989][ T5035] ? sock_poll+0x350/0x350 [ 885.893423][ T5035] ? __fget_files+0x2c4/0x320 [ 885.898127][ T5035] ? security_file_ioctl+0x84/0xa0 [ 885.903258][ T5035] ? sock_poll+0x350/0x350 [ 885.907688][ T5035] __se_sys_ioctl+0x121/0x1a0 [ 885.912375][ T5035] __x64_sys_ioctl+0x7b/0x90 [ 885.916977][ T5035] do_syscall_64+0x31/0x40 [ 885.921484][ T5035] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 885.927401][ T5035] RIP: 0033:0x7f16f9e27cb9 [ 885.931849][ T5035] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 885.951570][ T5035] RSP: 002b:00007f16f8884028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 885.960004][ T5035] RAX: ffffffffffffffda RBX: 00007f16fa0a2fa0 RCX: 00007f16f9e27cb9 [ 885.967993][ T5035] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 885.975973][ T5035] RBP: 00007f16f8884090 R08: 0000000000000000 R09: 0000000000000000 [ 885.983965][ T5035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 885.991958][ T5035] R13: 00007f16fa0a3038 R14: 00007f16fa0a2fa0 R15: 00007fff50d6b868 [ 886.643939][ T5078] FAULT_INJECTION: forcing a failure. [ 886.643939][ T5078] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 886.720584][ T5078] CPU: 1 PID: 5078 Comm: syz.0.11134 Tainted: G W syzkaller #0 [ 886.729485][ T5078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 886.739559][ T5078] Call Trace: [ 886.742880][ T5078] __dump_stack+0x21/0x24 [ 886.747229][ T5078] dump_stack_lvl+0x1a7/0x208 [ 886.751948][ T5078] ? show_regs_print_info+0x18/0x18 [ 886.757198][ T5078] ? format_decode+0x1bb/0x1520 [ 886.762078][ T5078] dump_stack+0x15/0x1c [ 886.766267][ T5078] should_fail+0x3c1/0x510 [ 886.770711][ T5078] should_fail_usercopy+0x1a/0x20 [ 886.775759][ T5078] _copy_from_user+0x20/0xd0 [ 886.780502][ T5078] kstrtouint_from_user+0xd3/0x220 [ 886.785635][ T5078] ? kstrtol_from_user+0x2a0/0x2a0 [ 886.790773][ T5078] ? memset+0x35/0x40 [ 886.794778][ T5078] ? avc_policy_seqno+0x1b/0x70 [ 886.799659][ T5078] ? selinux_file_permission+0x2a5/0x510 [ 886.805348][ T5078] proc_fail_nth_write+0x8b/0x200 [ 886.810403][ T5078] ? proc_fail_nth_read+0x220/0x220 [ 886.815684][ T5078] ? rw_verify_area+0x1c0/0x360 [ 886.820596][ T5078] ? proc_fail_nth_read+0x220/0x220 [ 886.825811][ T5078] vfs_write+0x338/0xdc0 [ 886.830101][ T5078] ? kernel_write+0x3c0/0x3c0 [ 886.834799][ T5078] ? __kasan_check_write+0x14/0x20 [ 886.839932][ T5078] ? mutex_lock+0x92/0xf0 [ 886.844361][ T5078] ? mutex_trylock+0xa0/0xa0 [ 886.848970][ T5078] ? __fget_files+0x2c4/0x320 [ 886.853667][ T5078] ? __fdget_pos+0x2d2/0x380 [ 886.858271][ T5078] ? ksys_write+0x71/0x250 [ 886.862701][ T5078] ksys_write+0x149/0x250 [ 886.867057][ T5078] ? __ia32_sys_read+0x90/0x90 [ 886.871850][ T5078] ? debug_smp_processor_id+0x17/0x20 [ 886.877269][ T5078] __x64_sys_write+0x7b/0x90 [ 886.881887][ T5078] do_syscall_64+0x31/0x40 [ 886.886332][ T5078] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 886.892236][ T5078] RIP: 0033:0x7f110f6c758e [ 886.896672][ T5078] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 886.916301][ T5078] RSP: 002b:00007f110e162fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 886.924833][ T5078] RAX: ffffffffffffffda RBX: 00007f110e1636c0 RCX: 00007f110f6c758e [ 886.932878][ T5078] RDX: 0000000000000001 RSI: 00007f110e1630a0 RDI: 0000000000000009 [ 886.941665][ T5078] RBP: 00007f110e163090 R08: 0000000000000000 R09: 0000000000000000 [ 886.949662][ T5078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 886.957666][ T5078] R13: 00007f110f982038 R14: 00007f110f981fa0 R15: 00007ffdd6af85d8 [ 889.776582][ T5222] device veth1_macvtap left promiscuous mode [ 889.785250][ T5222] device macsec0 left promiscuous mode [ 889.846713][ T5222] device veth1_macvtap entered promiscuous mode [ 889.855347][ T5222] device macsec0 entered promiscuous mode [ 889.875862][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 889.903765][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 891.109398][ T5305] syz.0.11201[5305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 891.109503][ T5305] syz.0.11201[5305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 891.220818][ T5305] device sit0 left promiscuous mode [ 891.435063][ T5315] device sit0 entered promiscuous mode [ 892.746994][ T5372] device pim6reg1 entered promiscuous mode [ 893.212155][ T5389] device wg2 entered promiscuous mode [ 895.753341][ T5469] FAULT_INJECTION: forcing a failure. [ 895.753341][ T5469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 895.766925][ T5469] CPU: 1 PID: 5469 Comm: syz.4.11252 Tainted: G W syzkaller #0 [ 895.775825][ T5469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 895.785891][ T5469] Call Trace: [ 895.789195][ T5469] __dump_stack+0x21/0x24 [ 895.793687][ T5469] dump_stack_lvl+0x1a7/0x208 [ 895.798382][ T5469] ? show_regs_print_info+0x18/0x18 [ 895.803597][ T5469] dump_stack+0x15/0x1c [ 895.807781][ T5469] should_fail+0x3c1/0x510 [ 895.812310][ T5469] should_fail_usercopy+0x1a/0x20 [ 895.817353][ T5469] _copy_from_user+0x20/0xd0 [ 895.822074][ T5469] sock_do_ioctl+0x1d8/0x380 [ 895.826678][ T5469] ? sock_show_fdinfo+0xa0/0xa0 [ 895.831533][ T5469] ? selinux_file_ioctl+0x3a0/0x4d0 [ 895.836732][ T5469] ? mutex_trylock+0xa0/0xa0 [ 895.841377][ T5469] ? __fget_files+0x2c4/0x320 [ 895.846118][ T5469] sock_ioctl+0x4bd/0x760 [ 895.850465][ T5469] ? sock_poll+0x350/0x350 [ 895.854904][ T5469] ? __fget_files+0x2c4/0x320 [ 895.859679][ T5469] ? security_file_ioctl+0x84/0xa0 [ 895.864793][ T5469] ? sock_poll+0x350/0x350 [ 895.869222][ T5469] __se_sys_ioctl+0x121/0x1a0 [ 895.873902][ T5469] __x64_sys_ioctl+0x7b/0x90 [ 895.878516][ T5469] do_syscall_64+0x31/0x40 [ 895.882937][ T5469] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 895.888932][ T5469] RIP: 0033:0x7f16f9e27cb9 [ 895.893354][ T5469] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 895.912960][ T5469] RSP: 002b:00007f16f8884028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 895.921374][ T5469] RAX: ffffffffffffffda RBX: 00007f16fa0a2fa0 RCX: 00007f16f9e27cb9 [ 895.929352][ T5469] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 895.937346][ T5469] RBP: 00007f16f8884090 R08: 0000000000000000 R09: 0000000000000000 [ 895.945335][ T5469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 895.953315][ T5469] R13: 00007f16fa0a3038 R14: 00007f16fa0a2fa0 R15: 00007fff50d6b868 [ 896.277923][ T5487] device pim6reg1 entered promiscuous mode [ 896.381954][ T5487] device pim6reg1 left promiscuous mode [ 896.497961][ T5489] device pim6reg1 entered promiscuous mode [ 897.304607][ T5513] FAULT_INJECTION: forcing a failure. [ 897.304607][ T5513] name failslab, interval 1, probability 0, space 0, times 0 [ 897.317712][ T5513] CPU: 1 PID: 5513 Comm: syz.4.11266 Tainted: G W syzkaller #0 [ 897.326674][ T5513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 897.336748][ T5513] Call Trace: [ 897.340061][ T5513] __dump_stack+0x21/0x24 [ 897.344428][ T5513] dump_stack_lvl+0x1a7/0x208 [ 897.349134][ T5513] ? show_regs_print_info+0x18/0x18 [ 897.354357][ T5513] ? 0xffffffffa0028948 [ 897.358592][ T5513] ? is_bpf_text_address+0x177/0x190 [ 897.363912][ T5513] dump_stack+0x15/0x1c [ 897.368100][ T5513] should_fail+0x3c1/0x510 [ 897.372571][ T5513] ? __alloc_skb+0x9e/0x520 [ 897.377098][ T5513] __should_failslab+0xa4/0xe0 [ 897.381956][ T5513] should_failslab+0x9/0x20 [ 897.386672][ T5513] kmem_cache_alloc+0x3d/0x2d0 [ 897.391509][ T5513] ? br_get_rx_handler+0x20/0x20 [ 897.396493][ T5513] __alloc_skb+0x9e/0x520 [ 897.400928][ T5513] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 897.406241][ T5513] rtnetlink_event+0xd2/0x1a0 [ 897.410969][ T5513] raw_notifier_call_chain+0x90/0x100 [ 897.416355][ T5513] dev_set_mac_address+0x320/0x430 [ 897.421489][ T5513] ? dev_pre_changeaddr_notify+0x1e0/0x1e0 [ 897.427320][ T5513] dev_set_mac_address_user+0x31/0x50 [ 897.432762][ T5513] dev_ifsioc+0x675/0xa90 [ 897.437112][ T5513] ? dev_ioctl+0xb80/0xb80 [ 897.441577][ T5513] dev_ioctl+0x550/0xb80 [ 897.445846][ T5513] sock_do_ioctl+0x27b/0x380 [ 897.450469][ T5513] ? sock_show_fdinfo+0xa0/0xa0 [ 897.455445][ T5513] ? selinux_file_ioctl+0x3a0/0x4d0 [ 897.460685][ T5513] ? mutex_trylock+0xa0/0xa0 [ 897.465296][ T5513] ? __fget_files+0x2c4/0x320 [ 897.470002][ T5513] sock_ioctl+0x4bd/0x760 [ 897.474375][ T5513] ? sock_poll+0x350/0x350 [ 897.478815][ T5513] ? __fget_files+0x2c4/0x320 [ 897.483525][ T5513] ? security_file_ioctl+0x84/0xa0 [ 897.488653][ T5513] ? sock_poll+0x350/0x350 [ 897.493091][ T5513] __se_sys_ioctl+0x121/0x1a0 [ 897.497791][ T5513] __x64_sys_ioctl+0x7b/0x90 [ 897.502395][ T5513] do_syscall_64+0x31/0x40 [ 897.506846][ T5513] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 897.512769][ T5513] RIP: 0033:0x7f16f9e27cb9 [ 897.517205][ T5513] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 897.536861][ T5513] RSP: 002b:00007f16f8884028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 897.545386][ T5513] RAX: ffffffffffffffda RBX: 00007f16fa0a2fa0 RCX: 00007f16f9e27cb9 [ 897.553387][ T5513] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 897.561426][ T5513] RBP: 00007f16f8884090 R08: 0000000000000000 R09: 0000000000000000 [ 897.569416][ T5513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 897.577413][ T5513] R13: 00007f16fa0a3038 R14: 00007f16fa0a2fa0 R15: 00007fff50d6b868 [ 897.635971][ T5525] FAULT_INJECTION: forcing a failure. [ 897.635971][ T5525] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 897.649231][ T5525] CPU: 1 PID: 5525 Comm: syz.3.11270 Tainted: G W syzkaller #0 [ 897.658100][ T5525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 897.668171][ T5525] Call Trace: [ 897.671482][ T5525] __dump_stack+0x21/0x24 [ 897.675834][ T5525] dump_stack_lvl+0x1a7/0x208 [ 897.680530][ T5525] ? show_regs_print_info+0x18/0x18 [ 897.685747][ T5525] dump_stack+0x15/0x1c [ 897.690033][ T5525] should_fail+0x3c1/0x510 [ 897.694474][ T5525] should_fail_usercopy+0x1a/0x20 [ 897.699520][ T5525] _copy_from_user+0x20/0xd0 [ 897.704127][ T5525] sock_do_ioctl+0x1d8/0x380 [ 897.708739][ T5525] ? putname+0xfe/0x150 [ 897.712912][ T5525] ? sock_show_fdinfo+0xa0/0xa0 [ 897.717786][ T5525] ? selinux_file_ioctl+0x3a0/0x4d0 [ 897.723181][ T5525] ? mutex_trylock+0xa0/0xa0 [ 897.727798][ T5525] ? __fget_files+0x2c4/0x320 [ 897.732487][ T5525] sock_ioctl+0x4bd/0x760 [ 897.736835][ T5525] ? sock_poll+0x350/0x350 [ 897.741262][ T5525] ? __fget_files+0x2c4/0x320 [ 897.745971][ T5525] ? security_file_ioctl+0x84/0xa0 [ 897.751104][ T5525] ? sock_poll+0x350/0x350 [ 897.755548][ T5525] __se_sys_ioctl+0x121/0x1a0 [ 897.760246][ T5525] __x64_sys_ioctl+0x7b/0x90 [ 897.764857][ T5525] do_syscall_64+0x31/0x40 [ 897.769289][ T5525] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 897.775196][ T5525] RIP: 0033:0x7fbad51c9cb9 [ 897.779625][ T5525] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 897.799258][ T5525] RSP: 002b:00007fbad3c26028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 897.807691][ T5525] RAX: ffffffffffffffda RBX: 00007fbad5444fa0 RCX: 00007fbad51c9cb9 [ 897.815688][ T5525] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000b [ 897.823674][ T5525] RBP: 00007fbad3c26090 R08: 0000000000000000 R09: 0000000000000000 [ 897.831658][ T5525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 897.839641][ T5525] R13: 00007fbad5445038 R14: 00007fbad5444fa0 R15: 00007ffc0fd8f4a8 [ 898.397418][ T5544] device sit0 entered promiscuous mode [ 898.774413][ T5556] FAULT_INJECTION: forcing a failure. [ 898.774413][ T5556] name failslab, interval 1, probability 0, space 0, times 0 [ 898.862119][ T5556] CPU: 1 PID: 5556 Comm: syz.0.11282 Tainted: G W syzkaller #0 [ 898.871031][ T5556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 898.881118][ T5556] Call Trace: [ 898.884436][ T5556] __dump_stack+0x21/0x24 [ 898.888789][ T5556] dump_stack_lvl+0x1a7/0x208 [ 898.893496][ T5556] ? show_regs_print_info+0x18/0x18 [ 898.898719][ T5556] ? 0xffffffffa0028948 [ 898.902901][ T5556] ? is_bpf_text_address+0x177/0x190 [ 898.908213][ T5556] dump_stack+0x15/0x1c [ 898.912390][ T5556] should_fail+0x3c1/0x510 [ 898.916838][ T5556] ? __alloc_skb+0x9e/0x520 [ 898.921361][ T5556] __should_failslab+0xa4/0xe0 [ 898.926133][ T5556] should_failslab+0x9/0x20 [ 898.930679][ T5556] kmem_cache_alloc+0x3d/0x2d0 [ 898.935456][ T5556] __alloc_skb+0x9e/0x520 [ 898.939793][ T5556] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 898.945091][ T5556] rtnetlink_event+0xd2/0x1a0 [ 898.949785][ T5556] raw_notifier_call_chain+0x90/0x100 [ 898.955163][ T5556] dev_set_mac_address+0x320/0x430 [ 898.960278][ T5556] ? dev_pre_changeaddr_notify+0x1e0/0x1e0 [ 898.966090][ T5556] dev_set_mac_address_user+0x31/0x50 [ 898.971472][ T5556] dev_ifsioc+0x675/0xa90 [ 898.975807][ T5556] ? dev_ioctl+0xb80/0xb80 [ 898.980308][ T5556] dev_ioctl+0x550/0xb80 [ 898.984568][ T5556] sock_do_ioctl+0x27b/0x380 [ 898.989181][ T5556] ? sock_show_fdinfo+0xa0/0xa0 [ 898.994049][ T5556] ? selinux_file_ioctl+0x3a0/0x4d0 [ 898.999253][ T5556] ? mutex_trylock+0xa0/0xa0 [ 899.003848][ T5556] ? __fget_files+0x2c4/0x320 [ 899.008530][ T5556] sock_ioctl+0x4bd/0x760 [ 899.012898][ T5556] ? sock_poll+0x350/0x350 [ 899.017317][ T5556] ? __fget_files+0x2c4/0x320 [ 899.022003][ T5556] ? security_file_ioctl+0x84/0xa0 [ 899.027133][ T5556] ? sock_poll+0x350/0x350 [ 899.031551][ T5556] __se_sys_ioctl+0x121/0x1a0 [ 899.036236][ T5556] __x64_sys_ioctl+0x7b/0x90 [ 899.040923][ T5556] do_syscall_64+0x31/0x40 [ 899.045345][ T5556] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 899.051245][ T5556] RIP: 0033:0x7f110f706cb9 [ 899.055670][ T5556] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 899.075282][ T5556] RSP: 002b:00007f110e163028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 899.083701][ T5556] RAX: ffffffffffffffda RBX: 00007f110f981fa0 RCX: 00007f110f706cb9 [ 899.091679][ T5556] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000b [ 899.099658][ T5556] RBP: 00007f110e163090 R08: 0000000000000000 R09: 0000000000000000 [ 899.107640][ T5556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 899.115622][ T5556] R13: 00007f110f982038 R14: 00007f110f981fa0 R15: 00007ffdd6af85d8 [ 899.247754][ T5560] FAULT_INJECTION: forcing a failure. [ 899.247754][ T5560] name failslab, interval 1, probability 0, space 0, times 0 [ 899.260658][ T5560] CPU: 1 PID: 5560 Comm: syz.2.11283 Tainted: G W syzkaller #0 [ 899.269519][ T5560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 899.279566][ T5560] Call Trace: [ 899.282875][ T5560] __dump_stack+0x21/0x24 [ 899.287387][ T5560] dump_stack_lvl+0x1a7/0x208 [ 899.292076][ T5560] ? thaw_kernel_threads+0x220/0x220 [ 899.297366][ T5560] ? show_regs_print_info+0x18/0x18 [ 899.302562][ T5560] dump_stack+0x15/0x1c [ 899.306724][ T5560] should_fail+0x3c1/0x510 [ 899.311135][ T5560] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 899.316618][ T5560] __should_failslab+0xa4/0xe0 [ 899.321395][ T5560] should_failslab+0x9/0x20 [ 899.325924][ T5560] __kmalloc_track_caller+0x5f/0x320 [ 899.331206][ T5560] ? kmem_cache_alloc+0x162/0x2d0 [ 899.336224][ T5560] ? __alloc_skb+0x9e/0x520 [ 899.340728][ T5560] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 899.346179][ T5560] __alloc_skb+0xdc/0x520 [ 899.350510][ T5560] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 899.355792][ T5560] rtnetlink_event+0xd2/0x1a0 [ 899.360492][ T5560] raw_notifier_call_chain+0x90/0x100 [ 899.365865][ T5560] dev_set_mac_address+0x320/0x430 [ 899.370975][ T5560] ? dev_pre_changeaddr_notify+0x1e0/0x1e0 [ 899.376784][ T5560] dev_set_mac_address_user+0x31/0x50 [ 899.382149][ T5560] dev_ifsioc+0x675/0xa90 [ 899.386795][ T5560] ? dev_ioctl+0xb80/0xb80 [ 899.391300][ T5560] dev_ioctl+0x550/0xb80 [ 899.395543][ T5560] sock_do_ioctl+0x27b/0x380 [ 899.400169][ T5560] ? sock_show_fdinfo+0xa0/0xa0 [ 899.405016][ T5560] ? selinux_file_ioctl+0x3a0/0x4d0 [ 899.410217][ T5560] ? mutex_trylock+0xa0/0xa0 [ 899.414832][ T5560] ? __fget_files+0x2c4/0x320 [ 899.419522][ T5560] sock_ioctl+0x4bd/0x760 [ 899.423857][ T5560] ? sock_poll+0x350/0x350 [ 899.428280][ T5560] ? __fget_files+0x2c4/0x320 [ 899.432967][ T5560] ? security_file_ioctl+0x84/0xa0 [ 899.438272][ T5560] ? sock_poll+0x350/0x350 [ 899.442694][ T5560] __se_sys_ioctl+0x121/0x1a0 [ 899.447381][ T5560] __x64_sys_ioctl+0x7b/0x90 [ 899.451983][ T5560] do_syscall_64+0x31/0x40 [ 899.456411][ T5560] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 899.462305][ T5560] RIP: 0033:0x7f09b6394cb9 [ 899.466733][ T5560] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 899.486350][ T5560] RSP: 002b:00007f09b4dd0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 899.494783][ T5560] RAX: ffffffffffffffda RBX: 00007f09b6610090 RCX: 00007f09b6394cb9 [ 899.502764][ T5560] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000005 [ 899.510746][ T5560] RBP: 00007f09b4dd0090 R08: 0000000000000000 R09: 0000000000000000 [ 899.518819][ T5560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 899.526802][ T5560] R13: 00007f09b6610128 R14: 00007f09b6610090 R15: 00007fff8d07a068 [ 901.430727][ T5654] device sit0 entered promiscuous mode [ 902.456985][ T5718] device syzkaller0 entered promiscuous mode [ 903.949189][ T5779] device xfrm0 entered promiscuous mode [ 905.885280][ T5850] bridge0: port 1(bridge_slave_0) entered blocking state [ 905.909191][ T5850] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.937492][ T5850] device bridge_slave_0 entered promiscuous mode [ 905.963427][ T5850] bridge0: port 2(bridge_slave_1) entered blocking state [ 905.988334][ T5850] bridge0: port 2(bridge_slave_1) entered disabled state [ 906.012520][ T5850] device bridge_slave_1 entered promiscuous mode [ 906.270469][ T5850] bridge0: port 2(bridge_slave_1) entered blocking state [ 906.277600][ T5850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 906.285058][ T5850] bridge0: port 1(bridge_slave_0) entered blocking state [ 906.292116][ T5850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 906.611606][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 906.630275][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 906.672382][ T24] audit: type=1400 audit(1768990168.350:176): avc: denied { create } for pid=5877 comm="syz.3.11378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 906.770000][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 906.779840][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 906.828519][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 906.841279][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 906.849945][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 906.857024][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 906.864798][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 906.873544][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 906.883063][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 906.890156][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 906.970110][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 906.980488][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 907.003926][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 907.017828][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 907.067664][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 907.099371][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 907.168742][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 907.226739][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 907.292988][ T5850] device veth0_vlan entered promiscuous mode [ 907.319480][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 907.378236][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 907.416950][ T5850] device veth1_macvtap entered promiscuous mode [ 907.428863][ T5896] FAULT_INJECTION: forcing a failure. [ 907.428863][ T5896] name failslab, interval 1, probability 0, space 0, times 0 [ 907.441546][ T5896] CPU: 0 PID: 5896 Comm: syz.4.11383 Tainted: G W syzkaller #0 [ 907.450408][ T5896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 907.460798][ T5896] Call Trace: [ 907.464234][ T5896] __dump_stack+0x21/0x24 [ 907.468593][ T5896] dump_stack_lvl+0x1a7/0x208 [ 907.473300][ T5896] ? show_regs_print_info+0x18/0x18 [ 907.478524][ T5896] dump_stack+0x15/0x1c [ 907.482817][ T5896] should_fail+0x3c1/0x510 [ 907.487335][ T5896] ? __alloc_skb+0x9e/0x520 [ 907.491876][ T5896] __should_failslab+0xa4/0xe0 [ 907.496670][ T5896] should_failslab+0x9/0x20 [ 907.501195][ T5896] kmem_cache_alloc+0x3d/0x2d0 [ 907.505984][ T5896] __alloc_skb+0x9e/0x520 [ 907.510337][ T5896] ? __kasan_check_read+0x11/0x20 [ 907.515379][ T5896] fdb_notify+0x78/0x130 [ 907.519649][ T5896] fdb_insert+0x16b/0x260 [ 907.523992][ T5896] br_fdb_changeaddr+0x187/0x1c0 [ 907.528962][ T5896] br_device_event+0x305/0x730 [ 907.533747][ T5896] ? br_boolopt_multi_get+0xb0/0xb0 [ 907.538966][ T5896] ? packet_notifier+0x8b2/0x8d0 [ 907.543973][ T5896] ? addrconf_notify+0x37b/0xe90 [ 907.548973][ T5896] ? ipv6_mc_netdev_event+0x80/0x300 [ 907.554319][ T5896] raw_notifier_call_chain+0x90/0x100 [ 907.559730][ T5896] dev_set_mac_address+0x320/0x430 [ 907.564873][ T5896] ? dev_pre_changeaddr_notify+0x1e0/0x1e0 [ 907.570705][ T5896] dev_set_mac_address_user+0x31/0x50 [ 907.576156][ T5896] dev_ifsioc+0x675/0xa90 [ 907.580551][ T5896] ? dev_ioctl+0xb80/0xb80 [ 907.584988][ T5896] dev_ioctl+0x550/0xb80 [ 907.589253][ T5896] sock_do_ioctl+0x27b/0x380 [ 907.593862][ T5896] ? sock_show_fdinfo+0xa0/0xa0 [ 907.598739][ T5896] ? selinux_file_ioctl+0x3a0/0x4d0 [ 907.603971][ T5896] ? mutex_trylock+0xa0/0xa0 [ 907.608593][ T5896] ? __fget_files+0x2c4/0x320 [ 907.613300][ T5896] sock_ioctl+0x4bd/0x760 [ 907.617646][ T5896] ? sock_poll+0x350/0x350 [ 907.622078][ T5896] ? __fget_files+0x2c4/0x320 [ 907.626782][ T5896] ? security_file_ioctl+0x84/0xa0 [ 907.631908][ T5896] ? sock_poll+0x350/0x350 [ 907.636342][ T5896] __se_sys_ioctl+0x121/0x1a0 [ 907.641043][ T5896] __x64_sys_ioctl+0x7b/0x90 [ 907.645652][ T5896] do_syscall_64+0x31/0x40 [ 907.650102][ T5896] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 907.656022][ T5896] RIP: 0033:0x7f16f9e27cb9 [ 907.661068][ T5896] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 907.680715][ T5896] RSP: 002b:00007f16f8884028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 907.689153][ T5896] RAX: ffffffffffffffda RBX: 00007f16fa0a2fa0 RCX: 00007f16f9e27cb9 [ 907.697149][ T5896] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 907.705155][ T5896] RBP: 00007f16f8884090 R08: 0000000000000000 R09: 0000000000000000 [ 907.713148][ T5896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 907.721151][ T5896] R13: 00007f16fa0a3038 R14: 00007f16fa0a2fa0 R15: 00007fff50d6b868 [ 907.734342][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 907.742661][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 907.750896][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 907.809210][ T455] device veth1_macvtap left promiscuous mode [ 908.027429][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 908.035877][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 908.095133][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 908.161859][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 910.260179][ T455] device veth0_vlan left promiscuous mode [ 912.827571][ T5946] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.838529][ T5946] bridge0: port 1(bridge_slave_0) entered disabled state [ 912.846506][ T5946] device bridge_slave_0 entered promiscuous mode [ 912.866809][ T5946] bridge0: port 2(bridge_slave_1) entered blocking state [ 912.877797][ T5946] bridge0: port 2(bridge_slave_1) entered disabled state [ 912.885740][ T5946] device bridge_slave_1 entered promiscuous mode [ 912.894671][ T5954] device sit0 left promiscuous mode [ 912.996393][ T5954] device sit0 entered promiscuous mode [ 913.600049][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 913.607983][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 913.633515][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 913.642131][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 913.651654][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 913.658762][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 913.667662][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 913.676664][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 913.685455][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 913.692556][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 913.700634][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 913.750175][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 913.766567][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 913.863817][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 913.933827][ T5946] device veth0_vlan entered promiscuous mode [ 913.974096][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 914.003756][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 914.040132][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 914.075227][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 914.105178][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 914.126424][ T5946] device veth1_macvtap entered promiscuous mode [ 914.192864][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 914.223918][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 914.238919][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 914.247458][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 914.256421][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 914.370674][ T6028] device sit0 entered promiscuous mode [ 914.924089][ T6067] device pim6reg1 entered promiscuous mode [ 915.615759][ T6102] FAULT_INJECTION: forcing a failure. [ 915.615759][ T6102] name failslab, interval 1, probability 0, space 0, times 0 [ 915.628674][ T6102] CPU: 0 PID: 6102 Comm: syz.1.11447 Tainted: G W syzkaller #0 [ 915.637640][ T6102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 915.647719][ T6102] Call Trace: [ 915.651029][ T6102] __dump_stack+0x21/0x24 [ 915.655376][ T6102] dump_stack_lvl+0x1a7/0x208 [ 915.660249][ T6102] ? show_regs_print_info+0x18/0x18 [ 915.665647][ T6102] dump_stack+0x15/0x1c [ 915.669811][ T6102] should_fail+0x3c1/0x510 [ 915.674232][ T6102] ? alloc_fdtable+0xac/0x2a0 [ 915.678935][ T6102] __should_failslab+0xa4/0xe0 [ 915.683792][ T6102] should_failslab+0x9/0x20 [ 915.688308][ T6102] kmem_cache_alloc_trace+0x3a/0x2e0 [ 915.693599][ T6102] ? _raw_spin_lock+0x94/0xf0 [ 915.698367][ T6102] alloc_fdtable+0xac/0x2a0 [ 915.702880][ T6102] dup_fd+0x792/0xa90 [ 915.706916][ T6102] copy_files+0xcf/0x170 [ 915.711166][ T6102] ? dup_task_struct+0xbd0/0xbd0 [ 915.716112][ T6102] ? security_task_alloc+0xfb/0x130 [ 915.721311][ T6102] copy_process+0x10f2/0x3300 [ 915.725997][ T6102] ? memset+0x35/0x40 [ 915.730162][ T6102] ? proc_fail_nth_read+0x220/0x220 [ 915.735386][ T6102] ? __pidfd_prepare+0x150/0x150 [ 915.740338][ T6102] ? rw_verify_area+0x1c0/0x360 [ 915.745196][ T6102] ? vfs_write+0xb27/0xdc0 [ 915.749622][ T6102] kernel_clone+0x233/0x960 [ 915.754133][ T6102] ? kernel_write+0x3c0/0x3c0 [ 915.758817][ T6102] ? create_io_thread+0x170/0x170 [ 915.763868][ T6102] ? mutex_lock+0x92/0xf0 [ 915.768223][ T6102] __x64_sys_clone+0x198/0x210 [ 915.772994][ T6102] ? __ia32_sys_vfork+0x130/0x130 [ 915.778023][ T6102] ? ksys_write+0x1f4/0x250 [ 915.782532][ T6102] ? debug_smp_processor_id+0x17/0x20 [ 915.787997][ T6102] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 915.794124][ T6102] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 915.799765][ T6102] do_syscall_64+0x31/0x40 [ 915.804195][ T6102] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 915.810090][ T6102] RIP: 0033:0x7fcd4a544cb9 [ 915.814517][ T6102] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 915.834154][ T6102] RSP: 002b:00007fcd48fa0fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 915.842574][ T6102] RAX: ffffffffffffffda RBX: 00007fcd4a7bffa0 RCX: 00007fcd4a544cb9 [ 915.850555][ T6102] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 915.858530][ T6102] RBP: 00007fcd48fa1090 R08: 0000000000000000 R09: 0000000000000000 [ 915.866505][ T6102] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 915.874479][ T6102] R13: 00007fcd4a7c0038 R14: 00007fcd4a7bffa0 R15: 00007ffdda990998 [ 916.893919][ T6120] device syzkaller0 entered promiscuous mode [ 918.308763][ T6168] device veth1_macvtap left promiscuous mode [ 918.314840][ T6168] device macsec0 entered promiscuous mode [ 919.196434][ T6207] device wg2 left promiscuous mode [ 922.322397][ T6297] device pim6reg1 entered promiscuous mode [ 922.498591][ T6309] device pim6reg1 entered promiscuous mode [ 923.279268][ T6375] device pim6reg1 entered promiscuous mode [ 924.481235][ T6431] device pim6reg1 entered promiscuous mode [ 924.863065][ T6465] device pim6reg1 entered promiscuous mode [ 926.804665][ T6507] device veth0_vlan left promiscuous mode [ 926.825173][ T6507] device veth0_vlan entered promiscuous mode [ 926.858046][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 926.883760][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 926.903774][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 927.150485][ T6525] device syzkaller0 entered promiscuous mode [ 927.854010][ T6552] device syzkaller0 entered promiscuous mode [ 928.100512][ T6571] device sit0 left promiscuous mode [ 928.140661][ T6580] device sit0 entered promiscuous mode [ 928.616010][ T6604] device wg2 entered promiscuous mode [ 928.655189][ T6595] device wg2 entered promiscuous mode [ 928.733724][ T6607] device syzkaller0 entered promiscuous mode [ 929.669912][ T6653] device pim6reg1 entered promiscuous mode [ 929.913854][ T6664] device veth1_macvtap left promiscuous mode [ 930.605343][ T6711] device sit0 left promiscuous mode [ 930.849048][ T6712] device sit0 entered promiscuous mode [ 931.634896][ T6759] device sit0 entered promiscuous mode [ 933.861950][ T6854] device veth0_vlan left promiscuous mode [ 933.875917][ T6854] device veth0_vlan entered promiscuous mode [ 933.931270][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 933.944782][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 933.960239][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 934.316812][ T6900] device pim6reg1 entered promiscuous mode [ 936.003435][ T6938] syzkaller1: tun_chr_ioctl cmd 21731 [ 936.076570][ T6938] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 937.825810][ T6979] device syzkaller0 entered promiscuous mode [ 938.963308][ T7029] device wg2 left promiscuous mode [ 939.366401][ T7038] device syzkaller0 entered promiscuous mode [ 941.076999][ T7116] device syzkaller0 entered promiscuous mode [ 944.408502][ T7287] device sit0 left promiscuous mode [ 944.481562][ T7287] device sit0 entered promiscuous mode [ 948.924198][ T7507] device syzkaller0 entered promiscuous mode [ 949.728880][ T95] udevd[95]: worker [4471] terminated by signal 33 (Unknown signal 33) [ 949.781101][ T95] udevd[95]: worker [4471] failed while handling '/devices/virtual/block/loop1' [ 951.412688][ T7618] device syzkaller0 entered promiscuous mode [ 951.854280][ T7631] device syzkaller0 entered promiscuous mode [ 951.892537][ T7632] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 951.906377][ T7632] device pim6reg1 entered promiscuous mode [ 952.177399][ T7652] syz.4.11922[7652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 952.177506][ T7652] syz.4.11922[7652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 952.570011][ T7677] device ip6tnl0 entered promiscuous mode [ 954.729590][ T7764] device syzkaller0 entered promiscuous mode [ 954.922661][ T7775] syz.3.11962[7775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 954.927296][ T7775] syz.3.11962[7775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 957.499124][ T7845] device wg2 left promiscuous mode [ 959.750130][ T7936] FAULT_INJECTION: forcing a failure. [ 959.750130][ T7936] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 959.795833][ T7936] CPU: 0 PID: 7936 Comm: syz.3.12012 Tainted: G W syzkaller #0 [ 959.804734][ T7936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 959.814904][ T7936] Call Trace: [ 959.818259][ T7936] __dump_stack+0x21/0x24 [ 959.822708][ T7936] dump_stack_lvl+0x1a7/0x208 [ 959.827426][ T7936] ? show_regs_print_info+0x18/0x18 [ 959.832650][ T7936] dump_stack+0x15/0x1c [ 959.836880][ T7936] should_fail+0x3c1/0x510 [ 959.841680][ T7936] should_fail_alloc_page+0x4f/0x60 [ 959.847019][ T7936] __alloc_pages_nodemask+0x119/0x620 [ 959.852460][ T7936] ? __kernel_text_address+0xa0/0x100 [ 959.857862][ T7936] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 959.863446][ T7936] ? arch_stack_walk+0xee/0x140 [ 959.868361][ T7936] ? stack_trace_save+0xa6/0xf0 [ 959.873274][ T7936] skb_page_frag_refill+0x1fe/0x3c0 [ 959.878516][ T7936] tun_get_user+0x726/0x3270 [ 959.883140][ T7936] ? putname+0xfe/0x150 [ 959.887410][ T7936] ? tun_do_read+0x1c70/0x1c70 [ 959.892235][ T7936] ? kstrtouint_from_user+0x1c4/0x220 [ 959.897709][ T7936] ? __fsnotify_parent+0x60c/0x6e0 [ 959.902843][ T7936] ? avc_policy_seqno+0x1b/0x70 [ 959.907716][ T7936] ? selinux_file_permission+0x2a5/0x510 [ 959.913368][ T7936] ? fsnotify_perm+0x66/0x4b0 [ 959.918164][ T7936] tun_chr_write_iter+0x1bf/0x270 [ 959.923342][ T7936] vfs_write+0x758/0xdc0 [ 959.927700][ T7936] ? putname+0xfe/0x150 [ 959.931885][ T7936] ? kernel_write+0x3c0/0x3c0 [ 959.936584][ T7936] ? __fget_files+0x2c4/0x320 [ 959.941367][ T7936] ? __fdget_pos+0x1f7/0x380 [ 959.945967][ T7936] ? ksys_write+0x71/0x250 [ 959.950574][ T7936] ksys_write+0x149/0x250 [ 959.954935][ T7936] ? __ia32_sys_read+0x90/0x90 [ 959.959748][ T7936] ? debug_smp_processor_id+0x17/0x20 [ 959.965163][ T7936] __x64_sys_write+0x7b/0x90 [ 959.969769][ T7936] do_syscall_64+0x31/0x40 [ 959.974217][ T7936] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 959.980128][ T7936] RIP: 0033:0x7fbad51c9cb9 [ 959.984688][ T7936] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 960.004463][ T7936] RSP: 002b:00007fbad3c26028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 960.012912][ T7936] RAX: ffffffffffffffda RBX: 00007fbad5444fa0 RCX: 00007fbad51c9cb9 [ 960.020915][ T7936] RDX: 0000000000000012 RSI: 0000200000000040 RDI: 00000000000000c8 [ 960.029007][ T7936] RBP: 00007fbad3c26090 R08: 0000000000000000 R09: 0000000000000000 [ 960.036997][ T7936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 960.045254][ T7936] R13: 00007fbad5445038 R14: 00007fbad5444fa0 R15: 00007ffc0fd8f4a8 [ 960.109969][ T7941] device syzkaller0 entered promiscuous mode [ 960.846484][ T7981] FAULT_INJECTION: forcing a failure. [ 960.846484][ T7981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 960.859929][ T7981] CPU: 1 PID: 7981 Comm: syz.0.12027 Tainted: G W syzkaller #0 [ 960.868798][ T7981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 960.878871][ T7981] Call Trace: [ 960.882188][ T7981] __dump_stack+0x21/0x24 [ 960.886537][ T7981] dump_stack_lvl+0x1a7/0x208 [ 960.891241][ T7981] ? show_regs_print_info+0x18/0x18 [ 960.896463][ T7981] ? __alloc_pages_nodemask+0x290/0x620 [ 960.902031][ T7981] ? __kernel_text_address+0xa0/0x100 [ 960.907423][ T7981] dump_stack+0x15/0x1c [ 960.911601][ T7981] should_fail+0x3c1/0x510 [ 960.916036][ T7981] should_fail_usercopy+0x1a/0x20 [ 960.921096][ T7981] copy_page_from_iter+0x381/0x6c0 [ 960.926231][ T7981] tun_get_user+0x7b1/0x3270 [ 960.930849][ T7981] ? tun_do_read+0x1c70/0x1c70 [ 960.935745][ T7981] ? kstrtouint_from_user+0x1c4/0x220 [ 960.941150][ T7981] ? __fsnotify_parent+0x60c/0x6e0 [ 960.946296][ T7981] ? avc_policy_seqno+0x1b/0x70 [ 960.951176][ T7981] ? selinux_file_permission+0x2a5/0x510 [ 960.956877][ T7981] ? fsnotify_perm+0x66/0x4b0 [ 960.961560][ T7981] tun_chr_write_iter+0x1bf/0x270 [ 960.966603][ T7981] vfs_write+0x758/0xdc0 [ 960.970892][ T7981] ? kernel_write+0x3c0/0x3c0 [ 960.975920][ T7981] ? __fget_files+0x2c4/0x320 [ 960.980629][ T7981] ? __fdget_pos+0x1f7/0x380 [ 960.985227][ T7981] ? ksys_write+0x71/0x250 [ 960.989736][ T7981] ksys_write+0x149/0x250 [ 960.994115][ T7981] ? __ia32_sys_read+0x90/0x90 [ 960.998895][ T7981] ? debug_smp_processor_id+0x17/0x20 [ 961.004371][ T7981] __x64_sys_write+0x7b/0x90 [ 961.008981][ T7981] do_syscall_64+0x31/0x40 [ 961.013415][ T7981] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 961.019412][ T7981] RIP: 0033:0x7f6da7fcecb9 [ 961.023833][ T7981] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 961.043913][ T7981] RSP: 002b:00007f6da6a2b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 961.052332][ T7981] RAX: ffffffffffffffda RBX: 00007f6da8249fa0 RCX: 00007f6da7fcecb9 [ 961.060303][ T7981] RDX: 0000000000000012 RSI: 0000200000000040 RDI: 00000000000000c8 [ 961.068284][ T7981] RBP: 00007f6da6a2b090 R08: 0000000000000000 R09: 0000000000000000 [ 961.076265][ T7981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 961.084276][ T7981] R13: 00007f6da824a038 R14: 00007f6da8249fa0 R15: 00007ffff8aa0ed8 [ 961.240979][ T7987] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.250574][ T7987] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.747278][ T8013] FAULT_INJECTION: forcing a failure. [ 961.747278][ T8013] name failslab, interval 1, probability 0, space 0, times 0 [ 961.760868][ T8013] CPU: 0 PID: 8013 Comm: syz.1.12038 Tainted: G W syzkaller #0 [ 961.769748][ T8013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 961.779872][ T8013] Call Trace: [ 961.783187][ T8013] __dump_stack+0x21/0x24 [ 961.787552][ T8013] dump_stack_lvl+0x1a7/0x208 [ 961.792250][ T8013] ? thaw_kernel_threads+0x220/0x220 [ 961.797548][ T8013] ? show_regs_print_info+0x18/0x18 [ 961.802771][ T8013] dump_stack+0x15/0x1c [ 961.806943][ T8013] should_fail+0x3c1/0x510 [ 961.811382][ T8013] ? __build_skb+0x2d/0x310 [ 961.815905][ T8013] __should_failslab+0xa4/0xe0 [ 961.820763][ T8013] should_failslab+0x9/0x20 [ 961.825291][ T8013] kmem_cache_alloc+0x3d/0x2d0 [ 961.830077][ T8013] __build_skb+0x2d/0x310 [ 961.834420][ T8013] build_skb+0x24/0x200 [ 961.838592][ T8013] ? tun_get_user+0x7fb/0x3270 [ 961.843374][ T8013] tun_get_user+0x814/0x3270 [ 961.847981][ T8013] ? tun_do_read+0x1c70/0x1c70 [ 961.852771][ T8013] ? kstrtouint_from_user+0x1c4/0x220 [ 961.858162][ T8013] ? __fsnotify_parent+0x60c/0x6e0 [ 961.863290][ T8013] ? avc_policy_seqno+0x1b/0x70 [ 961.868169][ T8013] ? selinux_file_permission+0x2a5/0x510 [ 961.873829][ T8013] ? fsnotify_perm+0x66/0x4b0 [ 961.878562][ T8013] tun_chr_write_iter+0x1bf/0x270 [ 961.883700][ T8013] vfs_write+0x758/0xdc0 [ 961.887969][ T8013] ? kernel_write+0x3c0/0x3c0 [ 961.892670][ T8013] ? __fget_files+0x2c4/0x320 [ 961.897366][ T8013] ? __fdget_pos+0x1f7/0x380 [ 961.901974][ T8013] ? ksys_write+0x71/0x250 [ 961.906412][ T8013] ksys_write+0x149/0x250 [ 961.910769][ T8013] ? __ia32_sys_read+0x90/0x90 [ 961.915556][ T8013] ? debug_smp_processor_id+0x17/0x20 [ 961.920937][ T8013] __x64_sys_write+0x7b/0x90 [ 961.925539][ T8013] do_syscall_64+0x31/0x40 [ 961.929971][ T8013] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 961.935853][ T8013] RIP: 0033:0x7fcd4a544cb9 [ 961.940268][ T8013] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 961.960099][ T8013] RSP: 002b:00007fcd48fa1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 961.968969][ T8013] RAX: ffffffffffffffda RBX: 00007fcd4a7bffa0 RCX: 00007fcd4a544cb9 [ 961.976942][ T8013] RDX: 0000000000000012 RSI: 0000200000000040 RDI: 00000000000000c8 [ 961.984911][ T8013] RBP: 00007fcd48fa1090 R08: 0000000000000000 R09: 0000000000000000 [ 961.992881][ T8013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 962.001022][ T8013] R13: 00007fcd4a7c0038 R14: 00007fcd4a7bffa0 R15: 00007ffdda990998 [ 963.754815][ T8071] device veth0_vlan left promiscuous mode [ 963.768490][ T8071] device veth0_vlan entered promiscuous mode [ 963.775835][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 963.787958][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 963.795847][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 964.126869][ T8078] device veth0_vlan left promiscuous mode [ 964.219660][ T8078] device veth0_vlan entered promiscuous mode [ 964.498765][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 964.520722][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 964.572069][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 965.530442][ T8149] device syzkaller0 entered promiscuous mode [ 967.583308][ T8256] device pim6reg1 entered promiscuous mode [ 967.619731][ T8254] device sit0 entered promiscuous mode [ 968.826272][ T8297] device veth0_vlan left promiscuous mode [ 968.849542][ T8297] device veth0_vlan entered promiscuous mode [ 970.425758][ T8362] device sit0 left promiscuous mode [ 970.525335][ T8365] device sit0 entered promiscuous mode [ 971.535893][ T8381] device syzkaller0 entered promiscuous mode [ 973.231918][ T8422] device wg2 entered promiscuous mode [ 973.689916][ T8465] device veth0_vlan left promiscuous mode [ 973.698227][ T8465] device veth0_vlan entered promiscuous mode [ 973.719766][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 973.732353][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 973.751471][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 974.356637][ T8507] device syzkaller0 entered promiscuous mode [ 975.133786][ T8542] device sit0 left promiscuous mode [ 975.672984][ T8570] device veth0_vlan left promiscuous mode [ 975.715380][ T8570] device veth0_vlan entered promiscuous mode [ 975.781066][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 975.811439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 975.827201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 975.860943][ T8572] device veth1_macvtap left promiscuous mode [ 976.464361][ T8610] device sit0 left promiscuous mode [ 976.541867][ T8613] device sit0 entered promiscuous mode [ 978.397575][ T24] audit: type=1400 audit(1768990240.070:177): avc: denied { create } for pid=8721 comm="syz.2.12245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 980.953535][ T8804] device syzkaller0 entered promiscuous mode [ 981.228392][ T8800] device syzkaller0 entered promiscuous mode [ 981.397041][ T8823] : renamed from vlan1 [ 981.863620][ T8863] device sit0 left promiscuous mode [ 982.041038][ T8870] syz.1.12285[8870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 982.041106][ T8870] syz.1.12285[8870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 982.075520][ T8860] device sit0 entered promiscuous mode [ 982.328906][ T8879] device wg2 left promiscuous mode [ 982.395906][ T8882] device wg2 entered promiscuous mode [ 982.707740][ T8890] device pim6reg1 entered promiscuous mode [ 983.233684][ T8916] device bridge_slave_1 left promiscuous mode [ 983.290307][ T8916] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.318616][ T8916] device bridge_slave_0 left promiscuous mode [ 983.384461][ T8916] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.699132][ T8948] device sit0 left promiscuous mode [ 983.737627][ T8947] device sit0 entered promiscuous mode [ 984.435239][ T8982] device veth0_vlan left promiscuous mode [ 984.509104][ T8982] device veth0_vlan entered promiscuous mode [ 984.606791][ T7435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 984.625168][ T7435] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 984.665406][ T7435] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 985.935513][ T9029] device veth0_vlan left promiscuous mode [ 985.966208][ T9029] device veth0_vlan entered promiscuous mode [ 985.982538][ T7435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 985.998944][ T7435] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 986.006641][ T7435] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 988.459527][ T9104] device sit0 left promiscuous mode [ 991.278737][ T9245] device pim6reg1 entered promiscuous mode [ 991.794338][ T9295] device sit0 left promiscuous mode [ 991.861810][ T9298] device sit0 entered promiscuous mode [ 1007.563453][ T9451] device syzkaller0 entered promiscuous mode [ 1008.022919][ T9466] device sit0 left promiscuous mode [ 1008.039746][ T9467] device sit0 entered promiscuous mode [ 1008.420460][ T9470] device veth0_vlan left promiscuous mode [ 1008.464737][ T9470] device veth0_vlan entered promiscuous mode [ 1008.565708][ T9470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1008.601936][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1008.615711][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1008.644566][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1009.599753][ T9529] syz.3.12489[9529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1009.599854][ T9529] syz.3.12489[9529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1009.746814][ T9533] bridge0: port 2(bridge_slave_1) entered disabled state [ 1009.765495][ T9533] bridge0: port 1(bridge_slave_0) entered disabled state [ 1009.997162][ T9533] device bridge_slave_1 left promiscuous mode [ 1010.011194][ T9533] bridge0: port 2(bridge_slave_1) entered disabled state [ 1010.048687][ T9533] device bridge_slave_0 left promiscuous mode [ 1010.056913][ T9533] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.271238][ T9561] device syzkaller0 entered promiscuous mode [ 1013.410761][ T9614] device pim6reg1 entered promiscuous mode [ 1014.602632][ T9646] device syzkaller0 entered promiscuous mode [ 1016.492564][ T9724] device pim6reg1 entered promiscuous mode [ 1017.087266][ T9737] bridge0: port 1(bridge_slave_0) entered blocking state [ 1017.102921][ T9737] bridge0: port 1(bridge_slave_0) entered disabled state [ 1017.111377][ T9737] device bridge_slave_0 entered promiscuous mode [ 1017.132604][ T9737] bridge0: port 2(bridge_slave_1) entered blocking state [ 1017.146780][ T9737] bridge0: port 2(bridge_slave_1) entered disabled state [ 1017.218944][ T9737] device bridge_slave_1 entered promiscuous mode [ 1017.351662][ T9737] bridge0: port 2(bridge_slave_1) entered blocking state [ 1017.358772][ T9737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1017.366200][ T9737] bridge0: port 1(bridge_slave_0) entered blocking state [ 1017.373286][ T9737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1017.477925][ T9760] FAULT_INJECTION: forcing a failure. [ 1017.477925][ T9760] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.619718][ T9760] CPU: 0 PID: 9760 Comm: syz.0.12552 Tainted: G W syzkaller #0 [ 1017.628626][ T9760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1017.638715][ T9760] Call Trace: [ 1017.642053][ T9760] __dump_stack+0x21/0x24 [ 1017.646423][ T9760] dump_stack_lvl+0x1a7/0x208 [ 1017.651142][ T9760] ? thaw_kernel_threads+0x220/0x220 [ 1017.656455][ T9760] ? show_regs_print_info+0x18/0x18 [ 1017.661685][ T9760] ? selinux_capable+0x2b6/0x3b0 [ 1017.666660][ T9760] ? selinux_capset+0xf0/0xf0 [ 1017.671498][ T9760] dump_stack+0x15/0x1c [ 1017.675693][ T9760] should_fail+0x3c1/0x510 [ 1017.680195][ T9760] ? htab_map_alloc+0x99/0x970 [ 1017.684982][ T9760] __should_failslab+0xa4/0xe0 [ 1017.690536][ T9760] should_failslab+0x9/0x20 [ 1017.695052][ T9760] kmem_cache_alloc_trace+0x3a/0x2e0 [ 1017.700350][ T9760] ? security_capable+0x87/0xb0 [ 1017.705226][ T9760] htab_map_alloc+0x99/0x970 [ 1017.709834][ T9760] ? htab_map_alloc_check+0x3f0/0x4e0 [ 1017.715279][ T9760] map_create+0x44e/0x2090 [ 1017.719713][ T9760] __se_sys_bpf+0x24b/0x740 [ 1017.724239][ T9760] ? __x64_sys_bpf+0x90/0x90 [ 1017.728851][ T9760] ? debug_smp_processor_id+0x17/0x20 [ 1017.734239][ T9760] __x64_sys_bpf+0x7b/0x90 [ 1017.738671][ T9760] do_syscall_64+0x31/0x40 [ 1017.743125][ T9760] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1017.749028][ T9760] RIP: 0033:0x7f6da7fcecb9 [ 1017.753554][ T9760] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1017.773195][ T9760] RSP: 002b:00007f6da6a2b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1017.781640][ T9760] RAX: ffffffffffffffda RBX: 00007f6da8249fa0 RCX: 00007f6da7fcecb9 [ 1017.789636][ T9760] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 1017.797666][ T9760] RBP: 00007f6da6a2b090 R08: 0000000000000000 R09: 0000000000000000 [ 1017.805671][ T9760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1017.813682][ T9760] R13: 00007f6da824a038 R14: 00007f6da8249fa0 R15: 00007ffff8aa0ed8 [ 1017.829655][T26488] bridge0: port 1(bridge_slave_0) entered disabled state [ 1017.839254][T26488] bridge0: port 2(bridge_slave_1) entered disabled state [ 1018.109541][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1018.119361][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1018.170468][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1018.191128][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1018.199928][T26488] bridge0: port 1(bridge_slave_0) entered blocking state [ 1018.207183][T26488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1018.430248][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1018.442157][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1018.450908][T26488] bridge0: port 2(bridge_slave_1) entered blocking state [ 1018.457987][T26488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1018.615426][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1018.627178][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1018.676970][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1018.685724][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1018.786679][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1018.795662][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1018.903148][ T9737] device veth0_vlan entered promiscuous mode [ 1018.916499][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1018.925088][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1018.933697][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1018.948810][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1019.007362][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1019.018673][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1019.069460][ T9737] device veth1_macvtap entered promiscuous mode [ 1019.130061][ T7] device veth1_macvtap left promiscuous mode [ 1019.138683][ T7] device veth0_vlan left promiscuous mode [ 1019.265460][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1019.273793][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1019.282421][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1019.324078][ T9792] Q6`Ҙ: renamed from lo [ 1019.538126][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1019.548511][T26488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1020.520211][ T9823] device pim6reg1 entered promiscuous mode [ 1020.687357][ T9828] device sit0 left promiscuous mode [ 1020.710837][ T9826] device sit0 entered promiscuous mode [ 1023.149952][ T9902] device sit0 left promiscuous mode [ 1024.202990][ T9927] device syzkaller0 entered promiscuous mode [ 1025.672081][ T9989] device wg2 entered promiscuous mode [ 1026.463863][T10041] device pim6reg1 entered promiscuous mode [ 1027.636842][T10075] device veth0_vlan left promiscuous mode [ 1027.649297][T10075] device veth0_vlan entered promiscuous mode [ 1027.706561][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1027.719512][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1027.726810][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1027.840955][T10088] device pim6reg1 entered promiscuous mode [ 1029.581505][T10123] device syzkaller0 entered promiscuous mode [ 1031.443239][T10218] syz.4.12678[10218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1031.446306][T10218] syz.4.12678[10218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1031.635065][T10226] device veth0_vlan left promiscuous mode [ 1031.662605][T10226] device veth0_vlan entered promiscuous mode [ 1031.670892][T10226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1031.680056][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1031.695725][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1031.703468][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1031.742687][T10225] device pim6reg1 entered promiscuous mode [ 1033.236356][T10304] device pim6reg1 entered promiscuous mode [ 1033.488599][T10311] device pim6reg1 entered promiscuous mode [ 1035.877863][T10421] device syzkaller0 entered promiscuous mode [ 1036.097536][T10431] device pim6reg1 entered promiscuous mode [ 1037.162794][T10473] device sit0 left promiscuous mode [ 1038.321820][T10539] device syzkaller0 entered promiscuous mode [ 1038.868107][T10577] device pim6reg1 entered promiscuous mode [ 1038.920524][T10584] device veth0_vlan left promiscuous mode [ 1039.014276][T10584] device veth0_vlan entered promiscuous mode [ 1039.082402][ T7435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1039.104940][ T7435] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1039.123462][ T7435] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1039.394467][ T426] ------------[ cut here ]------------ [ 1039.400010][ T426] kernel BUG at kernel/bpf/arraymap.c:993! [ 1039.405867][ T426] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1039.412101][ T426] CPU: 0 PID: 426 Comm: kworker/0:8 Tainted: G W syzkaller #0 [ 1039.420873][ T426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1039.431019][ T426] Workqueue: events prog_array_map_clear_deferred [ 1039.437452][ T426] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 1039.443789][ T426] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 48 63 e9 ff 0f 0b e9 78 f9 ff ff e8 3c 63 e9 ff 0f 0b e8 35 63 e9 ff <0f> 0b e8 2e 63 e9 ff 0f 0b e8 27 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 1039.463403][ T426] RSP: 0018:ffffc90000e97c18 EFLAGS: 00010293 [ 1039.469484][ T426] RAX: ffffffff817b511b RBX: ffff888114124e10 RCX: ffff888113530000 [ 1039.477479][ T426] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 1039.485471][ T426] RBP: ffffc90000e97c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 1039.493458][ T426] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 1039.501442][ T426] R13: ffff88811412de80 R14: 0000000000000001 R15: ffff88811412de00 [ 1039.509435][ T426] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1039.518375][ T426] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1039.524971][ T426] CR2: 00007f6da801c400 CR3: 000000000640f000 CR4: 00000000003506b0 [ 1039.532951][ T426] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 1039.540931][ T426] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1039.548908][ T426] Call Trace: [ 1039.552297][ T426] ? bpf_prog_00798911c748094f+0xb/0x1a4 [ 1039.558175][ T426] fd_array_map_delete_elem+0x14c/0x250 [ 1039.563923][ T426] prog_array_map_clear_deferred+0x9e/0x140 [ 1039.569893][ T426] process_one_work+0x6e1/0xba0 [ 1039.574754][ T426] worker_thread+0xa6a/0x13c0 [ 1039.579446][ T426] kthread+0x346/0x3d0 [ 1039.583535][ T426] ? worker_clr_flags+0x190/0x190 [ 1039.588570][ T426] ? kthread_blkcg+0xd0/0xd0 [ 1039.593721][ T426] ret_from_fork+0x1f/0x30 [ 1039.598144][ T426] Modules linked in: [ 1039.627574][ T426] ---[ end trace 89e3198d164dbecd ]--- [ 1039.647819][ T426] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 1039.699864][ T426] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 48 63 e9 ff 0f 0b e9 78 f9 ff ff e8 3c 63 e9 ff 0f 0b e8 35 63 e9 ff <0f> 0b e8 2e 63 e9 ff 0f 0b e8 27 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 1039.768343][ T426] RSP: 0018:ffffc90000e97c18 EFLAGS: 00010293 [ 1039.774468][ T426] RAX: ffffffff817b511b RBX: ffff888114124e10 RCX: ffff888113530000 [ 1039.785067][ T426] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 1039.793624][ T426] RBP: ffffc90000e97c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 1039.801791][ T426] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 1039.810008][ T426] R13: ffff88811412de80 R14: 0000000000000001 R15: ffff88811412de00 [ 1039.818061][ T426] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1039.827835][ T426] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1039.834662][ T426] CR2: 0000000100000000 CR3: 000000012a401000 CR4: 00000000003506b0 [ 1039.843170][ T426] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 1039.851411][ T426] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1039.859651][ T426] Kernel panic - not syncing: Fatal exception [ 1039.866131][ T426] Kernel Offset: disabled [ 1039.870591][ T426] Rebooting in 86400 seconds..