last executing test programs: 1.688179988s ago: executing program 2 (id=2974): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8982, &(0x7f0000000080)) socketpair(0xf, 0x80000, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x3, 0xc, 0x0, &(0x7f0000000200)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4008000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYRES8], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2}, 0x0, &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000840)='task_rename\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xd, 0x0, &(0x7f0000000000)="e0b9092dc1b6dbe9ab5becdcc7", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r4}, 0x10) 1.647645008s ago: executing program 2 (id=2975): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x7, 0x0, 0x0, 0xe, 0x1}]}}, 0x0, 0x2a}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r5}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0xd806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 1.452856162s ago: executing program 2 (id=2982): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072000000"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18100000000000000000000000000000850000000e000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000001b70300000000000085000000710000009500000000000000d1dd67f30970046ad7414eb2aba86d2b8efde73adde9dda6becdb44271e5bb35da17199d4a35b146e0e60d25b79f1443ff9b0421966856e8b06dc809c4a0882771914d3c641cd8f74c4d45c2f43fb3fff18f0961c273ff35f6a12b"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000008000004cd11f82", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702500000000fe1f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') 1.425303972s ago: executing program 0 (id=2983): recvmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000080)=""/127, 0x7f}, {&(0x7f0000000100)=""/166, 0xa6}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/206, 0xce}, {&(0x7f0000000300)=""/140, 0x8c}, {&(0x7f00000003c0)=""/253, 0xfd}, {&(0x7f00000004c0)=""/210, 0xd2}, {&(0x7f00000005c0)=""/125, 0x7d}], 0x8}, 0x14000) r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000840), 0x8) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x8, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x0, 0x4}, {0xa, 0x1}, {0x4, 0x1}, {0x1}, {0x3, 0x4}, {0x7, 0x5}, {0x4, 0x2}, {0x2, 0x5}]}, @var={0xb, 0x0, 0x0, 0xe, 0x5, 0x1}, @const={0xf, 0x0, 0x0, 0xa, 0x4}, @union={0x8, 0x1, 0x0, 0x5, 0x0, 0x3, [{0x7, 0x5, 0xfffffffe}]}, @typedef={0x4, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x61, 0x2e, 0x0, 0x0, 0x2e, 0x5f]}}, &(0x7f00000007c0)=""/44, 0xac, 0x2c, 0x0, 0x10000, 0x10000, @value=r0}, 0x28) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000880), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000008c0)={[{0x2b, 'freezer'}, {0x2b, 'io'}, {0x2b, 'perf_event'}, {0x2d, 'perf_event'}, {0x2d, 'memory'}]}, 0x2d) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000009c0)='net_prio.prioidx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x6, 0x80, 0x5b, 0x1, 0x4, 0x7, 0x0, 0xca, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000900), 0x8}, 0x8080, 0xfffffffffffff121, 0x4, 0x7, 0x6, 0x12000, 0x3ff, 0x0, 0x8, 0x0, 0x21}, 0xffffffffffffffff, 0x3, r3, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000a00), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r3, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000e00)={{r3, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)='%-010d \x00'}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@bloom_filter={0x1e, 0x6, 0x9, 0xb, 0x24081, r3, 0xffffffc0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0xe}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x10, 0x12, &(0x7f0000000a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@exit, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x1, 0x4, 0x5, 0x6, 0xfffffffffffffff4, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x8, 0x1, 0x0, r4}]}, &(0x7f0000000b00)='GPL\x00', 0x0, 0xc9, &(0x7f0000000b40)=""/201, 0x41100, 0x2, '\x00', r6, @sk_msg, r3, 0x8, &(0x7f0000000d00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d40)={0x3, 0x4, 0x7fe2, 0x6}, 0x10, 0xffffffffffffffff, r3, 0x6, &(0x7f0000000ec0)=[r3, r7, r3, r8, r3, r3, r3, 0xffffffffffffffff, r2], &(0x7f0000000f00)=[{0x5, 0x2, 0xe, 0xc}, {0x4, 0x4, 0x0, 0x5}, {0x2, 0x5, 0xb, 0x4}, {0x2, 0x1, 0x0, 0x4}, {0x2, 0x5, 0xf, 0x2}, {0x4, 0x4, 0xd, 0x6}], 0x10, 0x6}, 0x94) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0x0, 0x2, 0x95, 0xc, 0x0, 0x9, 0x10, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000001040), 0x4}, 0x10003, 0x8, 0x685f, 0x7, 0x1, 0x8d13, 0xf2, 0x0, 0x3577, 0x0, 0x4}, 0x0, 0x7, 0xffffffffffffffff, 0xe) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000021c0)={r3, &(0x7f0000001100)="1c1671eb03291cec7ccbd1d556c00261c7620f1e6e7f21570c37ced414a9916312044ca6ebe8b7bced66e2edc41812d35e46ec8bd6cf085589a00f3e2aef86710067b17fe3e74774e98ca42d87d377c6fbc20f6d655d237ea3511342d8db158711967894e0f219278d9b5c5993ebf8819ff900c4838bfcdcc407c63b6100fb8364957e3e12ca7d92adea78f9b0b36ba8162e0c561b7ce80ad657613f60da75aac75fc75ce75dfd427c8098", &(0x7f00000011c0)=""/4096}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000002200), 0x400003, 0x0) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002240)={0x1b, 0x0, 0x0, 0x5, 0x0, r8, 0x8, '\x00', r6, r1, 0x2, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002580)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000002500), &(0x7f0000002540)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002640)={{r7, 0xffffffffffffffff}, &(0x7f00000025c0), &(0x7f0000002600)='%pB \x00'}, 0x20) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002680)={r5, 0x2, 0x8}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000027c0)={0x6, 0x25, &(0x7f00000022c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7}, @ldst={0x1, 0x3, 0x0, 0x1, 0x5, 0x18, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x3, 0x1, 0x4, 0x9, 0x7, 0x6, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ldst={0x3, 0x2, 0x3, 0xb, 0x3, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002400)='GPL\x00', 0xff, 0x2d, &(0x7f0000002440)=""/45, 0x41100, 0x68, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002480)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000024c0)={0x2, 0x8, 0x9, 0x9}, 0x10, 0x0, 0x0, 0xa, &(0x7f00000026c0)=[r8, r8, r8, r7, r10, r11, r12, r8, r7], &(0x7f0000002700)=[{0x1, 0x3, 0xa, 0x4}, {0x2, 0x3, 0x4, 0x2}, {0x1, 0x3, 0x2, 0x5}, {0x5, 0x1, 0x10, 0x2}, {0x2, 0x4, 0x4, 0x7}, {0x1, 0x4, 0x0, 0x2}, {0x2, 0x3, 0x2}, {0x2, 0x5, 0x4, 0x4}, {0x1, 0x2, 0xe, 0x3}, {0x3, 0x1, 0x2, 0x2}], 0x10, 0xe}, 0x94) syz_clone(0x60080080, &(0x7f0000002880)="d6055f262e6d7a405d0328d8ea1ed28398b9be7779bdc42dca40185e1fd095b9d6496ca8eb029fef4933635be79f322a02632b42aac89dd6026cb5852a89180985ba2c1eda4bbc64dd64b1", 0x4b, &(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)="7acfd1ad6cb490242e2403633e11d35dbd8b39f5e21b00332167914ecddf62f91f82ebbe0d0155942629b1b27f75466437cede1602021b200eb3861a4aa0f05941a54dc63340297b57bf3fed053f3e672019dac1781303f2e59853736a2145ad932655f5c085ee45541e64d17652a0f982727b9097ae7b00ef62eead8feab7c1b48978b27e64bf2d887270a22f2ecc5654d7ed0e0b36a5a58701bffc3b6157cda8ef1fb1fb9984e50643a0ac815df9a1e16fb0ca5af174d536a36db35e3d4e") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002b80)={0x11, 0x14, &(0x7f0000002a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r12}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002b00)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x1, '\x00', r6, 0x0, r1, 0x8, &(0x7f0000002b40)={0x5, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002cc0)={r10, 0x58, &(0x7f0000002c40)}, 0x10) openat$cgroup_pressure(r3, &(0x7f0000002d00)='memory.pressure\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002e40)={@map=r11, 0x11, 0x1, 0x10, &(0x7f0000002d40)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000002d80)=[0x0], &(0x7f0000002dc0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000002ec0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000002e80)={@map=r7, r3, 0x28, 0x2028, 0x0, @void, @void, @value=r15, @void, r14}, 0x20) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f0000003040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4, 0x7}}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x2}, @union={0x4, 0x5, 0x0, 0x5, 0x0, 0x7fffffff, [{0x6, 0x4, 0xbf}, {0x6, 0x5, 0x8}, {0xf, 0x0, 0x1ff}, {0xc, 0x4, 0x2}, {0x6, 0x5, 0x4}]}, @const={0x5}, @typedef={0x6, 0x0, 0x0, 0x8, 0x3}, @volatile={0x0, 0x0, 0x0, 0x9, 0x5}, @var={0x2, 0x0, 0x0, 0xe, 0x4, 0x2}, @enum64={0x5, 0x4, 0x0, 0x13, 0x0, 0xd, [{0xf, 0xffffff7f, 0x7ff}, {0xe, 0x0, 0xffffffff}, {0x10, 0x5, 0xde}, {0xb, 0x6, 0x1}]}, @ptr={0x3, 0x0, 0x0, 0x2, 0x40}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000003180)=""/30, 0x104, 0x1e, 0x0, 0x8, 0x10000, @value=r3}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003340)={0x18, 0xe, &(0x7f0000002f00)=@raw=[@cb_func={0x18, 0x8, 0x4, 0x0, 0x4}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}, @ldst={0x3, 0x2, 0x2, 0xa, 0x0, 0xfffffffffffffff4, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x8b}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000002f80)='GPL\x00', 0x2, 0x79, &(0x7f0000002fc0)=""/121, 0x41100, 0x10, '\x00', r6, 0x0, r16, 0x8, &(0x7f0000003200)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000003240)=[r13, r3, r8], &(0x7f0000003280)=[{0x1, 0x5, 0xd, 0x9}, {0x1, 0x2, 0x2, 0x3}, {0x4, 0x3, 0x9, 0xc}, {0x1, 0x1, 0xb, 0x2}, {0x3, 0x1, 0x10, 0x4}, {0x5, 0x1, 0xf, 0x7}, {0x3, 0x5, 0xb, 0xc}, {0x4, 0x5, 0xf, 0x6}, {0x3, 0x2, 0x3}, {0x2, 0x5, 0xe, 0x6}], 0x10, 0x15}, 0x94) 1.337678684s ago: executing program 2 (id=2987): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000380), 0xd}, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x49) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={@cgroup=r2, 0x2b, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="190000000400000008000000080000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000000000000000fffffffffffffff8000000a32e1e2883e1c1e9418af615d08d5c10474afd2d8fa5c869fb50796a4bfb42f765c37bcbd8af651cac94a25f87dabcf209", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0, @ANYRESDEC=r5, @ANYRES16=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000036f0b831f49b013aed39afe5610000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r6, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="186100000a0000000000000009002309e74744608b290000000000000500000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018210000", @ANYRES32=r6, @ANYBLOB="000000000400000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000bd0400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018000000ff0f00000000000007000000"], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0xf, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x3, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff], 0x0, 0x10, 0x4390}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000007f00000000a2c50e6521bae22b000000", @ANYRES32=r4, @ANYBLOB="0300"/20, @ANYRES32=r7, @ANYRES32, @ANYBLOB="05000000010000000300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000b40)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x20008411, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='cpu&\t\t') openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 1.190263197s ago: executing program 0 (id=2989): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa631cde5a756906a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r3}, &(0x7f00000008c0), &(0x7f0000000900)=r2}, 0x20) 1.160852058s ago: executing program 3 (id=2991): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6978800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e150007ab"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) r6 = syz_clone(0x20000400, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x2}, r6, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r2, &(0x7f0000000300)=r6, 0x12) recvmsg$unix(r1, &(0x7f0000000200)={&(0x7f0000000180), 0x6e, &(0x7f0000000080)=[{&(0x7f0000000000)=""/15, 0xf}, {&(0x7f0000000280)=""/121, 0x79}], 0x2, &(0x7f00000005c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x40008000) 1.132043788s ago: executing program 0 (id=2993): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 1.113293479s ago: executing program 0 (id=2996): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072000000"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18100000000000000000000000000000850000000e000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000001b70300000000000085000000710000009500000000000000d1dd67f30970046ad7414eb2aba86d2b8efde73adde9dda6becdb44271e5bb35da17199d4a35b146e0e60d25b79f1443ff9b0421966856e8b06dc809c4a0882771914d3c641cd8f74c4d45c2f43fb3fff18f0961c273ff35f6a12b"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000008000004cd11f82", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702500000000fe1f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') 1.112999999s ago: executing program 2 (id=2997): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x400}, 0x1014, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xfffffffffeffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x2, 0x14, &(0x7f0000000400)=ANY=[@ANYRESOCT=r1, @ANYRES16=r1, @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x804, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, @perf_config_ext={0x1}, 0xa0, 0x58, 0x0, 0x7, 0x2, 0x7, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1400000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="0000fff200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r7) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r7, 0x40047451, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff8f, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3e, 0x0, 0x0, 0x10, 0xfffffffd}, 0x90) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r8}, 0x10) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r9}, 0x8) write$cgroup_int(r10, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, 0x0, 0x0}, 0x94) 1.000349311s ago: executing program 0 (id=3000): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{r2}, &(0x7f0000000680), &(0x7f0000000300)='%ps \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000200b703000000000000850000000400000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r5}, 0x10) syz_clone(0x201a4000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x438900, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000000000000190040000100000000000000", @ANYRESHEX=r0, @ANYRES8=0x0, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="000000000000000000003546009700000000000000000000004d2400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x3d}]}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89b0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 690.753446ms ago: executing program 1 (id=3007): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x38, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) 690.406927ms ago: executing program 0 (id=3008): r0 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x2000000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'batadv_slave_0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x1}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'geneve1\x00', 0x400}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x19, 0x10, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@call={0x85, 0x0, 0x0, 0xe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f0000000180)={'batadv0\x00', 0x400}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 690.150656ms ago: executing program 4 (id=3009): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x7, 0x0, 0x0, 0xe, 0x1}]}}, 0x0, 0x2a}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r5}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0xd806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 686.042377ms ago: executing program 1 (id=3010): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072000000"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18100000000000000000000000000000850000000e000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000001b70300000000000085000000710000009500000000000000d1dd67f30970046ad7414eb2aba86d2b8efde73adde9dda6becdb44271e5bb35da17199d4a35b146e0e60d25b79f1443ff9b0421966856e8b06dc809c4a0882771914d3c641cd8f74c4d45c2f43fb3fff18f0961c273ff35f6a12b"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000008000004cd11f82", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702500000000fe1f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') 606.425338ms ago: executing program 4 (id=3011): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00'}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r3}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0xd806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 596.780729ms ago: executing program 1 (id=3012): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x22}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000700)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x12000}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)="70c122b9", 0x0, 0x9, r2}, 0x38) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d33bbb9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x7}, 0x1400, 0x1, 0x3}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000012000000180100002020702500000000002020207b1af8ff00000000000000400007010000f8ffff3d9cfa2d000000850000000400000095", @ANYRES16=r1], &(0x7f0000000040)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r4) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x18) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000c80), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b405000000000000711e590000000000a6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc2, &(0x7f000000cf3d)=""/194, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x10}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="08000000000000000000000400000000b007d2cc4141660000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="36cf813fff000000ce25e9a08f3701521044d26dc3146e3e52e7834c50958d072c7668e5aa36585a937fa37e9bce8a5a366b90e5eadc25911876199c0711170f139612f91e50375b83cbc2ea7b214a3e845cb4a4c52194", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xc, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) 379.665413ms ago: executing program 4 (id=3013): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70395e292acf6c16f87166c0e993907374b000000040000850000003b000000b700a71a39b3931414311c8fea63b4862600000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x46, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x134, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x4, 0x0, 0x0, 0x3000000, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x9d1}, 0x10}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x129800, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1400000000000000010000000100", @ANYRES32=r5], 0x18}, 0x8810) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00'}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd637f4b22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18f6ff000200c6290a45cc01cf3f00009582858f68f8dfee0dacc4c0470bf9ecf6db6b169251f5f1e4296f9538fcbb1a64483b9b12fb9d9f6341d89c318e4fd903e24750bc8befcc1b9727dcad1293f95c28bf96bdee9e97f893de0198976f1d8e1be194deb1f66952771d3774218f589d99a4b5c1d7adacbe"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000180)={'veth1_to_hsr\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[], 0x48) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 305.586054ms ago: executing program 4 (id=3014): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa10000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080), 0xc) 305.202504ms ago: executing program 3 (id=3015): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa631cde5a756906a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r3}, &(0x7f00000008c0), &(0x7f0000000900)=r2}, 0x20) 304.564634ms ago: executing program 1 (id=3016): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) 276.187295ms ago: executing program 4 (id=3017): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 216.224886ms ago: executing program 3 (id=3018): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c25000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080), 0xc) 171.870047ms ago: executing program 1 (id=3019): mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\t\x00\x00'], 0x48) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) sendmsg$sock(r1, &(0x7f0000000a00)={&(0x7f0000000780)=@nfc={0x27, 0x0, 0x0, 0x3}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000800)="74c662acea6ce70da55efee4b5cc8034faba519f07a519d5e63e68e022a33353e566c954e7c4a1d2be5240524c030b934aa8abbf6c2688c59350cab1e0f9bbccf2d93e81f4cdffc75356b6e906bb6a0823039510f18c96d3609acab7220a71f123823c6d3561cc29", 0x68}, {&(0x7f0000000880)="7643358d5daa8a78fd5e60c0a4150ace0deae63fbb7f1244338bb1ee32992c6f84ac7c3fc7828d3fbe1c43d741deef19d9c1ff5bdb4cba8a33680e8eda05800ddb06aad6c7314f7ca5", 0x49}, {&(0x7f0000000900)="e55f989e25afa0273198aec29f02b85c0d5af4ac410325d5ea274af8160542076549e821af72fa3931387264f7405409767a0ee38bfbc00506e405a6ef89b0e55dbd03009d28f5d22231d456695ecc72b715133f9bee614c06252f735d8ff44f959590f800fd536e6a25", 0x6a}], 0x3, &(0x7f0000000640)=[@mark={{0x14, 0x1, 0x24, 0x5}}], 0x18}, 0x8000) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000002a80)='\xc4\x00') (async) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001200)={r0, 0x58, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000013c0)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000001400)='io.stat\x00', 0x0, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001240), 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0, 0x85, &(0x7f0000000280), 0x0, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xe0, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000027c0)={r0, 0x58, &(0x7f0000002740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002880)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x8001, '\x00', 0x0, r5, 0x1, 0x4, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002940)={0x6, 0xf, &(0x7f0000002640)=@raw=[@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @generic={0x2, 0xb, 0x6, 0x81, 0x3}, @ldst={0x2, 0x2, 0x2, 0x4, 0xb, 0xc, 0xfffffffffffffffc}], &(0x7f00000026c0)='syzkaller\x00', 0xfffffff8, 0x18, &(0x7f0000002700)=""/24, 0x40f00, 0x40, '\x00', r8, 0x25, r6, 0x8, &(0x7f0000002800)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000002840)={0x0, 0x1, 0x2, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002900)=[0x1, r5, r6, r5, r9, r0], 0x0, 0x10, 0x8000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1, 0xc, &(0x7f0000002a00)=ANY=[@ANYBLOB="180200000400000000000000000000080000000000000000180100002020730657914800002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000018000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0}, 0x94) (async) syz_clone(0x40312200, &(0x7f0000001440)="5b5b60de8abbc7fca394091844e84c72ecda48fd76ea4abde9b1ec433adfd4fd1128f3a753adb8748291e00e06b39952c4eca513cd86d689d5efc3e3d04c95bff2429aa762621826013bf8224469ebe2ab75ff09a81aa08349a610cf225b", 0x5e, &(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)="5bd70f8bb5b73521ec9532bbb7f1dcb064d3d486e9c8159ab4a9c6d2cfef0b5f78248287492a9246907c4440eb043933b36b432d32700ad42a6a5dc6e5247dc33a6b64e834e685cb9a0776c1d99302d7f99a53a11f88d8ac6cc09d5dbaa1d7d9821a8fe8896166bea5d02b85d5c5bd5955551a8532dbb6ecf1213cdfd1d4cc85f11b7d1375d24eeaa43f889a695f9e935a5f24180641db9d50") (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002600)=@o_path={&(0x7f0000001600)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', r5, 0x4000, r6}, 0x18) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_lsm={0x1d, 0x14, &(0x7f0000001000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffa}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x2, 0x3, 0xc, 0x5e5b, 0x2648c2f6}, @jmp={0x5, 0x0, 0xc, 0x3, 0x3, 0x18, 0x4}, @alu={0x7, 0x0, 0x5, 0x2, 0x8, 0x6, 0x10}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000010c0)='syzkaller\x00', 0xc, 0x69, &(0x7f0000001100)=""/105, 0x41000, 0x0, '\x00', r3, 0x1b, r6, 0x8, &(0x7f0000001280)={0x6, 0x5}, 0x8, 0x10, 0x0, 0x0, r7, 0x0, 0x4, 0x0, &(0x7f00000012c0)=[{0x0, 0x4, 0xa, 0xb}, {0x5, 0x1, 0x4, 0xb}, {0x3, 0x5, 0xb, 0x5}, {0x1, 0x2, 0x0, 0x2}], 0x10, 0xb0}, 0x94) 169.497267ms ago: executing program 2 (id=3020): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8971, &(0x7f0000000180)={'syz_tun\x00', @local}) socketpair(0x2b, 0xa, 0x8, &(0x7f0000000000)) 167.211827ms ago: executing program 3 (id=3021): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000880), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf000000}, 0x48) 116.672378ms ago: executing program 4 (id=3022): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072000000"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18100000000000000000000000000000850000000e000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000001b70300000000000085000000710000009500000000000000d1dd67f30970046ad7414eb2aba86d2b8efde73adde9dda6becdb44271e5bb35da17199d4a35b146e0e60d25b79f1443ff9b0421966856e8b06dc809c4a0882771914d3c641cd8f74c4d45c2f43fb3fff18f0961c273ff35f6a12b"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000008000004cd11f82", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702500000000fe1f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') 116.461188ms ago: executing program 3 (id=3023): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x7, 0x0, 0x0, 0xe, 0x1}]}}, 0x0, 0x2a}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r5}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0xd806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 89.749838ms ago: executing program 1 (id=3024): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00'}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r3}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0xd806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 0s ago: executing program 3 (id=3025): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$sock(r1, &(0x7f00000003c0)={&(0x7f0000000300)=@xdp={0x2c, 0x8, r2, 0x9}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000500)="11140c2cd1147d6002b5e645b77273afde43bdd24183906474d3fbb0d56b4ce9513032d0d4600b5086cf9534714d3423e9bb512cc040a17188a9612b164056a76330638d256bde573ba3a2d1237d16f3988d63424350150b7df251a5830731026fbcd431c276968a8fdf70bed7e5a03ffc74fef6df52c1b60a837cc7a0fecab68451e46cdb8d22f21b0dd5a81912580ed8180715f94c4b5c9959120d0cf90d7c3c9ff64e018a5e8a1a84e5ed1a1ba9cf123bf77f113a27962a47058653d718aa21053a1d9705b83628c7bcbdfbd61571a7c4a50a93d2dfcaf224b98c72c737e3047ae3070f85", 0xe6}], 0x1, &(0x7f0000000600)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x59}}, @mark={{0x14, 0x1, 0x24, 0xffffff76}}], 0x48}, 0x800) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="010000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r8, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r9}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, r6, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r0}, &(0x7f0000000400), &(0x7f0000000440)=r12}, 0x20) syz_clone(0x400a1400, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): 59.461749][ T1999] dump_stack_lvl+0xee/0x150 [ 59.466334][ T1999] ? __cfi_dump_stack_lvl+0x8/0x8 [ 59.471445][ T1999] dump_stack+0x15/0x24 [ 59.475858][ T1999] should_fail_ex+0x3d4/0x520 [ 59.480539][ T1999] __should_failslab+0xac/0xf0 [ 59.485313][ T1999] ? selinux_perf_event_alloc+0x51/0x140 [ 59.490947][ T1999] should_failslab+0x9/0x20 [ 59.495535][ T1999] __kmem_cache_alloc_node+0x3d/0x2c0 [ 59.500910][ T1999] ? hrtimer_init+0x10c/0x330 [ 59.505587][ T1999] ? selinux_perf_event_alloc+0x51/0x140 [ 59.511878][ T1999] kmalloc_trace+0x29/0xb0 [ 59.516297][ T1999] selinux_perf_event_alloc+0x51/0x140 [ 59.521843][ T1999] security_perf_event_alloc+0x73/0xa0 [ 59.527303][ T1999] perf_event_alloc+0x1762/0x1970 [ 59.532509][ T1999] __se_sys_perf_event_open+0x6c5/0x1b80 [ 59.538407][ T1999] ? __kasan_check_write+0x14/0x20 [ 59.543779][ T1999] ? mutex_unlock+0x89/0x220 [ 59.548382][ T1999] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 59.554120][ T1999] ? debug_smp_processor_id+0x17/0x20 [ 59.559718][ T1999] ? perf_trace_sys_enter+0x30/0x150 [ 59.565086][ T1999] __x64_sys_perf_event_open+0xbf/0xd0 [ 59.570630][ T1999] x64_sys_call+0x385/0x9a0 [ 59.575222][ T1999] do_syscall_64+0x4c/0xa0 [ 59.579694][ T1999] ? clear_bhb_loop+0x30/0x80 [ 59.584367][ T1999] ? clear_bhb_loop+0x30/0x80 [ 59.589213][ T1999] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 59.595103][ T1999] RIP: 0033:0x7fc42958eba9 [ 59.599607][ T1999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.619387][ T1999] RSP: 002b:00007fc42a4d2038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 59.628065][ T1999] RAX: ffffffffffffffda RBX: 00007fc4297d5fa0 RCX: 00007fc42958eba9 [ 59.636230][ T1999] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 59.644458][ T1999] RBP: 00007fc42a4d2090 R08: 0000000000000000 R09: 0000000000000000 [ 59.652966][ T1999] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 59.661110][ T1999] R13: 00007fc4297d6038 R14: 00007fc4297d5fa0 R15: 00007ffc97e4b7e8 [ 59.669615][ T1999] [ 59.931492][ T2017] device pim6reg1 entered promiscuous mode [ 59.977767][ T28] audit: type=1400 audit(1757704252.140:130): avc: denied { ioctl } for pid=2021 comm="syz.2.616" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 60.033006][ T2024] FAULT_INJECTION: forcing a failure. [ 60.033006][ T2024] name failslab, interval 1, probability 0, space 0, times 0 [ 60.082269][ T2024] CPU: 1 PID: 2024 Comm: syz.2.617 Not tainted syzkaller #0 [ 60.089608][ T2024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 60.099769][ T2024] Call Trace: [ 60.103061][ T2024] [ 60.106000][ T2024] __dump_stack+0x21/0x24 [ 60.110599][ T2024] dump_stack_lvl+0xee/0x150 [ 60.115287][ T2024] ? __cfi_dump_stack_lvl+0x8/0x8 [ 60.120398][ T2024] dump_stack+0x15/0x24 [ 60.124564][ T2024] should_fail_ex+0x3d4/0x520 [ 60.129351][ T2024] ? __alloc_file+0x28/0x2a0 [ 60.134046][ T2024] __should_failslab+0xac/0xf0 [ 60.138826][ T2024] should_failslab+0x9/0x20 [ 60.143347][ T2024] kmem_cache_alloc+0x3b/0x330 [ 60.148138][ T2024] ? __cfi__raw_spin_lock+0x10/0x10 [ 60.153542][ T2024] __alloc_file+0x28/0x2a0 [ 60.158054][ T2024] alloc_empty_file+0x97/0x180 [ 60.162922][ T2024] alloc_file+0x59/0x640 [ 60.167167][ T2024] alloc_file_pseudo+0x17a/0x1f0 [ 60.172131][ T2024] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 60.177642][ T2024] sock_alloc_file+0xba/0x270 [ 60.182407][ T2024] __sys_socketpair+0x2d5/0x5b0 [ 60.187271][ T2024] __x64_sys_socketpair+0x9b/0xb0 [ 60.192553][ T2024] x64_sys_call+0x6e/0x9a0 [ 60.197154][ T2024] do_syscall_64+0x4c/0xa0 [ 60.201650][ T2024] ? clear_bhb_loop+0x30/0x80 [ 60.206335][ T2024] ? clear_bhb_loop+0x30/0x80 [ 60.211101][ T2024] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 60.217086][ T2024] RIP: 0033:0x7fc42958eba9 [ 60.221601][ T2024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.241472][ T2024] RSP: 002b:00007fc42a4d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 60.249985][ T2024] RAX: ffffffffffffffda RBX: 00007fc4297d5fa0 RCX: 00007fc42958eba9 [ 60.258065][ T2024] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 60.266316][ T2024] RBP: 00007fc42a4d2090 R08: 0000000000000000 R09: 0000000000000000 [ 60.274469][ T2024] R10: 0000200000000680 R11: 0000000000000246 R12: 0000000000000002 [ 60.282454][ T2024] R13: 00007fc4297d6038 R14: 00007fc4297d5fa0 R15: 00007ffc97e4b7e8 [ 60.290433][ T2024] [ 60.361848][ T2028] FAULT_INJECTION: forcing a failure. [ 60.361848][ T2028] name failslab, interval 1, probability 0, space 0, times 0 [ 60.374805][ T2028] CPU: 0 PID: 2028 Comm: syz.0.619 Not tainted syzkaller #0 [ 60.382119][ T2028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 60.392276][ T2028] Call Trace: [ 60.395673][ T2028] [ 60.398692][ T2028] __dump_stack+0x21/0x24 [ 60.403111][ T2028] dump_stack_lvl+0xee/0x150 [ 60.407720][ T2028] ? __cfi_dump_stack_lvl+0x8/0x8 [ 60.412851][ T2028] ? copy_from_kernel_nofault_allowed+0x49/0x130 [ 60.419197][ T2028] dump_stack+0x15/0x24 [ 60.423357][ T2028] should_fail_ex+0x3d4/0x520 [ 60.428477][ T2028] __should_failslab+0xac/0xf0 [ 60.433242][ T2028] should_failslab+0x9/0x20 [ 60.437856][ T2028] kmem_cache_alloc_node+0x42/0x340 [ 60.443061][ T2028] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 60.448611][ T2028] ? __alloc_skb+0xea/0x4b0 [ 60.453206][ T2028] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 60.459114][ T2028] __alloc_skb+0xea/0x4b0 [ 60.463468][ T2028] fdb_notify+0x78/0x130 [ 60.467857][ T2028] fdb_delete+0x8b9/0xb20 [ 60.472200][ T2028] fdb_delete_local+0x3c8/0x480 [ 60.477078][ T2028] br_fdb_changeaddr+0x1b3/0x1c0 [ 60.482206][ T2028] br_device_event+0x33c/0x770 [ 60.486976][ T2028] ? __cfi_br_device_event+0x10/0x10 [ 60.492265][ T2028] ? packet_notifier+0x8cf/0x8e0 [ 60.497293][ T2028] ? ip6mr_device_event+0x1e0/0x200 [ 60.502504][ T2028] raw_notifier_call_chain+0xa1/0x110 [ 60.507886][ T2028] dev_set_mac_address+0x329/0x430 [ 60.513021][ T2028] ? __cfi_dev_set_mac_address+0x10/0x10 [ 60.518654][ T2028] dev_set_mac_address_user+0x31/0x50 [ 60.524199][ T2028] dev_ifsioc+0x770/0xed0 [ 60.528703][ T2028] ? dev_ioctl+0xd10/0xd10 [ 60.533123][ T2028] ? __kasan_check_write+0x14/0x20 [ 60.538240][ T2028] ? mutex_lock+0x8d/0x1a0 [ 60.542921][ T2028] ? __cfi_mutex_lock+0x10/0x10 [ 60.547858][ T2028] ? dev_get_by_name_rcu+0xe5/0x130 [ 60.553243][ T2028] dev_ioctl+0x556/0xd10 [ 60.558125][ T2028] sock_do_ioctl+0x23f/0x310 [ 60.562808][ T2028] ? sock_show_fdinfo+0xb0/0xb0 [ 60.567661][ T2028] ? selinux_file_ioctl+0x377/0x480 [ 60.572865][ T2028] sock_ioctl+0x4d8/0x6e0 [ 60.577375][ T2028] ? __cfi_sock_ioctl+0x10/0x10 [ 60.582221][ T2028] ? __fget_files+0x2d5/0x330 [ 60.586900][ T2028] ? security_file_ioctl+0x95/0xc0 [ 60.592217][ T2028] ? __cfi_sock_ioctl+0x10/0x10 [ 60.597167][ T2028] __se_sys_ioctl+0x12f/0x1b0 [ 60.601843][ T2028] __x64_sys_ioctl+0x7b/0x90 [ 60.606430][ T2028] x64_sys_call+0x58b/0x9a0 [ 60.610946][ T2028] do_syscall_64+0x4c/0xa0 [ 60.615384][ T2028] ? clear_bhb_loop+0x30/0x80 [ 60.620158][ T2028] ? clear_bhb_loop+0x30/0x80 [ 60.624841][ T2028] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 60.630739][ T2028] RIP: 0033:0x7f248818eba9 [ 60.635242][ T2028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.655020][ T2028] RSP: 002b:00007f2488f86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 60.663452][ T2028] RAX: ffffffffffffffda RBX: 00007f24883d5fa0 RCX: 00007f248818eba9 [ 60.671422][ T2028] RDX: 00002000000001c0 RSI: 0000000000008924 RDI: 000000000000000b [ 60.679481][ T2028] RBP: 00007f2488f86090 R08: 0000000000000000 R09: 0000000000000000 [ 60.687637][ T2028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 60.695768][ T2028] R13: 00007f24883d6038 R14: 00007f24883d5fa0 R15: 00007ffed21be8e8 [ 60.703747][ T2028] [ 61.253927][ T2050] syz.3.627[2050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.254023][ T2050] syz.3.627[2050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.966707][ T2089] FAULT_INJECTION: forcing a failure. [ 61.966707][ T2089] name failslab, interval 1, probability 0, space 0, times 0 [ 62.031474][ T2089] CPU: 0 PID: 2089 Comm: syz.2.639 Not tainted syzkaller #0 [ 62.039165][ T2089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 62.049331][ T2089] Call Trace: [ 62.052632][ T2089] [ 62.055589][ T2089] __dump_stack+0x21/0x24 [ 62.060022][ T2089] dump_stack_lvl+0xee/0x150 [ 62.064626][ T2089] ? __cfi_dump_stack_lvl+0x8/0x8 [ 62.069683][ T2089] dump_stack+0x15/0x24 [ 62.073950][ T2089] should_fail_ex+0x3d4/0x520 [ 62.078753][ T2089] __should_failslab+0xac/0xf0 [ 62.083543][ T2089] ? alloc_perf_context+0x59/0x2e0 [ 62.088697][ T2089] should_failslab+0x9/0x20 [ 62.093407][ T2089] __kmem_cache_alloc_node+0x3d/0x2c0 [ 62.098819][ T2089] ? alloc_perf_context+0x59/0x2e0 [ 62.103978][ T2089] kmalloc_trace+0x29/0xb0 [ 62.108436][ T2089] alloc_perf_context+0x59/0x2e0 [ 62.113406][ T2089] find_get_context+0x34c/0x9e0 [ 62.118381][ T2089] __se_sys_perf_event_open+0x8c3/0x1b80 [ 62.124078][ T2089] ? __kasan_check_write+0x14/0x20 [ 62.129314][ T2089] ? mutex_unlock+0x89/0x220 [ 62.133943][ T2089] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 62.139884][ T2089] ? __cfi_ksys_write+0x10/0x10 [ 62.144777][ T2089] __x64_sys_perf_event_open+0xbf/0xd0 [ 62.150357][ T2089] x64_sys_call+0x385/0x9a0 [ 62.154994][ T2089] do_syscall_64+0x4c/0xa0 [ 62.159445][ T2089] ? clear_bhb_loop+0x30/0x80 [ 62.164163][ T2089] ? clear_bhb_loop+0x30/0x80 [ 62.169043][ T2089] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 62.175052][ T2089] RIP: 0033:0x7fc42958eba9 [ 62.179496][ T2089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.199741][ T2089] RSP: 002b:00007fc42a4d2038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 62.208541][ T2089] RAX: ffffffffffffffda RBX: 00007fc4297d5fa0 RCX: 00007fc42958eba9 [ 62.216547][ T2089] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 62.224876][ T2089] RBP: 00007fc42a4d2090 R08: 0000000000000000 R09: 0000000000000000 [ 62.232962][ T2089] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 62.241052][ T2089] R13: 00007fc4297d6038 R14: 00007fc4297d5fa0 R15: 00007ffc97e4b7e8 [ 62.249152][ T2089] [ 62.329555][ T2098] device pim6reg1 entered promiscuous mode [ 62.464772][ T2114] bond_slave_1: mtu less than device minimum [ 62.720175][ T2144] device pim6reg1 entered promiscuous mode [ 62.772956][ T2145] device lo entered promiscuous mode [ 62.843663][ T2154] bond_slave_1: mtu less than device minimum [ 63.904480][ T2181] device sit0 left promiscuous mode [ 64.105914][ T2191] device pim6reg1 entered promiscuous mode [ 64.315824][ T2195] bond_slave_1: mtu less than device minimum [ 64.329019][ T2198] bond_slave_1: mtu less than device minimum [ 64.395399][ T28] audit: type=1400 audit(1757704256.560:131): avc: denied { create } for pid=2210 comm="syz.4.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 64.979780][ T2231] FAULT_INJECTION: forcing a failure. [ 64.979780][ T2231] name failslab, interval 1, probability 0, space 0, times 0 [ 65.083630][ T2231] CPU: 1 PID: 2231 Comm: syz.3.691 Not tainted syzkaller #0 [ 65.091025][ T2231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 65.101187][ T2231] Call Trace: [ 65.104477][ T2231] [ 65.107509][ T2231] __dump_stack+0x21/0x24 [ 65.112048][ T2231] dump_stack_lvl+0xee/0x150 [ 65.116847][ T2231] ? __cfi_dump_stack_lvl+0x8/0x8 [ 65.122030][ T2231] dump_stack+0x15/0x24 [ 65.126232][ T2231] should_fail_ex+0x3d4/0x520 [ 65.131541][ T2231] ? __alloc_file+0x28/0x2a0 [ 65.136326][ T2231] __should_failslab+0xac/0xf0 [ 65.141193][ T2231] should_failslab+0x9/0x20 [ 65.145789][ T2231] kmem_cache_alloc+0x3b/0x330 [ 65.150566][ T2231] ? __cfi__raw_spin_lock+0x10/0x10 [ 65.155968][ T2231] __alloc_file+0x28/0x2a0 [ 65.160409][ T2231] alloc_empty_file+0x97/0x180 [ 65.165279][ T2231] alloc_file+0x59/0x640 [ 65.169696][ T2231] alloc_file_pseudo+0x17a/0x1f0 [ 65.174731][ T2231] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 65.180209][ T2231] sock_alloc_file+0xba/0x270 [ 65.184920][ T2231] __sys_socketpair+0x3a9/0x5b0 [ 65.189883][ T2231] __x64_sys_socketpair+0x9b/0xb0 [ 65.195127][ T2231] x64_sys_call+0x6e/0x9a0 [ 65.199739][ T2231] do_syscall_64+0x4c/0xa0 [ 65.204163][ T2231] ? clear_bhb_loop+0x30/0x80 [ 65.208865][ T2231] ? clear_bhb_loop+0x30/0x80 [ 65.213584][ T2231] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 65.219504][ T2231] RIP: 0033:0x7fa8d458eba9 [ 65.224040][ T2231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.243961][ T2231] RSP: 002b:00007fa8d5504038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 65.252665][ T2231] RAX: ffffffffffffffda RBX: 00007fa8d47d5fa0 RCX: 00007fa8d458eba9 [ 65.260831][ T2231] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 65.268827][ T2231] RBP: 00007fa8d5504090 R08: 0000000000000000 R09: 0000000000000000 [ 65.272010][ T2229] device syzkaller0 entered promiscuous mode [ 65.276998][ T2231] R10: 0000200000000680 R11: 0000000000000246 R12: 0000000000000002 [ 65.277014][ T2231] R13: 00007fa8d47d6038 R14: 00007fa8d47d5fa0 R15: 00007ffd5aa64228 [ 65.277033][ T2231] [ 65.445079][ T2237] bond_slave_1: mtu less than device minimum [ 65.452196][ T2236] device pim6reg1 entered promiscuous mode [ 65.624118][ T2250] FAULT_INJECTION: forcing a failure. [ 65.624118][ T2250] name failslab, interval 1, probability 0, space 0, times 0 [ 65.686572][ T2250] CPU: 1 PID: 2250 Comm: syz.3.698 Not tainted syzkaller #0 [ 65.694095][ T2250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 65.704253][ T2250] Call Trace: [ 65.707562][ T2250] [ 65.710508][ T2250] __dump_stack+0x21/0x24 [ 65.714858][ T2250] dump_stack_lvl+0xee/0x150 [ 65.719606][ T2250] ? __cfi_dump_stack_lvl+0x8/0x8 [ 65.724650][ T2250] dump_stack+0x15/0x24 [ 65.728816][ T2250] should_fail_ex+0x3d4/0x520 [ 65.733690][ T2250] ? security_inode_alloc+0x33/0x120 [ 65.739080][ T2250] __should_failslab+0xac/0xf0 [ 65.744119][ T2250] should_failslab+0x9/0x20 [ 65.748628][ T2250] kmem_cache_alloc+0x3b/0x330 [ 65.753405][ T2250] ? slab_pre_alloc_hook+0x30/0x1e0 [ 65.758610][ T2250] security_inode_alloc+0x33/0x120 [ 65.763988][ T2250] inode_init_always+0x6fc/0x960 [ 65.769036][ T2250] new_inode_pseudo+0xa2/0x1f0 [ 65.773809][ T2250] __sock_create+0x12c/0x7c0 [ 65.778494][ T2250] __sys_socketpair+0x218/0x5b0 [ 65.783355][ T2250] __x64_sys_socketpair+0x9b/0xb0 [ 65.788551][ T2250] x64_sys_call+0x6e/0x9a0 [ 65.792971][ T2250] do_syscall_64+0x4c/0xa0 [ 65.797390][ T2250] ? clear_bhb_loop+0x30/0x80 [ 65.802080][ T2250] ? clear_bhb_loop+0x30/0x80 [ 65.806857][ T2250] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 65.812940][ T2250] RIP: 0033:0x7fa8d458eba9 [ 65.817352][ T2250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.837307][ T2250] RSP: 002b:00007fa8d5504038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 65.846160][ T2250] RAX: ffffffffffffffda RBX: 00007fa8d47d5fa0 RCX: 00007fa8d458eba9 [ 65.854396][ T2250] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 65.862534][ T2250] RBP: 00007fa8d5504090 R08: 0000000000000000 R09: 0000000000000000 [ 65.870675][ T2250] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 65.878813][ T2250] R13: 00007fa8d47d6038 R14: 00007fa8d47d5fa0 R15: 00007ffd5aa64228 [ 65.887060][ T2250] [ 65.907438][ T2250] socket: no more sockets [ 66.281026][ T2272] bond_slave_1: mtu less than device minimum [ 66.563915][ T2284] bridge0: port 3(veth0) entered blocking state [ 66.570346][ T2284] bridge0: port 3(veth0) entered disabled state [ 66.593429][ T2284] device veth0 entered promiscuous mode [ 66.613041][ T2284] bridge0: port 3(veth0) entered blocking state [ 66.619353][ T2284] bridge0: port 3(veth0) entered forwarding state [ 66.632350][ T2283] device pim6reg1 entered promiscuous mode [ 67.299686][ T2313] bond_slave_1: mtu less than device minimum [ 67.647542][ T2330] FAULT_INJECTION: forcing a failure. [ 67.647542][ T2330] name failslab, interval 1, probability 0, space 0, times 0 [ 67.691741][ T2330] CPU: 0 PID: 2330 Comm: syz.3.723 Not tainted syzkaller #0 [ 67.699083][ T2330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 67.709321][ T2330] Call Trace: [ 67.712601][ T2330] [ 67.715530][ T2330] __dump_stack+0x21/0x24 [ 67.719874][ T2330] dump_stack_lvl+0xee/0x150 [ 67.724647][ T2330] ? __cfi_dump_stack_lvl+0x8/0x8 [ 67.729809][ T2330] dump_stack+0x15/0x24 [ 67.734054][ T2330] should_fail_ex+0x3d4/0x520 [ 67.739006][ T2330] ? security_file_alloc+0x33/0x130 [ 67.744203][ T2330] __should_failslab+0xac/0xf0 [ 67.748971][ T2330] should_failslab+0x9/0x20 [ 67.753516][ T2330] kmem_cache_alloc+0x3b/0x330 [ 67.758544][ T2330] ? __alloc_file+0x28/0x2a0 [ 67.763144][ T2330] security_file_alloc+0x33/0x130 [ 67.768173][ T2330] __alloc_file+0xb5/0x2a0 [ 67.773027][ T2330] alloc_empty_file+0x97/0x180 [ 67.777964][ T2330] alloc_file+0x59/0x640 [ 67.782204][ T2330] alloc_file_pseudo+0x17a/0x1f0 [ 67.787147][ T2330] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 67.792606][ T2330] ? alloc_perf_context+0x222/0x2e0 [ 67.798340][ T2330] anon_inode_getfile+0xa6/0x180 [ 67.803393][ T2330] __se_sys_perf_event_open+0xbd2/0x1b80 [ 67.809133][ T2330] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 67.814777][ T2330] ? __cfi_ksys_write+0x10/0x10 [ 67.819912][ T2330] __x64_sys_perf_event_open+0xbf/0xd0 [ 67.825472][ T2330] x64_sys_call+0x385/0x9a0 [ 67.830003][ T2330] do_syscall_64+0x4c/0xa0 [ 67.834422][ T2330] ? clear_bhb_loop+0x30/0x80 [ 67.839105][ T2330] ? clear_bhb_loop+0x30/0x80 [ 67.843957][ T2330] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 67.849854][ T2330] RIP: 0033:0x7fa8d458eba9 [ 67.854355][ T2330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.874220][ T2330] RSP: 002b:00007fa8d5504038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 67.883003][ T2330] RAX: ffffffffffffffda RBX: 00007fa8d47d5fa0 RCX: 00007fa8d458eba9 [ 67.891415][ T2330] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000200000000180 [ 67.899430][ T2330] RBP: 00007fa8d5504090 R08: 0000000000000000 R09: 0000000000000000 [ 67.907596][ T2330] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 67.915847][ T2330] R13: 00007fa8d47d6038 R14: 00007fa8d47d5fa0 R15: 00007ffd5aa64228 [ 67.924122][ T2330] [ 68.194203][ T2337] device pim6reg1 entered promiscuous mode [ 68.415405][ T2341] FAULT_INJECTION: forcing a failure. [ 68.415405][ T2341] name failslab, interval 1, probability 0, space 0, times 0 [ 68.438332][ T2341] CPU: 1 PID: 2341 Comm: syz.1.728 Not tainted syzkaller #0 [ 68.445676][ T2341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 68.455789][ T2341] Call Trace: [ 68.459095][ T2341] [ 68.462050][ T2341] __dump_stack+0x21/0x24 [ 68.466407][ T2341] dump_stack_lvl+0xee/0x150 [ 68.471190][ T2341] ? __cfi_dump_stack_lvl+0x8/0x8 [ 68.476363][ T2341] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 68.482108][ T2341] dump_stack+0x15/0x24 [ 68.486287][ T2341] should_fail_ex+0x3d4/0x520 [ 68.491071][ T2341] __should_failslab+0xac/0xf0 [ 68.495876][ T2341] ? sk_prot_alloc+0xed/0x320 [ 68.500565][ T2341] should_failslab+0x9/0x20 [ 68.505174][ T2341] __kmem_cache_alloc_node+0x3d/0x2c0 [ 68.510560][ T2341] ? sk_prot_alloc+0xed/0x320 [ 68.515247][ T2341] __kmalloc+0xa1/0x1e0 [ 68.519408][ T2341] sk_prot_alloc+0xed/0x320 [ 68.524015][ T2341] sk_alloc+0x3b/0x460 [ 68.528164][ T2341] pfkey_create+0x12a/0x660 [ 68.532768][ T2341] __sock_create+0x39e/0x7c0 [ 68.537547][ T2341] __sys_socketpair+0x218/0x5b0 [ 68.542403][ T2341] __x64_sys_socketpair+0x9b/0xb0 [ 68.547428][ T2341] x64_sys_call+0x6e/0x9a0 [ 68.551844][ T2341] do_syscall_64+0x4c/0xa0 [ 68.556256][ T2341] ? clear_bhb_loop+0x30/0x80 [ 68.560935][ T2341] ? clear_bhb_loop+0x30/0x80 [ 68.565788][ T2341] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 68.571683][ T2341] RIP: 0033:0x7fd62b98eba9 [ 68.576102][ T2341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.595968][ T2341] RSP: 002b:00007fd62a3f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 68.604391][ T2341] RAX: ffffffffffffffda RBX: 00007fd62bbd5fa0 RCX: 00007fd62b98eba9 [ 68.612475][ T2341] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 68.620455][ T2341] RBP: 00007fd62a3f7090 R08: 0000000000000000 R09: 0000000000000000 [ 68.628425][ T2341] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 68.636504][ T2341] R13: 00007fd62bbd6038 R14: 00007fd62bbd5fa0 R15: 00007ffeb48e7ac8 [ 68.644563][ T2341] [ 68.648924][ T2344] bond_slave_1: mtu less than device minimum [ 68.794534][ T2353] syz.3.732[2353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.794664][ T2353] syz.3.732[2353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.264658][ T2375] device pim6reg1 entered promiscuous mode [ 69.461939][ T2378] bond_slave_1: mtu less than device minimum [ 70.044442][ T2407] FAULT_INJECTION: forcing a failure. [ 70.044442][ T2407] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 70.058242][ T2407] CPU: 0 PID: 2407 Comm: syz.3.751 Not tainted syzkaller #0 [ 70.065649][ T2407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 70.075905][ T2407] Call Trace: [ 70.079200][ T2407] [ 70.082133][ T2407] __dump_stack+0x21/0x24 [ 70.086471][ T2407] dump_stack_lvl+0xee/0x150 [ 70.091160][ T2407] ? __cfi_dump_stack_lvl+0x8/0x8 [ 70.096285][ T2407] dump_stack+0x15/0x24 [ 70.100541][ T2407] should_fail_ex+0x3d4/0x520 [ 70.105283][ T2407] should_fail+0xb/0x10 [ 70.109552][ T2407] should_fail_usercopy+0x1a/0x20 [ 70.114618][ T2407] _copy_to_user+0x1e/0x90 [ 70.119152][ T2407] simple_read_from_buffer+0xe9/0x160 [ 70.124640][ T2407] proc_fail_nth_read+0x19a/0x210 [ 70.129796][ T2407] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 70.135366][ T2407] ? security_file_permission+0x94/0xb0 [ 70.140926][ T2407] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 70.146585][ T2407] vfs_read+0x26e/0x8c0 [ 70.150840][ T2407] ? __cfi_vfs_read+0x10/0x10 [ 70.155519][ T2407] ? __kasan_check_write+0x14/0x20 [ 70.160835][ T2407] ? mutex_lock+0x8d/0x1a0 [ 70.165253][ T2407] ? __cfi_mutex_lock+0x10/0x10 [ 70.170107][ T2407] ? __fdget_pos+0x2cd/0x380 [ 70.174693][ T2407] ? ksys_read+0x71/0x240 [ 70.179029][ T2407] ksys_read+0x140/0x240 [ 70.183270][ T2407] ? __cfi_ksys_read+0x10/0x10 [ 70.188035][ T2407] ? __bpf_trace_sys_enter+0x62/0x70 [ 70.193320][ T2407] __x64_sys_read+0x7b/0x90 [ 70.197899][ T2407] x64_sys_call+0x2f/0x9a0 [ 70.202441][ T2407] do_syscall_64+0x4c/0xa0 [ 70.206959][ T2407] ? clear_bhb_loop+0x30/0x80 [ 70.211640][ T2407] ? clear_bhb_loop+0x30/0x80 [ 70.216319][ T2407] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 70.222297][ T2407] RIP: 0033:0x7fa8d458d5bc [ 70.226708][ T2407] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 70.246402][ T2407] RSP: 002b:00007fa8d5504030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 70.254827][ T2407] RAX: ffffffffffffffda RBX: 00007fa8d47d5fa0 RCX: 00007fa8d458d5bc [ 70.262981][ T2407] RDX: 000000000000000f RSI: 00007fa8d55040a0 RDI: 0000000000000006 [ 70.271322][ T2407] RBP: 00007fa8d5504090 R08: 0000000000000000 R09: 0000000000000000 [ 70.279470][ T2407] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 70.287441][ T2407] R13: 00007fa8d47d6038 R14: 00007fa8d47d5fa0 R15: 00007ffd5aa64228 [ 70.295525][ T2407] [ 70.414560][ T2410] device pim6reg1 entered promiscuous mode [ 70.661716][ T2412] bond_slave_1: mtu less than device minimum [ 70.883095][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.982319][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.093209][ T2439] FAULT_INJECTION: forcing a failure. [ 71.093209][ T2439] name failslab, interval 1, probability 0, space 0, times 0 [ 71.142195][ T2439] CPU: 1 PID: 2439 Comm: syz.2.761 Not tainted syzkaller #0 [ 71.149637][ T2439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 71.159992][ T2439] Call Trace: [ 71.163289][ T2439] [ 71.166354][ T2439] __dump_stack+0x21/0x24 [ 71.170767][ T2439] dump_stack_lvl+0xee/0x150 [ 71.175460][ T2439] ? __cfi_dump_stack_lvl+0x8/0x8 [ 71.180506][ T2439] dump_stack+0x15/0x24 [ 71.184852][ T2439] should_fail_ex+0x3d4/0x520 [ 71.189544][ T2439] __should_failslab+0xac/0xf0 [ 71.194310][ T2439] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 71.200204][ T2439] should_failslab+0x9/0x20 [ 71.204796][ T2439] __kmem_cache_alloc_node+0x3d/0x2c0 [ 71.210185][ T2439] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 71.216184][ T2439] kmalloc_trace+0x29/0xb0 [ 71.220734][ T2439] selinux_sk_alloc_security+0x7e/0x1a0 [ 71.226376][ T2439] security_sk_alloc+0x83/0xb0 [ 71.231316][ T2439] sk_prot_alloc+0x108/0x320 [ 71.236004][ T2439] sk_alloc+0x3b/0x460 [ 71.240067][ T2439] pfkey_create+0x12a/0x660 [ 71.244746][ T2439] __sock_create+0x39e/0x7c0 [ 71.249346][ T2439] __sys_socketpair+0x218/0x5b0 [ 71.254295][ T2439] __x64_sys_socketpair+0x9b/0xb0 [ 71.259435][ T2439] x64_sys_call+0x6e/0x9a0 [ 71.263939][ T2439] do_syscall_64+0x4c/0xa0 [ 71.268529][ T2439] ? clear_bhb_loop+0x30/0x80 [ 71.273210][ T2439] ? clear_bhb_loop+0x30/0x80 [ 71.277973][ T2439] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 71.284124][ T2439] RIP: 0033:0x7fc42958eba9 [ 71.288682][ T2439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 71.308553][ T2439] RSP: 002b:00007fc42a4d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 71.317064][ T2439] RAX: ffffffffffffffda RBX: 00007fc4297d5fa0 RCX: 00007fc42958eba9 [ 71.325032][ T2439] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 71.333090][ T2439] RBP: 00007fc42a4d2090 R08: 0000000000000000 R09: 0000000000000000 [ 71.341065][ T2439] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 71.349210][ T2439] R13: 00007fc4297d6038 R14: 00007fc4297d5fa0 R15: 00007ffc97e4b7e8 [ 71.357373][ T2439] [ 71.442727][ T2446] sock: sock_timestamping_bind_phc: sock not bind to device [ 71.816335][ T2454] device pim6reg1 entered promiscuous mode [ 71.857096][ T2456] bond_slave_1: mtu less than device minimum [ 71.983039][ T2460] FAULT_INJECTION: forcing a failure. [ 71.983039][ T2460] name failslab, interval 1, probability 0, space 0, times 0 [ 72.052352][ T2460] CPU: 0 PID: 2460 Comm: syz.2.768 Not tainted syzkaller #0 [ 72.059880][ T2460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 72.070059][ T2460] Call Trace: [ 72.073361][ T2460] [ 72.076329][ T2460] __dump_stack+0x21/0x24 [ 72.080953][ T2460] dump_stack_lvl+0xee/0x150 [ 72.085589][ T2460] ? __cfi_dump_stack_lvl+0x8/0x8 [ 72.090639][ T2460] ? __kasan_check_read+0x11/0x20 [ 72.095768][ T2460] dump_stack+0x15/0x24 [ 72.099953][ T2460] should_fail_ex+0x3d4/0x520 [ 72.104669][ T2460] __should_failslab+0xac/0xf0 [ 72.109642][ T2460] should_failslab+0x9/0x20 [ 72.114255][ T2460] kmem_cache_alloc_node+0x42/0x340 [ 72.119481][ T2460] ? __alloc_skb+0xea/0x4b0 [ 72.124022][ T2460] __alloc_skb+0xea/0x4b0 [ 72.128469][ T2460] ? __cfi_br_handle_frame+0x10/0x10 [ 72.133975][ T2460] br_info_notify+0xae/0x170 [ 72.138600][ T2460] br_ifinfo_notify+0x2a/0x40 [ 72.143587][ T2460] br_device_event+0x6b6/0x770 [ 72.148383][ T2460] ? __cfi_br_device_event+0x10/0x10 [ 72.153718][ T2460] ? packet_notifier+0x8cf/0x8e0 [ 72.158688][ T2460] ? ip6mr_device_event+0x1e0/0x200 [ 72.164009][ T2460] raw_notifier_call_chain+0xa1/0x110 [ 72.169499][ T2460] dev_set_mac_address+0x329/0x430 [ 72.174708][ T2460] ? __cfi_dev_set_mac_address+0x10/0x10 [ 72.180375][ T2460] dev_set_mac_address_user+0x31/0x50 [ 72.185774][ T2460] dev_ifsioc+0x770/0xed0 [ 72.190145][ T2460] ? dev_ioctl+0xd10/0xd10 [ 72.194587][ T2460] ? __kasan_check_write+0x14/0x20 [ 72.199822][ T2460] ? mutex_lock+0x8d/0x1a0 [ 72.204264][ T2460] ? __cfi_mutex_lock+0x10/0x10 [ 72.209231][ T2460] ? dev_get_by_name_rcu+0xe5/0x130 [ 72.214469][ T2460] dev_ioctl+0x556/0xd10 [ 72.218773][ T2460] sock_do_ioctl+0x23f/0x310 [ 72.223403][ T2460] ? sock_show_fdinfo+0xb0/0xb0 [ 72.228366][ T2460] ? selinux_file_ioctl+0x377/0x480 [ 72.233759][ T2460] sock_ioctl+0x4d8/0x6e0 [ 72.238201][ T2460] ? __cfi_sock_ioctl+0x10/0x10 [ 72.243161][ T2460] ? __fget_files+0x2d5/0x330 [ 72.247966][ T2460] ? security_file_ioctl+0x95/0xc0 [ 72.253116][ T2460] ? __cfi_sock_ioctl+0x10/0x10 [ 72.258170][ T2460] __se_sys_ioctl+0x12f/0x1b0 [ 72.262878][ T2460] __x64_sys_ioctl+0x7b/0x90 [ 72.267479][ T2460] x64_sys_call+0x58b/0x9a0 [ 72.271991][ T2460] do_syscall_64+0x4c/0xa0 [ 72.276408][ T2460] ? clear_bhb_loop+0x30/0x80 [ 72.281350][ T2460] ? clear_bhb_loop+0x30/0x80 [ 72.286296][ T2460] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 72.292275][ T2460] RIP: 0033:0x7fc42958eba9 [ 72.296688][ T2460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 72.316498][ T2460] RSP: 002b:00007fc42a4d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 72.324999][ T2460] RAX: ffffffffffffffda RBX: 00007fc4297d5fa0 RCX: 00007fc42958eba9 [ 72.332967][ T2460] RDX: 00002000000001c0 RSI: 0000000000008924 RDI: 000000000000000b [ 72.341283][ T2460] RBP: 00007fc42a4d2090 R08: 0000000000000000 R09: 0000000000000000 [ 72.349442][ T2460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 72.357670][ T2460] R13: 00007fc4297d6038 R14: 00007fc4297d5fa0 R15: 00007ffc97e4b7e8 [ 72.365832][ T2460] [ 72.959559][ T2489] bond_slave_1: mtu less than device minimum [ 73.014167][ T2485] device pim6reg1 entered promiscuous mode [ 73.102952][ T2494] device pim6reg1 entered promiscuous mode [ 73.133416][ T2501] bond_slave_1: mtu less than device minimum [ 73.240385][ T2507] device pim6reg1 entered promiscuous mode [ 73.449337][ T2517] FAULT_INJECTION: forcing a failure. [ 73.449337][ T2517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.539173][ T2517] CPU: 0 PID: 2517 Comm: syz.3.787 Not tainted syzkaller #0 [ 73.546705][ T2517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 73.556956][ T2517] Call Trace: [ 73.560561][ T2517] [ 73.563526][ T2517] __dump_stack+0x21/0x24 [ 73.567891][ T2517] dump_stack_lvl+0xee/0x150 [ 73.572533][ T2517] ? __cfi_dump_stack_lvl+0x8/0x8 [ 73.577763][ T2517] dump_stack+0x15/0x24 [ 73.581950][ T2517] should_fail_ex+0x3d4/0x520 [ 73.586751][ T2517] should_fail+0xb/0x10 [ 73.591018][ T2517] should_fail_usercopy+0x1a/0x20 [ 73.596160][ T2517] _copy_to_user+0x1e/0x90 [ 73.600599][ T2517] simple_read_from_buffer+0xe9/0x160 [ 73.605990][ T2517] proc_fail_nth_read+0x19a/0x210 [ 73.611043][ T2517] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 73.616636][ T2517] ? security_file_permission+0x94/0xb0 [ 73.622294][ T2517] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 73.627955][ T2517] vfs_read+0x26e/0x8c0 [ 73.632140][ T2517] ? __cfi_vfs_read+0x10/0x10 [ 73.636840][ T2517] ? __kasan_check_write+0x14/0x20 [ 73.641979][ T2517] ? mutex_lock+0x8d/0x1a0 [ 73.646415][ T2517] ? __cfi_mutex_lock+0x10/0x10 [ 73.651462][ T2517] ? __fdget_pos+0x2cd/0x380 [ 73.656079][ T2517] ? ksys_read+0x71/0x240 [ 73.660430][ T2517] ksys_read+0x140/0x240 [ 73.664961][ T2517] ? __cfi_ksys_read+0x10/0x10 [ 73.670000][ T2517] ? debug_smp_processor_id+0x17/0x20 [ 73.675390][ T2517] __x64_sys_read+0x7b/0x90 [ 73.679950][ T2517] x64_sys_call+0x2f/0x9a0 [ 73.684561][ T2517] do_syscall_64+0x4c/0xa0 [ 73.688991][ T2517] ? clear_bhb_loop+0x30/0x80 [ 73.693773][ T2517] ? clear_bhb_loop+0x30/0x80 [ 73.698693][ T2517] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 73.704775][ T2517] RIP: 0033:0x7fa8d458d5bc [ 73.709208][ T2517] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 73.729263][ T2517] RSP: 002b:00007fa8d5504030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 73.737734][ T2517] RAX: ffffffffffffffda RBX: 00007fa8d47d5fa0 RCX: 00007fa8d458d5bc [ 73.745901][ T2517] RDX: 000000000000000f RSI: 00007fa8d55040a0 RDI: 0000000000000006 [ 73.753981][ T2517] RBP: 00007fa8d5504090 R08: 0000000000000000 R09: 0000000000000000 [ 73.762146][ T2517] R10: 0000200000000680 R11: 0000000000000246 R12: 0000000000000002 [ 73.770220][ T2517] R13: 00007fa8d47d6038 R14: 00007fa8d47d5fa0 R15: 00007ffd5aa64228 [ 73.778315][ T2517] [ 74.019208][ T2537] bond_slave_1: mtu less than device minimum [ 74.219669][ T2545] bond_slave_1: mtu less than device minimum [ 74.241072][ T2543] device pim6reg1 entered promiscuous mode [ 74.627821][ T2559] device wg2 entered promiscuous mode [ 74.702451][ T2555] device wg2 left promiscuous mode [ 74.717619][ T2563] device pim6reg1 entered promiscuous mode [ 74.907182][ T2577] bond_slave_1: mtu less than device minimum [ 74.928103][ T28] audit: type=1400 audit(1757704267.090:132): avc: denied { create } for pid=2579 comm="syz.2.811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 75.263541][ T2583] device syzkaller0 entered promiscuous mode [ 75.578506][ T2609] device pim6reg1 entered promiscuous mode [ 75.821513][ T2615] bond_slave_1: mtu less than device minimum [ 76.129425][ T2634] device pim6reg1 entered promiscuous mode [ 76.372798][ T2644] bond_slave_1: mtu less than device minimum [ 76.430854][ T2647] FAULT_INJECTION: forcing a failure. [ 76.430854][ T2647] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 76.532988][ T2647] CPU: 1 PID: 2647 Comm: syz.4.836 Not tainted syzkaller #0 [ 76.540348][ T2647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 76.550494][ T2647] Call Trace: [ 76.553779][ T2647] [ 76.556709][ T2647] __dump_stack+0x21/0x24 [ 76.561603][ T2647] dump_stack_lvl+0xee/0x150 [ 76.566188][ T2647] ? __cfi_dump_stack_lvl+0x8/0x8 [ 76.571224][ T2647] dump_stack+0x15/0x24 [ 76.575390][ T2647] should_fail_ex+0x3d4/0x520 [ 76.580427][ T2647] should_fail+0xb/0x10 [ 76.584584][ T2647] should_fail_usercopy+0x1a/0x20 [ 76.589695][ T2647] copy_fpstate_to_sigframe+0x849/0xaa0 [ 76.595242][ T2647] ? copy_fpstate_to_sigframe+0x17c/0xaa0 [ 76.601141][ T2647] ? __cfi_copy_fpstate_to_sigframe+0x10/0x10 [ 76.607232][ T2647] ? get_signal+0x124b/0x1520 [ 76.612025][ T2647] ? fpu__alloc_mathframe+0xb3/0x130 [ 76.617418][ T2647] arch_do_signal_or_restart+0x5bd/0x1030 [ 76.623407][ T2647] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 76.629225][ T2647] ? force_sig_info_to_task+0x344/0x3f0 [ 76.634771][ T2647] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 76.640931][ T2647] ? force_sig+0xb7/0x100 [ 76.645434][ T2647] ? __kasan_check_write+0x14/0x20 [ 76.650994][ T2647] exit_to_user_mode_loop+0x7a/0xb0 [ 76.656287][ T2647] exit_to_user_mode_prepare+0x5a/0xa0 [ 76.661758][ T2647] irqentry_exit_to_user_mode+0x9/0x10 [ 76.667311][ T2647] irqentry_exit+0x12/0x40 [ 76.671735][ T2647] exc_general_protection+0x14e/0x1e0 [ 76.677127][ T2647] ? debug_smp_processor_id+0x17/0x20 [ 76.682516][ T2647] ? do_syscall_64+0x58/0xa0 [ 76.687140][ T2647] asm_exc_general_protection+0x27/0x30 [ 76.692863][ T2647] RIP: 0033:0x7f96337676f9 [ 76.697360][ T2647] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 76.717484][ T2647] RSP: 002b:00007f96345f67c8 EFLAGS: 00010283 [ 76.723836][ T2647] RAX: 0000000000000999 RBX: 00007f96345f6d30 RCX: 00007f9633998120 [ 76.731808][ T2647] RDX: 9999999999999999 RSI: 00007f9633811b31 RDI: 9999999999999999 [ 76.739951][ T2647] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 76.748110][ T2647] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 76.756366][ T2647] R13: 00007f96345f6eb0 R14: 9999999999999999 R15: 0000000000000000 [ 76.764540][ T2647] [ 77.081302][ T2663] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.091484][ T2663] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.310118][ T2667] FAULT_INJECTION: forcing a failure. [ 77.310118][ T2667] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 77.325460][ T2668] device wg2 entered promiscuous mode [ 77.352081][ T2667] CPU: 1 PID: 2667 Comm: syz.2.842 Not tainted syzkaller #0 [ 77.359504][ T2667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 77.369844][ T2667] Call Trace: [ 77.373158][ T2667] [ 77.376197][ T2667] __dump_stack+0x21/0x24 [ 77.380636][ T2667] dump_stack_lvl+0xee/0x150 [ 77.385448][ T2667] ? __cfi_dump_stack_lvl+0x8/0x8 [ 77.390581][ T2667] dump_stack+0x15/0x24 [ 77.394923][ T2667] should_fail_ex+0x3d4/0x520 [ 77.399743][ T2667] should_fail+0xb/0x10 [ 77.404005][ T2667] should_fail_usercopy+0x1a/0x20 [ 77.409172][ T2667] _copy_to_user+0x1e/0x90 [ 77.413694][ T2667] simple_read_from_buffer+0xe9/0x160 [ 77.419084][ T2667] proc_fail_nth_read+0x19a/0x210 [ 77.424131][ T2667] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 77.429797][ T2667] ? security_file_permission+0x94/0xb0 [ 77.435473][ T2667] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 77.441053][ T2667] vfs_read+0x26e/0x8c0 [ 77.445277][ T2667] ? __cfi_vfs_read+0x10/0x10 [ 77.450154][ T2667] ? __kasan_check_write+0x14/0x20 [ 77.455460][ T2667] ? mutex_lock+0x8d/0x1a0 [ 77.459910][ T2667] ? __cfi_mutex_lock+0x10/0x10 [ 77.464877][ T2667] ? __fdget_pos+0x2cd/0x380 [ 77.469486][ T2667] ? ksys_read+0x71/0x240 [ 77.473925][ T2667] ksys_read+0x140/0x240 [ 77.478290][ T2667] ? __cfi_ksys_read+0x10/0x10 [ 77.483079][ T2667] ? fpregs_restore_userregs+0x128/0x260 [ 77.488905][ T2667] __x64_sys_read+0x7b/0x90 [ 77.493438][ T2667] x64_sys_call+0x2f/0x9a0 [ 77.497926][ T2667] do_syscall_64+0x4c/0xa0 [ 77.502456][ T2667] ? clear_bhb_loop+0x30/0x80 [ 77.507522][ T2667] ? clear_bhb_loop+0x30/0x80 [ 77.512247][ T2667] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 77.518616][ T2667] RIP: 0033:0x7fc42958d5bc [ 77.523145][ T2667] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 77.543031][ T2667] RSP: 002b:00007fc42a4b1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 77.551468][ T2667] RAX: ffffffffffffffda RBX: 00007fc4297d6090 RCX: 00007fc42958d5bc [ 77.559909][ T2667] RDX: 000000000000000f RSI: 00007fc42a4b10a0 RDI: 000000000000000c [ 77.567981][ T2667] RBP: 00007fc42a4b1090 R08: 0000000000000000 R09: 0000000000000000 [ 77.576056][ T2667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 77.584213][ T2667] R13: 00007fc4297d6128 R14: 00007fc4297d6090 R15: 00007ffc97e4b7e8 [ 77.592377][ T2667] [ 77.602491][ T2675] bond_slave_1: mtu less than device minimum [ 77.702438][ T2683] device pim6reg1 entered promiscuous mode [ 78.298981][ T2705] bond_slave_1: mtu less than device minimum [ 78.396372][ T2708] device pim6reg1 entered promiscuous mode [ 78.459402][ T2711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.774436][ T2727] device pim6reg1 entered promiscuous mode [ 78.820717][ T2736] bond_slave_1: mtu less than device minimum [ 79.219526][ T2764] bond_slave_1: mtu less than device minimum [ 79.284962][ T2769] device pim6reg1 entered promiscuous mode [ 79.708286][ T2792] bond_slave_1: mtu less than device minimum [ 79.887143][ T2808] syz.3.898[2808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.887237][ T2808] syz.3.898[2808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.142850][ T2817] bond_slave_1: mtu less than device minimum [ 80.492026][ T2847] bond_slave_1: mtu less than device minimum [ 80.726831][ T2852] bridge0: port 3(team_slave_1) entered blocking state [ 80.746498][ T2852] bridge0: port 3(team_slave_1) entered disabled state [ 80.763986][ T2852] device team_slave_1 entered promiscuous mode [ 80.946379][ T28] audit: type=1400 audit(1757704273.110:133): avc: denied { create } for pid=2881 comm="syz.1.928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 81.057715][ T2888] bond_slave_1: mtu less than device minimum [ 81.077607][ T2897] bond_slave_1: mtu less than device minimum [ 81.189121][ T2906] sock: sock_timestamping_bind_phc: sock not bind to device [ 81.534956][ T2934] bond_slave_1: mtu less than device minimum [ 81.946308][ T2960] device pim6reg1 entered promiscuous mode [ 81.992850][ T28] audit: type=1400 audit(1757704274.160:134): avc: denied { create } for pid=2949 comm="syz.0.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 82.051257][ T2968] bond_slave_1: mtu less than device minimum [ 82.215041][ T2996] device pim6reg1 entered promiscuous mode [ 82.452344][ T3015] bond_slave_1: mtu less than device minimum [ 82.510167][ T3017] device syzkaller0 entered promiscuous mode [ 82.920524][ T3039] device pim6reg1 entered promiscuous mode [ 83.261612][ T3053] syz.3.990[3053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.261698][ T3053] syz.3.990[3053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.543361][ T3050] bond_slave_1: mtu less than device minimum [ 84.836751][ T3097] device pim6reg1 entered promiscuous mode [ 85.087873][ T3100] bond_slave_1: mtu less than device minimum [ 86.555485][ T3137] device pim6reg1 entered promiscuous mode [ 86.575193][ T3139] bond_slave_1: mtu less than device minimum [ 86.969558][ T3167] device pim6reg1 entered promiscuous mode [ 87.145445][ T28] audit: type=1400 audit(1757704279.310:135): avc: denied { create } for pid=3170 comm="syz.2.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 87.230530][ T3184] bond_slave_1: mtu less than device minimum [ 87.607601][ T3201] device pim6reg1 entered promiscuous mode [ 87.904463][ T3214] bond_slave_1: mtu less than device minimum [ 88.035024][ T3226] device pim6reg1 entered promiscuous mode [ 88.129524][ T3237] bond_slave_1: mtu less than device minimum [ 88.273402][ T3252] bond_slave_1: mtu less than device minimum [ 88.499315][ T3264] device pim6reg1 entered promiscuous mode [ 88.526528][ T3268] bond_slave_1: mtu less than device minimum [ 88.583518][ T3280] bond_slave_1: mtu less than device minimum [ 88.625288][ T3278] device pim6reg1 entered promiscuous mode [ 88.881384][ T3300] bond_slave_1: mtu less than device minimum [ 89.096580][ T3308] device pim6reg1 entered promiscuous mode [ 89.338620][ T3312] bond_slave_1: mtu less than device minimum [ 89.577966][ T3331] device pim6reg1 entered promiscuous mode [ 90.008481][ T3354] device veth0_vlan left promiscuous mode [ 90.014872][ T3354] device veth0_vlan entered promiscuous mode [ 90.038417][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.052809][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.073510][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.099764][ T3365] net_ratelimit: 2 callbacks suppressed [ 90.099783][ T3365] bond_slave_1: mtu less than device minimum [ 90.152058][ T3367] bond_slave_1: mtu less than device minimum [ 90.232794][ T3371] device pim6reg1 entered promiscuous mode [ 90.657692][ T3394] bond_slave_1: mtu less than device minimum [ 90.850417][ T3402] bond_slave_1: mtu less than device minimum [ 90.872523][ T3406] device pim6reg1 entered promiscuous mode [ 91.333153][ T3433] bond_slave_1: mtu less than device minimum [ 91.459805][ T3440] bond_slave_1: mtu less than device minimum [ 91.630539][ T3452] device pim6reg1 entered promiscuous mode [ 91.739713][ T3460] bond_slave_1: mtu less than device minimum [ 91.942505][ T3472] syz.4.1154[3472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.942587][ T3472] syz.4.1154[3472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.087911][ T28] audit: type=1400 audit(1757704284.250:136): avc: denied { create } for pid=3480 comm="syz.4.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.146729][ T3477] bond_slave_1: mtu less than device minimum [ 92.294697][ T3489] device pim6reg1 entered promiscuous mode [ 92.379101][ T3495] bond_slave_1: mtu less than device minimum [ 92.795434][ T3507] bond_slave_1: mtu less than device minimum [ 92.937694][ T3516] device pim6reg1 entered promiscuous mode [ 92.948796][ T3518] device sit0 entered promiscuous mode [ 93.138793][ T3524] device wg2 left promiscuous mode [ 93.187407][ T3532] device pim6reg1 entered promiscuous mode [ 93.236980][ T3524] device wg2 entered promiscuous mode [ 95.376797][ T3690] net_ratelimit: 10 callbacks suppressed [ 95.376818][ T3690] bond_slave_1: mtu less than device minimum [ 95.396158][ T28] audit: type=1400 audit(1757704287.560:137): avc: denied { ioctl } for pid=3685 comm="syz.2.1242" path="socket:[27900]" dev="sockfs" ino=27900 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 95.513359][ T3687] device syzkaller0 entered promiscuous mode [ 95.769507][ T3701] bond_slave_1: mtu less than device minimum [ 96.056675][ T3722] bond_slave_1: mtu less than device minimum [ 96.269086][ T3734] bond_slave_1: mtu less than device minimum [ 96.604311][ T3750] bond_slave_1: mtu less than device minimum [ 96.871311][ T3774] bond_slave_1: mtu less than device minimum [ 96.998532][ T3790] bond_slave_1: mtu less than device minimum [ 97.116886][ T3812] FAULT_INJECTION: forcing a failure. [ 97.116886][ T3812] name failslab, interval 1, probability 0, space 0, times 0 [ 97.161317][ T3817] bond_slave_1: mtu less than device minimum [ 97.200247][ T3812] CPU: 0 PID: 3812 Comm: syz.2.1286 Not tainted syzkaller #0 [ 97.208029][ T3812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 97.218285][ T3812] Call Trace: [ 97.221771][ T3812] [ 97.224733][ T3812] __dump_stack+0x21/0x24 [ 97.229090][ T3812] dump_stack_lvl+0xee/0x150 [ 97.233792][ T3812] ? __cfi_dump_stack_lvl+0x8/0x8 [ 97.238844][ T3812] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 97.244597][ T3812] dump_stack+0x15/0x24 [ 97.248875][ T3812] should_fail_ex+0x3d4/0x520 [ 97.253619][ T3812] __should_failslab+0xac/0xf0 [ 97.258413][ T3812] should_failslab+0x9/0x20 [ 97.262937][ T3812] kmem_cache_alloc_node+0x42/0x340 [ 97.268166][ T3812] ? __alloc_skb+0xea/0x4b0 [ 97.272875][ T3812] __alloc_skb+0xea/0x4b0 [ 97.277321][ T3812] alloc_skb_with_frags+0xa8/0x620 [ 97.282690][ T3812] sock_alloc_send_pskb+0x853/0x980 [ 97.287924][ T3812] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 97.293671][ T3812] ? stack_trace_save+0x98/0xe0 [ 97.298554][ T3812] tun_get_user+0x4e5/0x3320 [ 97.303288][ T3812] ? kstrtoull+0x137/0x1d0 [ 97.307743][ T3812] ? tun_do_read+0x1c20/0x1c20 [ 97.312627][ T3812] ? __kasan_check_write+0x14/0x20 [ 97.317868][ T3812] ? ref_tracker_alloc+0x30f/0x430 [ 97.323005][ T3812] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 97.328579][ T3812] ? avc_policy_seqno+0x1b/0x70 [ 97.333462][ T3812] ? selinux_file_permission+0x2a5/0x510 [ 97.339207][ T3812] tun_chr_write_iter+0x1fb/0x300 [ 97.344277][ T3812] vfs_write+0x5db/0xca0 [ 97.348558][ T3812] ? slab_free_freelist_hook+0xc2/0x190 [ 97.354139][ T3812] ? __cfi_vfs_write+0x10/0x10 [ 97.359078][ T3812] ? __fget_files+0x2d5/0x330 [ 97.364011][ T3812] ? __fdget_pos+0x1f2/0x380 [ 97.368709][ T3812] ? ksys_write+0x71/0x240 [ 97.373155][ T3812] ksys_write+0x140/0x240 [ 97.377603][ T3812] ? __cfi_ksys_write+0x10/0x10 [ 97.382480][ T3812] ? debug_smp_processor_id+0x17/0x20 [ 97.387914][ T3812] __x64_sys_write+0x7b/0x90 [ 97.392625][ T3812] x64_sys_call+0x27b/0x9a0 [ 97.397157][ T3812] do_syscall_64+0x4c/0xa0 [ 97.401690][ T3812] ? clear_bhb_loop+0x30/0x80 [ 97.406527][ T3812] ? clear_bhb_loop+0x30/0x80 [ 97.411233][ T3812] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 97.417162][ T3812] RIP: 0033:0x7fc42958eba9 [ 97.421604][ T3812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.441409][ T3812] RSP: 002b:00007fc42a4b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 97.450474][ T3812] RAX: ffffffffffffffda RBX: 00007fc4297d6090 RCX: 00007fc42958eba9 [ 97.458561][ T3812] RDX: 000000000000fdef RSI: 0000200000000280 RDI: 00000000000000c8 [ 97.466644][ T3812] RBP: 00007fc42a4b1090 R08: 0000000000000000 R09: 0000000000000000 [ 97.474655][ T3812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.482830][ T3812] R13: 00007fc4297d6128 R14: 00007fc4297d6090 R15: 00007ffc97e4b7e8 [ 97.491012][ T3812] [ 97.623477][ T3832] bond_slave_1: mtu less than device minimum [ 97.811669][ T3846] bond_slave_1: mtu less than device minimum [ 98.321297][ T3888] device sit0 left promiscuous mode [ 98.538621][ T3903] device pim6reg1 entered promiscuous mode [ 98.784159][ T3918] FAULT_INJECTION: forcing a failure. [ 98.784159][ T3918] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 98.852218][ T3918] CPU: 1 PID: 3918 Comm: syz.3.1333 Not tainted syzkaller #0 [ 98.859639][ T3918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 98.869806][ T3918] Call Trace: [ 98.873188][ T3918] [ 98.876154][ T3918] __dump_stack+0x21/0x24 [ 98.880640][ T3918] dump_stack_lvl+0xee/0x150 [ 98.885235][ T3918] ? __cfi_dump_stack_lvl+0x8/0x8 [ 98.890461][ T3918] dump_stack+0x15/0x24 [ 98.894610][ T3918] should_fail_ex+0x3d4/0x520 [ 98.899419][ T3918] should_fail+0xb/0x10 [ 98.903657][ T3918] should_fail_usercopy+0x1a/0x20 [ 98.908951][ T3918] _copy_from_user+0x1e/0xc0 [ 98.913630][ T3918] sock_do_ioctl+0x186/0x310 [ 98.918225][ T3918] ? sock_show_fdinfo+0xb0/0xb0 [ 98.923252][ T3918] ? selinux_file_ioctl+0x377/0x480 [ 98.928538][ T3918] sock_ioctl+0x4d8/0x6e0 [ 98.932869][ T3918] ? __cfi_sock_ioctl+0x10/0x10 [ 98.937719][ T3918] ? __fget_files+0x2d5/0x330 [ 98.942395][ T3918] ? security_file_ioctl+0x95/0xc0 [ 98.947681][ T3918] ? __cfi_sock_ioctl+0x10/0x10 [ 98.952628][ T3918] __se_sys_ioctl+0x12f/0x1b0 [ 98.957321][ T3918] __x64_sys_ioctl+0x7b/0x90 [ 98.962003][ T3918] x64_sys_call+0x58b/0x9a0 [ 98.966771][ T3918] do_syscall_64+0x4c/0xa0 [ 98.971183][ T3918] ? clear_bhb_loop+0x30/0x80 [ 98.975951][ T3918] ? clear_bhb_loop+0x30/0x80 [ 98.980718][ T3918] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 98.986610][ T3918] RIP: 0033:0x7fa8d458eba9 [ 98.991024][ T3918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.010803][ T3918] RSP: 002b:00007fa8d5504038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 99.019458][ T3918] RAX: ffffffffffffffda RBX: 00007fa8d47d5fa0 RCX: 00007fa8d458eba9 [ 99.027950][ T3918] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 99.036524][ T3918] RBP: 00007fa8d5504090 R08: 0000000000000000 R09: 0000000000000000 [ 99.044491][ T3918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.052565][ T3918] R13: 00007fa8d47d6038 R14: 00007fa8d47d5fa0 R15: 00007ffd5aa64228 [ 99.060642][ T3918] [ 99.398856][ T3948] device wg2 entered promiscuous mode [ 99.644749][ T3979] device pim6reg1 entered promiscuous mode [ 100.024895][ T3992] device pim6reg1 entered promiscuous mode [ 100.263977][ T4011] device pim6reg1 entered promiscuous mode [ 100.285651][ T4011] syz.2.1370[4011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.285753][ T4011] syz.2.1370[4011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.352693][ T4011] syz.2.1370[4011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.376701][ T4011] syz.2.1370[4011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.654358][ T4030] device veth1_macvtap left promiscuous mode [ 100.771228][ T4034] net_ratelimit: 10 callbacks suppressed [ 100.771252][ T4034] bond_slave_1: mtu less than device minimum [ 100.806872][ T4035] bond_slave_1: mtu less than device minimum [ 100.827995][ T4031] device pim6reg1 entered promiscuous mode [ 100.855955][ T4045] device pim6reg1 entered promiscuous mode [ 100.964870][ T4056] device wg2 left promiscuous mode [ 101.018819][ T4062] FAULT_INJECTION: forcing a failure. [ 101.018819][ T4062] name failslab, interval 1, probability 0, space 0, times 0 [ 101.074394][ T28] audit: type=1400 audit(1757704293.240:138): avc: denied { create } for pid=4064 comm="syz.3.1392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 101.102672][ T4062] CPU: 1 PID: 4062 Comm: syz.0.1390 Not tainted syzkaller #0 [ 101.110539][ T4062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 101.120889][ T4062] Call Trace: [ 101.124280][ T4062] [ 101.127266][ T4062] __dump_stack+0x21/0x24 [ 101.131696][ T4062] dump_stack_lvl+0xee/0x150 [ 101.136296][ T4062] ? __cfi_dump_stack_lvl+0x8/0x8 [ 101.141330][ T4062] ? avc_has_perm_noaudit+0x2f4/0x460 [ 101.146818][ T4062] dump_stack+0x15/0x24 [ 101.151075][ T4062] should_fail_ex+0x3d4/0x520 [ 101.155777][ T4062] __should_failslab+0xac/0xf0 [ 101.160558][ T4062] ? qdisc_alloc+0x79/0x780 [ 101.165164][ T4062] should_failslab+0x9/0x20 [ 101.169767][ T4062] __kmem_cache_alloc_node+0x3d/0x2c0 [ 101.175163][ T4062] ? qdisc_alloc+0x79/0x780 [ 101.179709][ T4062] __kmalloc_node+0xa1/0x1e0 [ 101.184337][ T4062] qdisc_alloc+0x79/0x780 [ 101.188782][ T4062] ? vlan_device_event+0x49e/0x1ba0 [ 101.194000][ T4062] ? mutex_unlock+0x89/0x220 [ 101.198616][ T4062] ? br_device_event+0x15f/0x770 [ 101.203756][ T4062] qdisc_create_dflt+0x6b/0x3b0 [ 101.208716][ T4062] dev_activate+0x2cf/0x1040 [ 101.213330][ T4062] __dev_open+0x3ce/0x4f0 [ 101.217764][ T4062] ? dev_open+0x230/0x230 [ 101.222102][ T4062] ? _raw_spin_unlock_bh+0x50/0x60 [ 101.227312][ T4062] ? dev_set_rx_mode+0x223/0x2c0 [ 101.232372][ T4062] ? __kasan_check_read+0x11/0x20 [ 101.237449][ T4062] __dev_change_flags+0x21b/0x6b0 [ 101.242583][ T4062] ? __cfi___dev_change_flags+0x10/0x10 [ 101.248172][ T4062] dev_change_flags+0x88/0x1a0 [ 101.252959][ T4062] dev_ifsioc+0x159/0xed0 [ 101.257320][ T4062] ? dev_ioctl+0xd10/0xd10 [ 101.261775][ T4062] ? __kasan_check_write+0x14/0x20 [ 101.266911][ T4062] ? mutex_lock+0x8d/0x1a0 [ 101.271346][ T4062] ? __cfi_mutex_lock+0x10/0x10 [ 101.276230][ T4062] ? dev_get_by_name_rcu+0xe5/0x130 [ 101.281461][ T4062] dev_ioctl+0x556/0xd10 [ 101.285821][ T4062] sock_do_ioctl+0x23f/0x310 [ 101.290455][ T4062] ? sock_show_fdinfo+0xb0/0xb0 [ 101.295330][ T4062] ? selinux_file_ioctl+0x377/0x480 [ 101.300553][ T4062] sock_ioctl+0x4d8/0x6e0 [ 101.304989][ T4062] ? __cfi_sock_ioctl+0x10/0x10 [ 101.309857][ T4062] ? __fget_files+0x2d5/0x330 [ 101.314565][ T4062] ? security_file_ioctl+0x95/0xc0 [ 101.319786][ T4062] ? __cfi_sock_ioctl+0x10/0x10 [ 101.324669][ T4062] __se_sys_ioctl+0x12f/0x1b0 [ 101.329448][ T4062] __x64_sys_ioctl+0x7b/0x90 [ 101.334099][ T4062] x64_sys_call+0x58b/0x9a0 [ 101.338797][ T4062] do_syscall_64+0x4c/0xa0 [ 101.343310][ T4062] ? clear_bhb_loop+0x30/0x80 [ 101.348007][ T4062] ? clear_bhb_loop+0x30/0x80 [ 101.353019][ T4062] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 101.359209][ T4062] RIP: 0033:0x7f248818eba9 [ 101.363656][ T4062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.383562][ T4062] RSP: 002b:00007f2488f86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 101.392108][ T4062] RAX: ffffffffffffffda RBX: 00007f24883d5fa0 RCX: 00007f248818eba9 [ 101.400131][ T4062] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 101.408298][ T4062] RBP: 00007f2488f86090 R08: 0000000000000000 R09: 0000000000000000 [ 101.416290][ T4062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.425244][ T4062] R13: 00007f24883d6038 R14: 00007f24883d5fa0 R15: 00007ffed21be8e8 [ 101.433417][ T4062] [ 102.438098][ T4062] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 102.471845][ T4062] device pim6reg1 entered promiscuous mode [ 102.542432][ T4078] bond_slave_1: mtu less than device minimum [ 102.737034][ T4090] bond_slave_1: mtu less than device minimum [ 102.838533][ T4088] FAULT_INJECTION: forcing a failure. [ 102.838533][ T4088] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.970628][ T4088] CPU: 1 PID: 4088 Comm: syz.3.1401 Not tainted syzkaller #0 [ 102.978058][ T4088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 102.988130][ T4088] Call Trace: [ 102.991508][ T4088] [ 102.994447][ T4088] __dump_stack+0x21/0x24 [ 102.998789][ T4088] dump_stack_lvl+0xee/0x150 [ 103.003393][ T4088] ? __cfi_dump_stack_lvl+0x8/0x8 [ 103.008435][ T4088] ? __kasan_check_write+0x14/0x20 [ 103.013585][ T4088] dump_stack+0x15/0x24 [ 103.017748][ T4088] should_fail_ex+0x3d4/0x520 [ 103.022439][ T4088] should_fail+0xb/0x10 [ 103.026662][ T4088] should_fail_usercopy+0x1a/0x20 [ 103.031699][ T4088] _copy_from_iter+0x190/0xfd0 [ 103.036475][ T4088] ? __kasan_check_write+0x14/0x20 [ 103.041601][ T4088] ? skb_set_owner_w+0x25c/0x380 [ 103.046648][ T4088] ? __cfi__copy_from_iter+0x10/0x10 [ 103.052035][ T4088] ? check_stack_object+0x81/0x140 [ 103.057163][ T4088] ? __kasan_check_read+0x11/0x20 [ 103.062378][ T4088] ? __check_object_size+0x45a/0x600 [ 103.067768][ T4088] skb_copy_datagram_from_iter+0xf7/0x6b0 [ 103.073509][ T4088] ? stack_trace_save+0x98/0xe0 [ 103.078436][ T4088] ? skb_put+0x10e/0x1f0 [ 103.082698][ T4088] tun_get_user+0x1419/0x3320 [ 103.087389][ T4088] ? kstrtoull+0x137/0x1d0 [ 103.091908][ T4088] ? tun_do_read+0x1c20/0x1c20 [ 103.096778][ T4088] ? __kasan_check_write+0x14/0x20 [ 103.102094][ T4088] ? ref_tracker_alloc+0x30f/0x430 [ 103.107301][ T4088] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 103.112864][ T4088] ? avc_policy_seqno+0x1b/0x70 [ 103.117908][ T4088] ? selinux_file_permission+0x2a5/0x510 [ 103.123577][ T4088] tun_chr_write_iter+0x1fb/0x300 [ 103.128623][ T4088] vfs_write+0x5db/0xca0 [ 103.132880][ T4088] ? slab_free_freelist_hook+0xc2/0x190 [ 103.138448][ T4088] ? __cfi_vfs_write+0x10/0x10 [ 103.143321][ T4088] ? __fget_files+0x2d5/0x330 [ 103.148016][ T4088] ? __fdget_pos+0x1f2/0x380 [ 103.152700][ T4088] ? ksys_write+0x71/0x240 [ 103.157149][ T4088] ksys_write+0x140/0x240 [ 103.161672][ T4088] ? __cfi_ksys_write+0x10/0x10 [ 103.166536][ T4088] ? debug_smp_processor_id+0x17/0x20 [ 103.171931][ T4088] __x64_sys_write+0x7b/0x90 [ 103.176535][ T4088] x64_sys_call+0x27b/0x9a0 [ 103.181066][ T4088] do_syscall_64+0x4c/0xa0 [ 103.185666][ T4088] ? clear_bhb_loop+0x30/0x80 [ 103.190444][ T4088] ? clear_bhb_loop+0x30/0x80 [ 103.195221][ T4088] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 103.201228][ T4088] RIP: 0033:0x7fa8d458eba9 [ 103.205739][ T4088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.225800][ T4088] RSP: 002b:00007fa8d5504038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 103.234242][ T4088] RAX: ffffffffffffffda RBX: 00007fa8d47d5fa0 RCX: 00007fa8d458eba9 [ 103.242346][ T4088] RDX: 000000000000fdef RSI: 0000200000000280 RDI: 00000000000000c8 [ 103.250496][ T4088] RBP: 00007fa8d5504090 R08: 0000000000000000 R09: 0000000000000000 [ 103.258742][ T4088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.266851][ T4088] R13: 00007fa8d47d6038 R14: 00007fa8d47d5fa0 R15: 00007ffd5aa64228 [ 103.275104][ T4088] [ 103.396257][ T4118] bond_slave_1: mtu less than device minimum [ 103.550030][ T4126] bond_slave_1: mtu less than device minimum [ 103.910971][ T4145] bond_slave_1: mtu less than device minimum [ 104.237835][ T4159] bond_slave_1: mtu less than device minimum [ 104.423335][ T4168] device pim6reg1 entered promiscuous mode [ 104.773240][ T4179] bond_slave_1: mtu less than device minimum [ 104.864476][ T4184] bond_slave_1: mtu less than device minimum [ 105.200924][ T28] audit: type=1400 audit(1757704297.360:139): avc: denied { create } for pid=4203 comm="syz.2.1445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 105.322697][ T4206] device pim6reg1 entered promiscuous mode [ 105.340208][ T336] syzkaller0: tun_net_xmit 76 [ 105.345522][ T336] syzkaller0: tun_net_xmit 48 [ 105.885313][ T4225] bond_slave_1: mtu less than device minimum [ 106.744412][ T4256] bond_slave_1: mtu less than device minimum [ 106.954891][ T4267] device wg2 entered promiscuous mode [ 106.999475][ T4262] device pim6reg1 entered promiscuous mode [ 107.342611][ T4291] bond_slave_1: mtu less than device minimum [ 107.422638][ T4289] bridge0: port 4(veth1_macvtap) entered blocking state [ 107.472742][ T4289] bridge0: port 4(veth1_macvtap) entered disabled state [ 107.929685][ T4320] bond_slave_1: mtu less than device minimum [ 108.045493][ T4341] device pim6reg1 entered promiscuous mode [ 108.160248][ T4355] ip6_vti0: mtu greater than device maximum [ 108.184459][ T4361] bond_slave_1: mtu less than device minimum [ 108.567176][ T4398] bond_slave_1: mtu less than device minimum [ 108.736039][ T4411] bridge0: port 3(veth1_macvtap) entered blocking state [ 108.772193][ T4411] bridge0: port 3(veth1_macvtap) entered disabled state [ 108.834715][ T4411] device pim6reg1 entered promiscuous mode [ 109.329073][ T4433] bond_slave_1: mtu less than device minimum [ 109.864378][ T4467] bond_slave_1: mtu less than device minimum [ 110.059199][ T4489] device pim6reg1 entered promiscuous mode [ 110.155050][ T4500] bond_slave_1: mtu less than device minimum [ 110.373478][ T4524] FAULT_INJECTION: forcing a failure. [ 110.373478][ T4524] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.387401][ T4524] CPU: 1 PID: 4524 Comm: syz.2.1569 Not tainted syzkaller #0 [ 110.395433][ T4524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 110.405606][ T4524] Call Trace: [ 110.408887][ T4524] [ 110.411820][ T4524] __dump_stack+0x21/0x24 [ 110.416148][ T4524] dump_stack_lvl+0xee/0x150 [ 110.420734][ T4524] ? __cfi_dump_stack_lvl+0x8/0x8 [ 110.425756][ T4524] dump_stack+0x15/0x24 [ 110.429907][ T4524] should_fail_ex+0x3d4/0x520 [ 110.434849][ T4524] should_fail+0xb/0x10 [ 110.439091][ T4524] should_fail_usercopy+0x1a/0x20 [ 110.444115][ T4524] _copy_from_user+0x1e/0xc0 [ 110.448705][ T4524] sock_do_ioctl+0x186/0x310 [ 110.453413][ T4524] ? sock_show_fdinfo+0xb0/0xb0 [ 110.458296][ T4524] ? selinux_file_ioctl+0x377/0x480 [ 110.463553][ T4524] sock_ioctl+0x4d8/0x6e0 [ 110.468070][ T4524] ? __cfi_sock_ioctl+0x10/0x10 [ 110.473033][ T4524] ? __fget_files+0x2d5/0x330 [ 110.477712][ T4524] ? security_file_ioctl+0x95/0xc0 [ 110.482907][ T4524] ? __cfi_sock_ioctl+0x10/0x10 [ 110.487756][ T4524] __se_sys_ioctl+0x12f/0x1b0 [ 110.492540][ T4524] __x64_sys_ioctl+0x7b/0x90 [ 110.497126][ T4524] x64_sys_call+0x58b/0x9a0 [ 110.501723][ T4524] do_syscall_64+0x4c/0xa0 [ 110.506223][ T4524] ? clear_bhb_loop+0x30/0x80 [ 110.510900][ T4524] ? clear_bhb_loop+0x30/0x80 [ 110.515604][ T4524] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 110.521510][ T4524] RIP: 0033:0x7fc42958eba9 [ 110.525940][ T4524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.546063][ T4524] RSP: 002b:00007fc42a4d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 110.554497][ T4524] RAX: ffffffffffffffda RBX: 00007fc4297d5fa0 RCX: 00007fc42958eba9 [ 110.562752][ T4524] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 0000000000000006 [ 110.570812][ T4524] RBP: 00007fc42a4d2090 R08: 0000000000000000 R09: 0000000000000000 [ 110.578789][ T4524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.586756][ T4524] R13: 00007fc4297d6038 R14: 00007fc4297d5fa0 R15: 00007ffc97e4b7e8 [ 110.594991][ T4524] [ 110.835394][ T4540] device pim6reg1 entered promiscuous mode [ 111.018104][ T4555] net_ratelimit: 2 callbacks suppressed [ 111.018125][ T4555] bond_slave_1: mtu less than device minimum [ 111.090294][ T4567] bond_slave_1: mtu less than device minimum [ 111.097994][ T4568] bond_slave_1: mtu less than device minimum [ 111.104175][ T4568] FAULT_INJECTION: forcing a failure. [ 111.104175][ T4568] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 111.182157][ T4568] CPU: 1 PID: 4568 Comm: syz.1.1587 Not tainted syzkaller #0 [ 111.189592][ T4568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 111.199862][ T4568] Call Trace: [ 111.203161][ T4568] [ 111.206111][ T4568] __dump_stack+0x21/0x24 [ 111.210628][ T4568] dump_stack_lvl+0xee/0x150 [ 111.215402][ T4568] ? __cfi_dump_stack_lvl+0x8/0x8 [ 111.220444][ T4568] dump_stack+0x15/0x24 [ 111.224620][ T4568] should_fail_ex+0x3d4/0x520 [ 111.229340][ T4568] should_fail+0xb/0x10 [ 111.233523][ T4568] should_fail_usercopy+0x1a/0x20 [ 111.238674][ T4568] _copy_to_user+0x1e/0x90 [ 111.243299][ T4568] simple_read_from_buffer+0xe9/0x160 [ 111.248824][ T4568] proc_fail_nth_read+0x19a/0x210 [ 111.253900][ T4568] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 111.259778][ T4568] ? security_file_permission+0x94/0xb0 [ 111.265356][ T4568] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 111.271018][ T4568] vfs_read+0x26e/0x8c0 [ 111.275210][ T4568] ? __cfi_vfs_read+0x10/0x10 [ 111.280021][ T4568] ? __kasan_check_write+0x14/0x20 [ 111.285247][ T4568] ? mutex_lock+0x8d/0x1a0 [ 111.289779][ T4568] ? __cfi_mutex_lock+0x10/0x10 [ 111.294668][ T4568] ? __fdget_pos+0x2cd/0x380 [ 111.299288][ T4568] ? ksys_read+0x71/0x240 [ 111.303766][ T4568] ksys_read+0x140/0x240 [ 111.308024][ T4568] ? __cfi_ksys_read+0x10/0x10 [ 111.312809][ T4568] ? fpregs_restore_userregs+0x128/0x260 [ 111.318631][ T4568] __x64_sys_read+0x7b/0x90 [ 111.323153][ T4568] x64_sys_call+0x2f/0x9a0 [ 111.327590][ T4568] do_syscall_64+0x4c/0xa0 [ 111.332016][ T4568] ? clear_bhb_loop+0x30/0x80 [ 111.336708][ T4568] ? clear_bhb_loop+0x30/0x80 [ 111.341572][ T4568] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 111.347684][ T4568] RIP: 0033:0x7fd62b98d5bc [ 111.352113][ T4568] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 111.372079][ T4568] RSP: 002b:00007fd62a3f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 111.380611][ T4568] RAX: ffffffffffffffda RBX: 00007fd62bbd5fa0 RCX: 00007fd62b98d5bc [ 111.388612][ T4568] RDX: 000000000000000f RSI: 00007fd62a3f70a0 RDI: 0000000000000007 [ 111.396604][ T4568] RBP: 00007fd62a3f7090 R08: 0000000000000000 R09: 0000000000000000 [ 111.404687][ T4568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.412687][ T4568] R13: 00007fd62bbd6038 R14: 00007fd62bbd5fa0 R15: 00007ffeb48e7ac8 [ 111.420812][ T4568] [ 111.535238][ T28] audit: type=1400 audit(1757704303.700:140): avc: denied { create } for pid=4592 comm="syz.2.1598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 111.656896][ T4600] bond_slave_1: mtu less than device minimum [ 112.397741][ T4630] bond_slave_1: mtu less than device minimum [ 112.485505][ T4635] bond_slave_1: mtu less than device minimum [ 112.988107][ T4663] syz.4.1622[4663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.988210][ T4663] syz.4.1622[4663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.279752][ T4667] bond_slave_1: mtu less than device minimum [ 113.901989][ T4693] bond_slave_1: mtu less than device minimum [ 114.318247][ T4719] bond_slave_1: mtu less than device minimum [ 114.434565][ T4728] bond_slave_1: mtu less than device minimum [ 114.509713][ T4745] device pim6reg1 entered promiscuous mode [ 114.963117][ T4789] device pim6reg1 entered promiscuous mode [ 116.336129][ T4866] net_ratelimit: 3 callbacks suppressed [ 116.336147][ T4866] bond_slave_1: mtu less than device minimum [ 116.434493][ T4874] device pim6reg1 entered promiscuous mode [ 116.460428][ T4880] bond_slave_1: mtu less than device minimum [ 116.687698][ T4910] bond_slave_1: mtu less than device minimum [ 116.788678][ T4905] device syzkaller0 entered promiscuous mode [ 116.847771][ T4915] syz.2.1718[4915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.847897][ T4915] syz.2.1718[4915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.472953][ T4948] bond_slave_1: mtu less than device minimum [ 117.809555][ T4952] bond_slave_1: mtu less than device minimum [ 117.859130][ T4952] bond_slave_1: mtu less than device minimum [ 118.203470][ T4974] bond_slave_1: mtu less than device minimum [ 118.619090][ T4994] device pim6reg1 entered promiscuous mode [ 118.630613][ T28] audit: type=1400 audit(1757704310.800:141): avc: denied { create } for pid=4982 comm="syz.4.1743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 118.682948][ T4995] bond_slave_1: mtu less than device minimum [ 118.854888][ T5003] bond_slave_1: mtu less than device minimum [ 119.512294][ T5032] device pim6reg1 entered promiscuous mode [ 119.732512][ T5048] bond_slave_1: mtu less than device minimum [ 119.948657][ T28] audit: type=1400 audit(1757704312.110:142): avc: denied { create } for pid=5064 comm="syz.2.1774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 120.290894][ T5077] device pim6reg1 entered promiscuous mode [ 120.720550][ T28] audit: type=1400 audit(1757704312.880:143): avc: denied { create } for pid=5096 comm="syz.1.1784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 121.332235][ T28] audit: type=1400 audit(1757704313.500:144): avc: denied { create } for pid=5151 comm="syz.3.1805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 121.503518][ T5165] device pim6reg1 entered promiscuous mode [ 121.563570][ T5161] net_ratelimit: 4 callbacks suppressed [ 121.563586][ T5161] bond_slave_1: mtu less than device minimum [ 121.648630][ T5171] bond_slave_1: mtu less than device minimum [ 122.132951][ T5194] bond_slave_1: mtu less than device minimum [ 122.193117][ T5199] device pim6reg1 entered promiscuous mode [ 122.282155][ T5204] bond_slave_1: mtu less than device minimum [ 122.356941][ T5207] bond_slave_1: mtu less than device minimum [ 122.473325][ T5210] device sit0 entered promiscuous mode [ 122.906024][ T5239] bond_slave_1: mtu less than device minimum [ 123.033446][ T5252] syz.0.1841[5252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.033555][ T5252] syz.0.1841[5252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.460928][ T5268] pim6reg: tun_chr_ioctl cmd 1074025694 [ 123.513008][ T5279] bond_slave_1: mtu less than device minimum [ 123.653866][ T5291] bond_slave_1: mtu less than device minimum [ 124.015459][ T5312] bond_slave_1: mtu less than device minimum [ 124.180545][ T5318] bond_slave_1: mtu less than device minimum [ 125.228330][ T5390] device pim6reg1 entered promiscuous mode [ 125.707445][ T5439] device pim6reg1 entered promiscuous mode [ 126.664505][ T5497] net_ratelimit: 7 callbacks suppressed [ 126.664528][ T5497] bond_slave_1: mtu less than device minimum [ 127.057872][ T5531] bond_slave_1: mtu less than device minimum [ 127.524089][ T5553] device pim6reg1 entered promiscuous mode [ 127.604385][ T5561] bond_slave_1: mtu less than device minimum [ 127.830061][ T5577] bond_slave_1: mtu less than device minimum [ 128.055892][ T5596] bond_slave_1: mtu less than device minimum [ 128.177711][ T5611] device sit0 entered promiscuous mode [ 128.434712][ T5629] device veth0_vlan left promiscuous mode [ 128.473642][ T5629] device veth0_vlan entered promiscuous mode [ 128.496958][ T5629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.514011][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.532467][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.544682][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.651133][ T5645] device veth1_macvtap left promiscuous mode [ 128.737651][ T5655] bond_slave_1: mtu less than device minimum [ 128.956139][ T5676] device wg2 left promiscuous mode [ 129.030760][ T5680] bond_slave_1: mtu less than device minimum [ 129.279168][ T5697] bond_slave_1: mtu less than device minimum [ 129.299098][ T5694] device pim6reg1 entered promiscuous mode [ 129.329443][ T5676] device wg2 entered promiscuous mode [ 129.345023][ T5698] bond_slave_1: mtu less than device minimum [ 129.585444][ T5718] device pim6reg1 entered promiscuous mode [ 129.969139][ T5740] bond_slave_1: mtu less than device minimum [ 130.182012][ T5757] device pim6reg1 entered promiscuous mode [ 130.518795][ T5778] device pim6reg1 entered promiscuous mode [ 131.226047][ T5818] device pim6reg1 entered promiscuous mode [ 131.379253][ T5825] syz.1.2053[5825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.379337][ T5825] syz.1.2053[5825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.584376][ T5831] device pim6reg1 entered promiscuous mode [ 131.832983][ T5841] net_ratelimit: 4 callbacks suppressed [ 131.833028][ T5841] bond_slave_1: mtu less than device minimum [ 132.698530][ T5860] bond_slave_1: mtu less than device minimum [ 133.290229][ T5897] bond_slave_1: mtu less than device minimum [ 133.296922][ T5890] bond_slave_1: mtu less than device minimum [ 133.365037][ T5899] bond_slave_1: mtu less than device minimum [ 134.185103][ T5941] bond_slave_1: mtu less than device minimum [ 134.211685][ T5942] bond_slave_1: mtu less than device minimum [ 134.303866][ T5952] syz.2.2105[5952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.303955][ T5952] syz.2.2105[5952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.788801][ T5975] bond_slave_1: mtu less than device minimum [ 134.941130][ T5987] bond_slave_1: mtu less than device minimum [ 135.663253][ T6023] bond_slave_1: mtu less than device minimum [ 135.944356][ T6037] syz.0.2154[6037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.944440][ T6037] syz.0.2154[6037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.013975][ T6103] FAULT_INJECTION: forcing a failure. [ 137.013975][ T6103] name failslab, interval 1, probability 0, space 0, times 0 [ 137.028506][ T6105] net_ratelimit: 4 callbacks suppressed [ 137.028524][ T6105] bond_slave_1: mtu less than device minimum [ 137.083648][ T6103] CPU: 0 PID: 6103 Comm: syz.2.2171 Not tainted syzkaller #0 [ 137.091092][ T6103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 137.101404][ T6103] Call Trace: [ 137.104699][ T6103] [ 137.107734][ T6103] __dump_stack+0x21/0x24 [ 137.112081][ T6103] dump_stack_lvl+0xee/0x150 [ 137.116773][ T6103] ? __cfi_dump_stack_lvl+0x8/0x8 [ 137.121922][ T6103] ? stack_trace_save+0x98/0xe0 [ 137.126863][ T6103] dump_stack+0x15/0x24 [ 137.131013][ T6103] should_fail_ex+0x3d4/0x520 [ 137.135693][ T6103] __should_failslab+0xac/0xf0 [ 137.140456][ T6103] should_failslab+0x9/0x20 [ 137.145045][ T6103] kmem_cache_alloc_node+0x42/0x340 [ 137.150336][ T6103] ? dup_task_struct+0x5a/0x790 [ 137.155191][ T6103] dup_task_struct+0x5a/0x790 [ 137.159868][ T6103] ? __kasan_check_write+0x14/0x20 [ 137.165002][ T6103] ? recalc_sigpending+0x168/0x1c0 [ 137.170184][ T6103] copy_process+0x5b8/0x3480 [ 137.174859][ T6103] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 137.180583][ T6103] ? __kasan_check_write+0x14/0x20 [ 137.185695][ T6103] ? idle_dummy+0x10/0x10 [ 137.190027][ T6103] kernel_clone+0x23a/0x810 [ 137.194550][ T6103] ? __cfi_kernel_clone+0x10/0x10 [ 137.199580][ T6103] ? __kasan_check_write+0x14/0x20 [ 137.204695][ T6103] ? mutex_unlock+0x89/0x220 [ 137.209303][ T6103] __x64_sys_clone+0x168/0x1b0 [ 137.214118][ T6103] ? __cfi___x64_sys_clone+0x10/0x10 [ 137.219446][ T6103] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 137.225523][ T6103] x64_sys_call+0x990/0x9a0 [ 137.230122][ T6103] do_syscall_64+0x4c/0xa0 [ 137.234626][ T6103] ? clear_bhb_loop+0x30/0x80 [ 137.239390][ T6103] ? clear_bhb_loop+0x30/0x80 [ 137.244153][ T6103] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 137.250043][ T6103] RIP: 0033:0x7fc42958eba9 [ 137.254455][ T6103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.274063][ T6103] RSP: 002b:00007fc42a4d1fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 137.282592][ T6103] RAX: ffffffffffffffda RBX: 00007fc4297d5fa0 RCX: 00007fc42958eba9 [ 137.290828][ T6103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 137.298977][ T6103] RBP: 00007fc42a4d2090 R08: 0000000000000000 R09: 0000000000000000 [ 137.307129][ T6103] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 137.315104][ T6103] R13: 00007fc4297d6038 R14: 00007fc4297d5fa0 R15: 00007ffc97e4b7e8 [ 137.323168][ T6103] [ 137.426525][ T6115] device pim6reg1 entered promiscuous mode [ 137.471278][ T6111] bond_slave_1: mtu less than device minimum [ 137.760497][ T6134] bond_slave_1: mtu less than device minimum [ 137.810916][ T6141] bond_slave_1: mtu less than device minimum [ 137.824421][ T6145] syz.4.2187[6145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.824796][ T6145] syz.4.2187[6145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.967345][ T6152] bond_slave_1: mtu less than device minimum [ 138.115665][ T6154] device veth1_macvtap left promiscuous mode [ 138.969950][ T6175] device pim6reg1 entered promiscuous mode [ 139.117045][ T6185] bond_slave_1: mtu less than device minimum [ 139.171018][ T6190] bond_slave_1: mtu less than device minimum [ 139.203102][ T6195] bond_slave_1: mtu less than device minimum [ 139.257309][ T6202] bond_slave_1: mtu less than device minimum [ 139.749224][ T6224] bond_slave_1: mtu less than device minimum [ 141.049193][ T6233] device pim6reg1 entered promiscuous mode [ 141.353377][ T6273] FAULT_INJECTION: forcing a failure. [ 141.353377][ T6273] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.442537][ T6273] CPU: 0 PID: 6273 Comm: syz.3.2237 Not tainted syzkaller #0 [ 141.450086][ T6273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 141.460158][ T6273] Call Trace: [ 141.463450][ T6273] [ 141.466396][ T6273] __dump_stack+0x21/0x24 [ 141.470810][ T6273] dump_stack_lvl+0xee/0x150 [ 141.475398][ T6273] ? __cfi_dump_stack_lvl+0x8/0x8 [ 141.480426][ T6273] dump_stack+0x15/0x24 [ 141.484747][ T6273] should_fail_ex+0x3d4/0x520 [ 141.489429][ T6273] should_fail+0xb/0x10 [ 141.493588][ T6273] should_fail_usercopy+0x1a/0x20 [ 141.498621][ T6273] _copy_from_user+0x1e/0xc0 [ 141.503301][ T6273] sock_do_ioctl+0x186/0x310 [ 141.507923][ T6273] ? sock_show_fdinfo+0xb0/0xb0 [ 141.512789][ T6273] ? selinux_file_ioctl+0x377/0x480 [ 141.517991][ T6273] sock_ioctl+0x4d8/0x6e0 [ 141.522416][ T6273] ? __cfi_sock_ioctl+0x10/0x10 [ 141.527452][ T6273] ? __fget_files+0x2d5/0x330 [ 141.532292][ T6273] ? security_file_ioctl+0x95/0xc0 [ 141.537752][ T6273] ? __cfi_sock_ioctl+0x10/0x10 [ 141.542692][ T6273] __se_sys_ioctl+0x12f/0x1b0 [ 141.547453][ T6273] __x64_sys_ioctl+0x7b/0x90 [ 141.552146][ T6273] x64_sys_call+0x58b/0x9a0 [ 141.556765][ T6273] do_syscall_64+0x4c/0xa0 [ 141.561176][ T6273] ? clear_bhb_loop+0x30/0x80 [ 141.565936][ T6273] ? clear_bhb_loop+0x30/0x80 [ 141.570616][ T6273] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 141.576518][ T6273] RIP: 0033:0x7fa8d458eba9 [ 141.581103][ T6273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.600718][ T6273] RSP: 002b:00007fa8d5504038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 141.609216][ T6273] RAX: ffffffffffffffda RBX: 00007fa8d47d5fa0 RCX: 00007fa8d458eba9 [ 141.617360][ T6273] RDX: 00002000000001c0 RSI: 0000000000008924 RDI: 0000000000000009 [ 141.625341][ T6273] RBP: 00007fa8d5504090 R08: 0000000000000000 R09: 0000000000000000 [ 141.633502][ T6273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.641470][ T6273] R13: 00007fa8d47d6038 R14: 00007fa8d47d5fa0 R15: 00007ffd5aa64228 [ 141.649621][ T6273] [ 142.301876][ T6306] net_ratelimit: 4 callbacks suppressed [ 142.301933][ T6306] bond_slave_1: mtu less than device minimum [ 142.395586][ T6318] FAULT_INJECTION: forcing a failure. [ 142.395586][ T6318] name failslab, interval 1, probability 0, space 0, times 0 [ 142.508242][ T6318] CPU: 0 PID: 6318 Comm: syz.0.2253 Not tainted syzkaller #0 [ 142.515673][ T6318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 142.525925][ T6318] Call Trace: [ 142.529308][ T6318] [ 142.532251][ T6318] __dump_stack+0x21/0x24 [ 142.536597][ T6318] dump_stack_lvl+0xee/0x150 [ 142.541213][ T6318] ? __cfi_dump_stack_lvl+0x8/0x8 [ 142.546360][ T6318] dump_stack+0x15/0x24 [ 142.550642][ T6318] should_fail_ex+0x3d4/0x520 [ 142.555343][ T6318] ? prepare_creds+0x2f/0x640 [ 142.560235][ T6318] __should_failslab+0xac/0xf0 [ 142.565019][ T6318] should_failslab+0x9/0x20 [ 142.569538][ T6318] kmem_cache_alloc+0x3b/0x330 [ 142.574502][ T6318] prepare_creds+0x2f/0x640 [ 142.579032][ T6318] ? memcpy+0x56/0x70 [ 142.583025][ T6318] copy_creds+0xe4/0x640 [ 142.587282][ T6318] copy_process+0x828/0x3480 [ 142.591892][ T6318] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 142.597636][ T6318] ? __kasan_check_write+0x14/0x20 [ 142.602856][ T6318] ? idle_dummy+0x10/0x10 [ 142.607423][ T6318] kernel_clone+0x23a/0x810 [ 142.611950][ T6318] ? __cfi_kernel_clone+0x10/0x10 [ 142.617080][ T6318] ? __kasan_check_write+0x14/0x20 [ 142.622268][ T6318] ? mutex_unlock+0x89/0x220 [ 142.626970][ T6318] __x64_sys_clone+0x168/0x1b0 [ 142.631765][ T6318] ? __cfi___x64_sys_clone+0x10/0x10 [ 142.637252][ T6318] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 142.643427][ T6318] x64_sys_call+0x990/0x9a0 [ 142.647973][ T6318] do_syscall_64+0x4c/0xa0 [ 142.652580][ T6318] ? clear_bhb_loop+0x30/0x80 [ 142.657289][ T6318] ? clear_bhb_loop+0x30/0x80 [ 142.662083][ T6318] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 142.668001][ T6318] RIP: 0033:0x7f248818eba9 [ 142.672433][ T6318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.693183][ T6318] RSP: 002b:00007f2488f85fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 142.701709][ T6318] RAX: ffffffffffffffda RBX: 00007f24883d5fa0 RCX: 00007f248818eba9 [ 142.709788][ T6318] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 142.717778][ T6318] RBP: 00007f2488f86090 R08: 0000000000000000 R09: 0000000000000000 [ 142.725768][ T6318] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 142.733786][ T6318] R13: 00007f24883d6038 R14: 00007f24883d5fa0 R15: 00007ffed21be8e8 [ 142.741870][ T6318] [ 142.834027][ T6327] bond_slave_1: mtu less than device minimum [ 143.513929][ T6355] bond_slave_1: mtu less than device minimum [ 143.716317][ T6371] FAULT_INJECTION: forcing a failure. [ 143.716317][ T6371] name failslab, interval 1, probability 0, space 0, times 0 [ 143.803292][ T6371] CPU: 0 PID: 6371 Comm: syz.2.2275 Not tainted syzkaller #0 [ 143.810731][ T6371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 143.820807][ T6371] Call Trace: [ 143.824147][ T6371] [ 143.827102][ T6371] __dump_stack+0x21/0x24 [ 143.831469][ T6371] dump_stack_lvl+0xee/0x150 [ 143.836173][ T6371] ? __cfi_dump_stack_lvl+0x8/0x8 [ 143.841228][ T6371] ? rwsem_read_trylock+0x29a/0x620 [ 143.846725][ T6371] dump_stack+0x15/0x24 [ 143.850913][ T6371] should_fail_ex+0x3d4/0x520 [ 143.855711][ T6371] __should_failslab+0xac/0xf0 [ 143.860538][ T6371] should_failslab+0x9/0x20 [ 143.865060][ T6371] kmem_cache_alloc_node+0x42/0x340 [ 143.870286][ T6371] ? __alloc_skb+0xea/0x4b0 [ 143.874813][ T6371] ? br_get_link_af_size_filtered+0x152/0x180 [ 143.880997][ T6371] __alloc_skb+0xea/0x4b0 [ 143.885379][ T6371] rtmsg_ifinfo_build_skb+0x7c/0x190 [ 143.890688][ T6371] rtnetlink_event+0xd2/0x1a0 [ 143.895398][ T6371] raw_notifier_call_chain+0xa1/0x110 [ 143.900883][ T6371] dev_set_mac_address+0x329/0x430 [ 143.906052][ T6371] ? __cfi_dev_set_mac_address+0x10/0x10 [ 143.911713][ T6371] dev_set_mac_address_user+0x31/0x50 [ 143.917114][ T6371] dev_ifsioc+0x770/0xed0 [ 143.921476][ T6371] ? dev_ioctl+0xd10/0xd10 [ 143.926260][ T6371] ? __kasan_check_write+0x14/0x20 [ 143.931494][ T6371] ? mutex_lock+0x8d/0x1a0 [ 143.936111][ T6371] ? __cfi_mutex_lock+0x10/0x10 [ 143.940983][ T6371] ? dev_get_by_name_rcu+0xe5/0x130 [ 143.946298][ T6371] dev_ioctl+0x556/0xd10 [ 143.950748][ T6371] sock_do_ioctl+0x23f/0x310 [ 143.955372][ T6371] ? sock_show_fdinfo+0xb0/0xb0 [ 143.960334][ T6371] ? selinux_file_ioctl+0x377/0x480 [ 143.965657][ T6371] sock_ioctl+0x4d8/0x6e0 [ 143.970035][ T6371] ? __cfi_sock_ioctl+0x10/0x10 [ 143.974909][ T6371] ? __fget_files+0x2d5/0x330 [ 143.979689][ T6371] ? security_file_ioctl+0x95/0xc0 [ 143.984902][ T6371] ? __cfi_sock_ioctl+0x10/0x10 [ 143.989762][ T6371] __se_sys_ioctl+0x12f/0x1b0 [ 143.994452][ T6371] __x64_sys_ioctl+0x7b/0x90 [ 143.999055][ T6371] x64_sys_call+0x58b/0x9a0 [ 144.003570][ T6371] do_syscall_64+0x4c/0xa0 [ 144.008022][ T6371] ? clear_bhb_loop+0x30/0x80 [ 144.012799][ T6371] ? clear_bhb_loop+0x30/0x80 [ 144.017583][ T6371] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 144.023576][ T6371] RIP: 0033:0x7fc42958eba9 [ 144.028007][ T6371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.047714][ T6371] RSP: 002b:00007fc42a4d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 144.056140][ T6371] RAX: ffffffffffffffda RBX: 00007fc4297d5fa0 RCX: 00007fc42958eba9 [ 144.064125][ T6371] RDX: 00002000000001c0 RSI: 0000000000008924 RDI: 0000000000000009 [ 144.072110][ T6371] RBP: 00007fc42a4d2090 R08: 0000000000000000 R09: 0000000000000000 [ 144.080093][ T6371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.088074][ T6371] R13: 00007fc4297d6038 R14: 00007fc4297d5fa0 R15: 00007ffc97e4b7e8 [ 144.096065][ T6371] [ 144.128732][ T6386] bond_slave_1: mtu less than device minimum [ 144.158908][ T6389] bond_slave_1: mtu less than device minimum [ 144.443618][ T6413] FAULT_INJECTION: forcing a failure. [ 144.443618][ T6413] name failslab, interval 1, probability 0, space 0, times 0 [ 144.471333][ T6413] CPU: 0 PID: 6413 Comm: syz.0.2292 Not tainted syzkaller #0 [ 144.478942][ T6413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 144.489113][ T6413] Call Trace: [ 144.492500][ T6413] [ 144.495444][ T6413] __dump_stack+0x21/0x24 [ 144.499791][ T6413] dump_stack_lvl+0xee/0x150 [ 144.504401][ T6413] ? __cfi_dump_stack_lvl+0x8/0x8 [ 144.509442][ T6413] ? kasan_set_track+0x60/0x70 [ 144.514318][ T6413] ? kasan_set_track+0x4b/0x70 [ 144.519119][ T6413] ? kasan_save_alloc_info+0x25/0x30 [ 144.524433][ T6413] dump_stack+0x15/0x24 [ 144.528695][ T6413] should_fail_ex+0x3d4/0x520 [ 144.533578][ T6413] __should_failslab+0xac/0xf0 [ 144.538630][ T6413] should_failslab+0x9/0x20 [ 144.543150][ T6413] kmem_cache_alloc_node+0x42/0x340 [ 144.548455][ T6413] ? alloc_vmap_area+0x17b/0x1870 [ 144.553761][ T6413] alloc_vmap_area+0x17b/0x1870 [ 144.558729][ T6413] ? vm_map_ram+0x930/0x930 [ 144.563355][ T6413] ? __kasan_kmalloc+0x95/0xb0 [ 144.568152][ T6413] ? kmalloc_node_trace+0x3d/0xb0 [ 144.568991][ T6419] bond_slave_1: mtu less than device minimum [ 144.573197][ T6413] __get_vm_area_node+0x160/0x360 [ 144.573231][ T6413] __vmalloc_node_range+0x326/0x13d0 [ 144.573249][ T6413] ? copy_process+0x5b8/0x3480 [ 144.594389][ T6413] ? kasan_save_alloc_info+0x25/0x30 [ 144.599704][ T6413] ? __cfi___vmalloc_node_range+0x10/0x10 [ 144.605467][ T6413] ? __slab_alloc+0x6b/0xa0 [ 144.610183][ T6413] ? memcpy+0x56/0x70 [ 144.614191][ T6413] dup_task_struct+0x3ae/0x790 [ 144.618985][ T6413] ? copy_process+0x5b8/0x3480 [ 144.623859][ T6413] ? __kasan_check_write+0x14/0x20 [ 144.629003][ T6413] ? recalc_sigpending+0x168/0x1c0 [ 144.634410][ T6413] copy_process+0x5b8/0x3480 [ 144.639032][ T6413] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 144.644783][ T6413] ? __kasan_check_write+0x14/0x20 [ 144.649930][ T6413] ? idle_dummy+0x10/0x10 [ 144.654357][ T6413] kernel_clone+0x23a/0x810 [ 144.658965][ T6413] ? __cfi_kernel_clone+0x10/0x10 [ 144.664079][ T6413] ? __kasan_check_write+0x14/0x20 [ 144.669283][ T6413] ? mutex_unlock+0x89/0x220 [ 144.673900][ T6413] __x64_sys_clone+0x168/0x1b0 [ 144.678758][ T6413] ? __cfi___x64_sys_clone+0x10/0x10 [ 144.684127][ T6413] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 144.690286][ T6413] x64_sys_call+0x990/0x9a0 [ 144.695095][ T6413] do_syscall_64+0x4c/0xa0 [ 144.699512][ T6413] ? clear_bhb_loop+0x30/0x80 [ 144.704296][ T6413] ? clear_bhb_loop+0x30/0x80 [ 144.709014][ T6413] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 144.714960][ T6413] RIP: 0033:0x7f248818eba9 [ 144.719389][ T6413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.739137][ T6413] RSP: 002b:00007f2488f85fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 144.747663][ T6413] RAX: ffffffffffffffda RBX: 00007f24883d5fa0 RCX: 00007f248818eba9 [ 144.755807][ T6413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 144.764206][ T6413] RBP: 00007f2488f86090 R08: 0000000000000000 R09: 0000000000000000 [ 144.772271][ T6413] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 144.780341][ T6413] R13: 00007f24883d6038 R14: 00007f24883d5fa0 R15: 00007ffed21be8e8 [ 144.788326][ T6413] [ 144.792434][ T6413] syz.0.2292: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 144.809476][ T6413] CPU: 0 PID: 6413 Comm: syz.0.2292 Not tainted syzkaller #0 [ 144.817223][ T6413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 144.827293][ T6413] Call Trace: [ 144.830583][ T6413] [ 144.833524][ T6413] __dump_stack+0x21/0x24 [ 144.837949][ T6413] dump_stack_lvl+0xee/0x150 [ 144.842567][ T6413] ? __cfi_dump_stack_lvl+0x8/0x8 [ 144.847678][ T6413] ? pr_cont_kernfs_name+0x133/0x160 [ 144.853093][ T6413] dump_stack+0x15/0x24 [ 144.857242][ T6413] warn_alloc+0x1b0/0x1d0 [ 144.861679][ T6413] ? __cfi_warn_alloc+0x10/0x10 [ 144.866558][ T6413] ? __get_vm_area_node+0x175/0x360 [ 144.871776][ T6413] __vmalloc_node_range+0x34b/0x13d0 [ 144.877072][ T6413] ? kasan_save_alloc_info+0x25/0x30 [ 144.882362][ T6413] ? __cfi___vmalloc_node_range+0x10/0x10 [ 144.888096][ T6413] ? __slab_alloc+0x6b/0xa0 [ 144.892604][ T6413] ? memcpy+0x56/0x70 [ 144.896583][ T6413] dup_task_struct+0x3ae/0x790 [ 144.901362][ T6413] ? copy_process+0x5b8/0x3480 [ 144.906211][ T6413] ? __kasan_check_write+0x14/0x20 [ 144.911438][ T6413] ? recalc_sigpending+0x168/0x1c0 [ 144.917075][ T6413] copy_process+0x5b8/0x3480 [ 144.921669][ T6413] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 144.927569][ T6413] ? __kasan_check_write+0x14/0x20 [ 144.932688][ T6413] ? idle_dummy+0x10/0x10 [ 144.937022][ T6413] kernel_clone+0x23a/0x810 [ 144.941537][ T6413] ? __cfi_kernel_clone+0x10/0x10 [ 144.946565][ T6413] ? __kasan_check_write+0x14/0x20 [ 144.951722][ T6413] ? mutex_unlock+0x89/0x220 [ 144.956409][ T6413] __x64_sys_clone+0x168/0x1b0 [ 144.961275][ T6413] ? __cfi___x64_sys_clone+0x10/0x10 [ 144.966653][ T6413] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 144.972722][ T6413] x64_sys_call+0x990/0x9a0 [ 144.977225][ T6413] do_syscall_64+0x4c/0xa0 [ 144.981638][ T6413] ? clear_bhb_loop+0x30/0x80 [ 144.986314][ T6413] ? clear_bhb_loop+0x30/0x80 [ 144.991078][ T6413] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 144.996978][ T6413] RIP: 0033:0x7f248818eba9 [ 145.001481][ T6413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.021433][ T6413] RSP: 002b:00007f2488f85fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 145.029843][ T6413] RAX: ffffffffffffffda RBX: 00007f24883d5fa0 RCX: 00007f248818eba9 [ 145.037811][ T6413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 145.045877][ T6413] RBP: 00007f2488f86090 R08: 0000000000000000 R09: 0000000000000000 [ 145.053933][ T6413] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 145.061905][ T6413] R13: 00007f24883d6038 R14: 00007f24883d5fa0 R15: 00007ffed21be8e8 [ 145.069883][ T6413] [ 145.085837][ T6413] Mem-Info: [ 145.089745][ T6416] ±ÿ: renamed from team_slave_1 [ 145.090345][ T6413] active_anon:8783 inactive_anon:0 isolated_anon:0 [ 145.090345][ T6413] active_file:29918 inactive_file:2259 isolated_file:0 [ 145.090345][ T6413] unevictable:0 dirty:531 writeback:0 [ 145.090345][ T6413] slab_reclaimable:8407 slab_unreclaimable:75628 [ 145.090345][ T6413] mapped:29555 shmem:163 pagetables:607 [ 145.090345][ T6413] sec_pagetables:0 bounce:0 [ 145.090345][ T6413] kernel_misc_reclaimable:0 [ 145.090345][ T6413] free:1510444 free_pcp:6309 free_cma:0 [ 145.140372][ T6413] Node 0 active_anon:35132kB inactive_anon:0kB active_file:119672kB inactive_file:9036kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118220kB dirty:2124kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5476kB pagetables:2428kB sec_pagetables:0kB all_unreclaimable? no [ 145.173897][ T6413] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974204kB mlocked:0kB bounce:0kB free_pcp:5672kB local_pcp:0kB free_cma:0kB [ 145.205336][ T6413] lowmem_reserve[]: 0 3932 3932 3932 [ 145.215472][ T6413] Normal free:3073244kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:35132kB inactive_anon:0kB active_file:119672kB inactive_file:9036kB unevictable:0kB writepending:2124kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:19556kB local_pcp:16060kB free_cma:0kB [ 145.246287][ T6413] lowmem_reserve[]: 0 0 0 0 [ 145.251066][ T6413] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 145.266744][ T6413] Normal: 1297*4kB (UME) 2301*8kB (UM) 2057*16kB (UME) 1649*32kB (UME) 932*64kB (UM) 336*128kB (UME) 145*256kB (UM) 100*512kB (UME) 62*1024kB (UM) 15*2048kB (UM) 654*4096kB (UME) = 3073244kB [ 145.295712][ T6413] 32340 total pagecache pages [ 145.300681][ T6413] 0 pages in swap cache [ 145.305241][ T6413] Free swap = 124996kB [ 145.309589][ T6413] Total swap = 124996kB [ 145.320555][ T6413] 2097051 pages RAM [ 145.324961][ T6413] 0 pages HighMem/MovableOnly [ 145.330037][ T6413] 346836 pages reserved [ 145.352651][ T6413] 0 pages cma reserved [ 145.401357][ T6450] bond_slave_1: mtu less than device minimum [ 145.618735][ T6477] FAULT_INJECTION: forcing a failure. [ 145.618735][ T6477] name failslab, interval 1, probability 0, space 0, times 0 [ 145.632121][ T6477] CPU: 0 PID: 6477 Comm: syz.4.2315 Not tainted syzkaller #0 [ 145.639526][ T6477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 145.649815][ T6477] Call Trace: [ 145.653298][ T6477] [ 145.656246][ T6477] __dump_stack+0x21/0x24 [ 145.660676][ T6477] dump_stack_lvl+0xee/0x150 [ 145.665370][ T6477] ? __cfi_dump_stack_lvl+0x8/0x8 [ 145.670416][ T6477] dump_stack+0x15/0x24 [ 145.674589][ T6477] should_fail_ex+0x3d4/0x520 [ 145.679291][ T6477] __should_failslab+0xac/0xf0 [ 145.684257][ T6477] should_failslab+0x9/0x20 [ 145.688866][ T6477] kmem_cache_alloc_node+0x42/0x340 [ 145.694341][ T6477] ? bpf_trace_run2+0x104/0x250 [ 145.699215][ T6477] ? __alloc_skb+0xea/0x4b0 [ 145.703742][ T6477] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 145.709888][ T6477] __alloc_skb+0xea/0x4b0 [ 145.714337][ T6477] fdb_notify+0x78/0x130 [ 145.718608][ T6477] fdb_delete+0x8b9/0xb20 [ 145.722960][ T6477] fdb_delete_local+0x3c8/0x480 [ 145.727841][ T6477] br_fdb_changeaddr+0x1b3/0x1c0 [ 145.732901][ T6477] br_device_event+0x33c/0x770 [ 145.737685][ T6477] ? __cfi_br_device_event+0x10/0x10 [ 145.743127][ T6477] ? packet_notifier+0x8cf/0x8e0 [ 145.748096][ T6477] ? ip6mr_device_event+0x1e0/0x200 [ 145.753381][ T6477] raw_notifier_call_chain+0xa1/0x110 [ 145.758756][ T6477] dev_set_mac_address+0x329/0x430 [ 145.763966][ T6477] ? __cfi_dev_set_mac_address+0x10/0x10 [ 145.769593][ T6477] dev_set_mac_address_user+0x31/0x50 [ 145.774969][ T6477] dev_ifsioc+0x770/0xed0 [ 145.779295][ T6477] ? dev_ioctl+0xd10/0xd10 [ 145.783839][ T6477] ? __mutex_lock_slowpath+0xe/0x10 [ 145.789035][ T6477] ? mutex_lock+0xf8/0x1a0 [ 145.793558][ T6477] ? __cfi_mutex_lock+0x10/0x10 [ 145.798433][ T6477] ? dev_get_by_name_rcu+0xe5/0x130 [ 145.803744][ T6477] dev_ioctl+0x556/0xd10 [ 145.807993][ T6477] sock_do_ioctl+0x23f/0x310 [ 145.812597][ T6477] ? sock_show_fdinfo+0xb0/0xb0 [ 145.817444][ T6477] ? selinux_file_ioctl+0x377/0x480 [ 145.822821][ T6477] sock_ioctl+0x4d8/0x6e0 [ 145.827149][ T6477] ? __cfi_sock_ioctl+0x10/0x10 [ 145.832091][ T6477] ? __fget_files+0x2d5/0x330 [ 145.836786][ T6477] ? security_file_ioctl+0x95/0xc0 [ 145.841935][ T6477] ? __cfi_sock_ioctl+0x10/0x10 [ 145.846800][ T6477] __se_sys_ioctl+0x12f/0x1b0 [ 145.851498][ T6477] __x64_sys_ioctl+0x7b/0x90 [ 145.856102][ T6477] x64_sys_call+0x58b/0x9a0 [ 145.860722][ T6477] do_syscall_64+0x4c/0xa0 [ 145.865147][ T6477] ? clear_bhb_loop+0x30/0x80 [ 145.869933][ T6477] ? clear_bhb_loop+0x30/0x80 [ 145.874699][ T6477] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 145.880586][ T6477] RIP: 0033:0x7f963378eba9 [ 145.885101][ T6477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.904964][ T6477] RSP: 002b:00007f96345f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 145.913467][ T6477] RAX: ffffffffffffffda RBX: 00007f96339d5fa0 RCX: 00007f963378eba9 [ 145.921805][ T6477] RDX: 00002000000001c0 RSI: 0000000000008924 RDI: 0000000000000009 [ 145.929894][ T6477] RBP: 00007f96345f7090 R08: 0000000000000000 R09: 0000000000000000 [ 145.938664][ T6477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.946908][ T6477] R13: 00007f96339d6038 R14: 00007f96339d5fa0 R15: 00007fffeeacebd8 [ 145.954919][ T6477] [ 146.071080][ T6493] bond_slave_1: mtu less than device minimum [ 147.553709][ T6528] bond_slave_1: mtu less than device minimum [ 147.730082][ T6545] device macsec0 entered promiscuous mode [ 147.852356][ T6561] FAULT_INJECTION: forcing a failure. [ 147.852356][ T6561] name failslab, interval 1, probability 0, space 0, times 0 [ 147.865220][ T6561] CPU: 0 PID: 6561 Comm: syz.1.2354 Not tainted syzkaller #0 [ 147.872885][ T6561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 147.883049][ T6561] Call Trace: [ 147.886383][ T6561] [ 147.889327][ T6561] __dump_stack+0x21/0x24 [ 147.893681][ T6561] dump_stack_lvl+0xee/0x150 [ 147.898471][ T6561] ? __cfi_dump_stack_lvl+0x8/0x8 [ 147.903519][ T6561] dump_stack+0x15/0x24 [ 147.907784][ T6561] should_fail_ex+0x3d4/0x520 [ 147.912487][ T6561] __should_failslab+0xac/0xf0 [ 147.917365][ T6561] should_failslab+0x9/0x20 [ 147.921888][ T6561] kmem_cache_alloc_node+0x42/0x340 [ 147.927345][ T6561] ? __kasan_check_write+0x14/0x20 [ 147.932484][ T6561] ? __alloc_skb+0xea/0x4b0 [ 147.937008][ T6561] __alloc_skb+0xea/0x4b0 [ 147.941357][ T6561] ? __kasan_check_read+0x11/0x20 [ 147.946487][ T6561] fdb_notify+0x78/0x130 [ 147.950848][ T6561] fdb_add_local+0x16b/0x260 [ 147.955549][ T6561] br_fdb_changeaddr+0x187/0x1c0 [ 147.960512][ T6561] br_device_event+0x33c/0x770 [ 147.965484][ T6561] ? __cfi_br_device_event+0x10/0x10 [ 147.970947][ T6561] ? packet_notifier+0x8cf/0x8e0 [ 147.975973][ T6561] ? ip6mr_device_event+0x1e0/0x200 [ 147.981174][ T6561] raw_notifier_call_chain+0xa1/0x110 [ 147.986652][ T6561] dev_set_mac_address+0x329/0x430 [ 147.991860][ T6561] ? __cfi_dev_set_mac_address+0x10/0x10 [ 147.997510][ T6561] dev_set_mac_address_user+0x31/0x50 [ 148.002882][ T6561] dev_ifsioc+0x770/0xed0 [ 148.007262][ T6561] ? dev_ioctl+0xd10/0xd10 [ 148.011937][ T6561] ? __kasan_check_write+0x14/0x20 [ 148.017052][ T6561] ? mutex_lock+0x8d/0x1a0 [ 148.021475][ T6561] ? __cfi_mutex_lock+0x10/0x10 [ 148.026678][ T6561] ? dev_get_by_name_rcu+0xe5/0x130 [ 148.031879][ T6561] dev_ioctl+0x556/0xd10 [ 148.036225][ T6561] sock_do_ioctl+0x23f/0x310 [ 148.040905][ T6561] ? sock_show_fdinfo+0xb0/0xb0 [ 148.045773][ T6561] ? selinux_file_ioctl+0x377/0x480 [ 148.050976][ T6561] sock_ioctl+0x4d8/0x6e0 [ 148.055304][ T6561] ? __cfi_sock_ioctl+0x10/0x10 [ 148.060252][ T6561] ? __fget_files+0x2d5/0x330 [ 148.065111][ T6561] ? security_file_ioctl+0x95/0xc0 [ 148.070319][ T6561] ? __cfi_sock_ioctl+0x10/0x10 [ 148.075388][ T6561] __se_sys_ioctl+0x12f/0x1b0 [ 148.080177][ T6561] __x64_sys_ioctl+0x7b/0x90 [ 148.084853][ T6561] x64_sys_call+0x58b/0x9a0 [ 148.089615][ T6561] do_syscall_64+0x4c/0xa0 [ 148.094028][ T6561] ? clear_bhb_loop+0x30/0x80 [ 148.098720][ T6561] ? clear_bhb_loop+0x30/0x80 [ 148.103395][ T6561] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 148.109547][ T6561] RIP: 0033:0x7fd62b98eba9 [ 148.114050][ T6561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.134870][ T6561] RSP: 002b:00007fd62a3f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 148.143457][ T6561] RAX: ffffffffffffffda RBX: 00007fd62bbd5fa0 RCX: 00007fd62b98eba9 [ 148.151613][ T6561] RDX: 00002000000001c0 RSI: 0000000000008924 RDI: 0000000000000009 [ 148.159602][ T6561] RBP: 00007fd62a3f7090 R08: 0000000000000000 R09: 0000000000000000 [ 148.167671][ T6561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.175733][ T6561] R13: 00007fd62bbd6038 R14: 00007fd62bbd5fa0 R15: 00007ffeb48e7ac8 [ 148.183811][ T6561] [ 148.385376][ T6569] bond_slave_1: mtu less than device minimum [ 149.505911][ T6644] FAULT_INJECTION: forcing a failure. [ 149.505911][ T6644] name failslab, interval 1, probability 0, space 0, times 0 [ 149.572119][ T6644] CPU: 0 PID: 6644 Comm: syz.4.2376 Not tainted syzkaller #0 [ 149.579550][ T6644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 149.589817][ T6644] Call Trace: [ 149.593111][ T6644] [ 149.596081][ T6644] __dump_stack+0x21/0x24 [ 149.600433][ T6644] dump_stack_lvl+0xee/0x150 [ 149.605036][ T6644] ? __cfi_dump_stack_lvl+0x8/0x8 [ 149.610418][ T6644] ? __kasan_check_read+0x11/0x20 [ 149.615468][ T6644] dump_stack+0x15/0x24 [ 149.619658][ T6644] should_fail_ex+0x3d4/0x520 [ 149.624450][ T6644] __should_failslab+0xac/0xf0 [ 149.629333][ T6644] should_failslab+0x9/0x20 [ 149.634065][ T6644] kmem_cache_alloc_node+0x42/0x340 [ 149.639299][ T6644] ? __alloc_skb+0xea/0x4b0 [ 149.643827][ T6644] __alloc_skb+0xea/0x4b0 [ 149.648180][ T6644] ? __cfi_br_handle_frame+0x10/0x10 [ 149.653498][ T6644] br_info_notify+0xae/0x170 [ 149.658120][ T6644] br_ifinfo_notify+0x2a/0x40 [ 149.662821][ T6644] br_device_event+0x6b6/0x770 [ 149.667597][ T6644] ? __cfi_br_device_event+0x10/0x10 [ 149.672977][ T6644] ? packet_notifier+0x8cf/0x8e0 [ 149.677939][ T6644] ? ip6mr_device_event+0x1e0/0x200 [ 149.683229][ T6644] raw_notifier_call_chain+0xa1/0x110 [ 149.688633][ T6644] dev_set_mac_address+0x329/0x430 [ 149.693846][ T6644] ? __cfi_dev_set_mac_address+0x10/0x10 [ 149.699606][ T6644] dev_set_mac_address_user+0x31/0x50 [ 149.705240][ T6644] dev_ifsioc+0x770/0xed0 [ 149.709692][ T6644] ? dev_ioctl+0xd10/0xd10 [ 149.714204][ T6644] ? __kasan_check_write+0x14/0x20 [ 149.719332][ T6644] ? mutex_lock+0x8d/0x1a0 [ 149.723855][ T6644] ? __cfi_mutex_lock+0x10/0x10 [ 149.728716][ T6644] ? dev_get_by_name_rcu+0xe5/0x130 [ 149.734166][ T6644] dev_ioctl+0x556/0xd10 [ 149.738516][ T6644] sock_do_ioctl+0x23f/0x310 [ 149.743125][ T6644] ? sock_show_fdinfo+0xb0/0xb0 [ 149.747980][ T6644] ? selinux_file_ioctl+0x377/0x480 [ 149.753189][ T6644] sock_ioctl+0x4d8/0x6e0 [ 149.757869][ T6644] ? __cfi_sock_ioctl+0x10/0x10 [ 149.762720][ T6644] ? __fget_files+0x2d5/0x330 [ 149.767397][ T6644] ? security_file_ioctl+0x95/0xc0 [ 149.772508][ T6644] ? __cfi_sock_ioctl+0x10/0x10 [ 149.777385][ T6644] __se_sys_ioctl+0x12f/0x1b0 [ 149.782071][ T6644] __x64_sys_ioctl+0x7b/0x90 [ 149.786676][ T6644] x64_sys_call+0x58b/0x9a0 [ 149.791276][ T6644] do_syscall_64+0x4c/0xa0 [ 149.795727][ T6644] ? clear_bhb_loop+0x30/0x80 [ 149.800406][ T6644] ? clear_bhb_loop+0x30/0x80 [ 149.805170][ T6644] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 149.811215][ T6644] RIP: 0033:0x7f963378eba9 [ 149.815738][ T6644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.835532][ T6644] RSP: 002b:00007f96345f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 149.844118][ T6644] RAX: ffffffffffffffda RBX: 00007f96339d5fa0 RCX: 00007f963378eba9 [ 149.852091][ T6644] RDX: 00002000000001c0 RSI: 0000000000008924 RDI: 0000000000000009 [ 149.860097][ T6644] RBP: 00007f96345f7090 R08: 0000000000000000 R09: 0000000000000000 [ 149.868065][ T6644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.876206][ T6644] R13: 00007f96339d6038 R14: 00007f96339d5fa0 R15: 00007fffeeacebd8 [ 149.884354][ T6644] [ 149.929826][ T6658] bond_slave_1: mtu less than device minimum [ 150.265249][ T6692] bond_slave_1: mtu less than device minimum [ 150.320772][ T6688] bond_slave_1: mtu less than device minimum [ 150.578776][ T6733] bond_slave_1: mtu less than device minimum [ 150.638462][ T6745] FAULT_INJECTION: forcing a failure. [ 150.638462][ T6745] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 150.675379][ T6745] CPU: 0 PID: 6745 Comm: syz.2.2420 Not tainted syzkaller #0 [ 150.682900][ T6745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 150.692979][ T6745] Call Trace: [ 150.696276][ T6745] [ 150.699218][ T6745] __dump_stack+0x21/0x24 [ 150.703556][ T6745] dump_stack_lvl+0xee/0x150 [ 150.708195][ T6745] ? __cfi_dump_stack_lvl+0x8/0x8 [ 150.713308][ T6745] dump_stack+0x15/0x24 [ 150.717634][ T6745] should_fail_ex+0x3d4/0x520 [ 150.722318][ T6745] should_fail+0xb/0x10 [ 150.726475][ T6745] should_fail_usercopy+0x1a/0x20 [ 150.731717][ T6745] _copy_to_user+0x1e/0x90 [ 150.736498][ T6745] simple_read_from_buffer+0xe9/0x160 [ 150.741872][ T6745] proc_fail_nth_read+0x19a/0x210 [ 150.747227][ T6745] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 150.752778][ T6745] ? security_file_permission+0x94/0xb0 [ 150.758342][ T6745] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 150.764084][ T6745] vfs_read+0x26e/0x8c0 [ 150.768388][ T6745] ? __cfi_vfs_read+0x10/0x10 [ 150.773423][ T6745] ? __kasan_check_write+0x14/0x20 [ 150.778543][ T6745] ? mutex_lock+0x8d/0x1a0 [ 150.782956][ T6745] ? __cfi_mutex_lock+0x10/0x10 [ 150.787894][ T6745] ? __fdget_pos+0x2cd/0x380 [ 150.792567][ T6745] ? ksys_read+0x71/0x240 [ 150.797075][ T6745] ksys_read+0x140/0x240 [ 150.801373][ T6745] ? __cfi_ksys_read+0x10/0x10 [ 150.806139][ T6745] ? fpregs_restore_userregs+0x128/0x260 [ 150.811772][ T6745] __x64_sys_read+0x7b/0x90 [ 150.816362][ T6745] x64_sys_call+0x2f/0x9a0 [ 150.820868][ T6745] do_syscall_64+0x4c/0xa0 [ 150.825372][ T6745] ? clear_bhb_loop+0x30/0x80 [ 150.830223][ T6745] ? clear_bhb_loop+0x30/0x80 [ 150.834903][ T6745] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 150.840881][ T6745] RIP: 0033:0x7fc42958d5bc [ 150.845477][ T6745] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 150.865361][ T6745] RSP: 002b:00007fc42a4d2030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 150.873779][ T6745] RAX: ffffffffffffffda RBX: 00007fc4297d5fa0 RCX: 00007fc42958d5bc [ 150.881748][ T6745] RDX: 000000000000000f RSI: 00007fc42a4d20a0 RDI: 000000000000000a [ 150.890076][ T6745] RBP: 00007fc42a4d2090 R08: 0000000000000000 R09: 0000000000000000 [ 150.898217][ T6745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 150.906289][ T6745] R13: 00007fc4297d6038 R14: 00007fc4297d5fa0 R15: 00007ffc97e4b7e8 [ 150.914265][ T6745] [ 151.538267][ T6818] bond_slave_1: mtu less than device minimum [ 151.912104][ T6854] bond_slave_1: mtu less than device minimum [ 151.957948][ T6862] FAULT_INJECTION: forcing a failure. [ 151.957948][ T6862] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 151.971191][ T6862] CPU: 0 PID: 6862 Comm: syz.2.2466 Not tainted syzkaller #0 [ 151.978610][ T6862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 151.988668][ T6862] Call Trace: [ 151.991950][ T6862] [ 151.994895][ T6862] __dump_stack+0x21/0x24 [ 151.999304][ T6862] dump_stack_lvl+0xee/0x150 [ 152.003879][ T6862] ? __cfi_dump_stack_lvl+0x8/0x8 [ 152.008906][ T6862] dump_stack+0x15/0x24 [ 152.013050][ T6862] should_fail_ex+0x3d4/0x520 [ 152.017921][ T6862] should_fail+0xb/0x10 [ 152.022089][ T6862] should_fail_usercopy+0x1a/0x20 [ 152.027231][ T6862] _copy_from_user+0x1e/0xc0 [ 152.031832][ T6862] sock_do_ioctl+0x186/0x310 [ 152.036445][ T6862] ? sock_show_fdinfo+0xb0/0xb0 [ 152.041414][ T6862] ? selinux_file_ioctl+0x377/0x480 [ 152.046723][ T6862] sock_ioctl+0x4d8/0x6e0 [ 152.051164][ T6862] ? __cfi_sock_ioctl+0x10/0x10 [ 152.056117][ T6862] ? __fget_files+0x2d5/0x330 [ 152.060878][ T6862] ? security_file_ioctl+0x95/0xc0 [ 152.066176][ T6862] ? __cfi_sock_ioctl+0x10/0x10 [ 152.071028][ T6862] __se_sys_ioctl+0x12f/0x1b0 [ 152.075699][ T6862] __x64_sys_ioctl+0x7b/0x90 [ 152.080285][ T6862] x64_sys_call+0x58b/0x9a0 [ 152.084782][ T6862] do_syscall_64+0x4c/0xa0 [ 152.089227][ T6862] ? clear_bhb_loop+0x30/0x80 [ 152.093997][ T6862] ? clear_bhb_loop+0x30/0x80 [ 152.098679][ T6862] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.104668][ T6862] RIP: 0033:0x7fc42958eba9 [ 152.109080][ T6862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.129339][ T6862] RSP: 002b:00007fc42a4d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 152.137839][ T6862] RAX: ffffffffffffffda RBX: 00007fc4297d5fa0 RCX: 00007fc42958eba9 [ 152.146215][ T6862] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 0000000000000004 [ 152.154280][ T6862] RBP: 00007fc42a4d2090 R08: 0000000000000000 R09: 0000000000000000 [ 152.162373][ T6862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.170344][ T6862] R13: 00007fc4297d6038 R14: 00007fc4297d5fa0 R15: 00007ffc97e4b7e8 [ 152.178329][ T6862] [ 152.185543][ T6851] bond_slave_1: mtu less than device minimum [ 152.202144][ T6861] bond_slave_1: mtu less than device minimum [ 152.572266][ T6972] net_ratelimit: 2 callbacks suppressed [ 152.572284][ T6972] bond_slave_1: mtu less than device minimum [ 152.602818][ T6974] bond_slave_1: mtu less than device minimum [ 152.617805][ T6972] FAULT_INJECTION: forcing a failure. [ 152.617805][ T6972] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 152.682478][ T6972] CPU: 1 PID: 6972 Comm: syz.1.2486 Not tainted syzkaller #0 [ 152.689916][ T6972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 152.699988][ T6972] Call Trace: [ 152.703283][ T6972] [ 152.706392][ T6972] __dump_stack+0x21/0x24 [ 152.710748][ T6972] dump_stack_lvl+0xee/0x150 [ 152.715431][ T6972] ? __cfi_dump_stack_lvl+0x8/0x8 [ 152.720476][ T6972] dump_stack+0x15/0x24 [ 152.724659][ T6972] should_fail_ex+0x3d4/0x520 [ 152.729466][ T6972] should_fail+0xb/0x10 [ 152.733724][ T6972] should_fail_usercopy+0x1a/0x20 [ 152.738771][ T6972] _copy_to_user+0x1e/0x90 [ 152.743381][ T6972] simple_read_from_buffer+0xe9/0x160 [ 152.748796][ T6972] proc_fail_nth_read+0x19a/0x210 [ 152.753856][ T6972] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 152.759577][ T6972] ? security_file_permission+0x94/0xb0 [ 152.765158][ T6972] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 152.770803][ T6972] vfs_read+0x26e/0x8c0 [ 152.774983][ T6972] ? __cfi_vfs_read+0x10/0x10 [ 152.779689][ T6972] ? __kasan_check_write+0x14/0x20 [ 152.784838][ T6972] ? mutex_lock+0x8d/0x1a0 [ 152.789481][ T6972] ? __cfi_mutex_lock+0x10/0x10 [ 152.794521][ T6972] ? __fdget_pos+0x2cd/0x380 [ 152.799216][ T6972] ? ksys_read+0x71/0x240 [ 152.803564][ T6972] ksys_read+0x140/0x240 [ 152.807815][ T6972] ? __cfi_ksys_read+0x10/0x10 [ 152.812673][ T6972] ? fpregs_restore_userregs+0x128/0x260 [ 152.818311][ T6972] __x64_sys_read+0x7b/0x90 [ 152.822818][ T6972] x64_sys_call+0x2f/0x9a0 [ 152.827497][ T6972] do_syscall_64+0x4c/0xa0 [ 152.832129][ T6972] ? clear_bhb_loop+0x30/0x80 [ 152.836804][ T6972] ? clear_bhb_loop+0x30/0x80 [ 152.841614][ T6972] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.847512][ T6972] RIP: 0033:0x7fd62b98d5bc [ 152.851948][ T6972] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 152.871921][ T6972] RSP: 002b:00007fd62a3f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 152.880433][ T6972] RAX: ffffffffffffffda RBX: 00007fd62bbd5fa0 RCX: 00007fd62b98d5bc [ 152.888582][ T6972] RDX: 000000000000000f RSI: 00007fd62a3f70a0 RDI: 0000000000000005 [ 152.896640][ T6972] RBP: 00007fd62a3f7090 R08: 0000000000000000 R09: 0000000000000000 [ 152.904712][ T6972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.912678][ T6972] R13: 00007fd62bbd6038 R14: 00007fd62bbd5fa0 R15: 00007ffeb48e7ac8 [ 152.920745][ T6972] [ 153.079395][ T6988] bond_slave_1: mtu less than device minimum [ 153.088834][ T6989] bond_slave_1: mtu less than device minimum [ 153.353212][ T7024] bond_slave_1: mtu less than device minimum [ 156.141070][ T7237] bond_slave_1: mtu less than device minimum [ 156.781986][ T7294] bond_slave_1: mtu less than device minimum [ 157.448048][ T7349] bond_slave_1: mtu less than device minimum [ 157.672302][ T7361] pim6reg: tun_chr_ioctl cmd 1074812118 [ 158.107576][ T7385] bond_slave_1: mtu less than device minimum [ 158.212434][ T103] udevd[103]: worker [339] terminated by signal 33 (Unknown signal 33) [ 158.220887][ T103] udevd[103]: worker [339] failed while handling '/devices/virtual/block/loop0' [ 158.301192][ T103] udevd[103]: worker [348] terminated by signal 33 (Unknown signal 33) [ 158.320498][ T103] udevd[103]: worker [348] failed while handling '/devices/virtual/block/loop2' [ 158.510369][ T7428] bond_slave_1: mtu less than device minimum [ 158.717219][ T7435] device syzkaller0 entered promiscuous mode [ 158.753070][ T7454] device pim6reg1 entered promiscuous mode [ 159.354626][ T7527] bond_slave_1: mtu less than device minimum [ 159.742722][ T7545] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.769741][ T7545] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.791593][ T7545] device bridge_slave_0 entered promiscuous mode [ 159.810377][ T7545] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.832966][ T7545] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.852953][ T7545] device bridge_slave_1 entered promiscuous mode [ 160.098737][ T6944] device erspan0 left promiscuous mode [ 160.112247][ T6944] GPL: port 1(erspan0) entered disabled state [ 160.194394][ T28] audit: type=1400 audit(1757704352.360:145): avc: denied { create } for pid=7545 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 160.292334][ T28] audit: type=1400 audit(1757704352.360:146): avc: denied { write } for pid=7545 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 160.369452][ T28] audit: type=1400 audit(1757704352.360:147): avc: denied { read } for pid=7545 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 160.433710][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.453117][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.495272][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.529206][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.563445][ T28] audit: type=1400 audit(1757704352.730:148): avc: denied { read } for pid=7592 comm="syz.2.2726" dev="nsfs" ino=4026532471 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 160.607460][ T549] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.614609][ T549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.679718][ T28] audit: type=1400 audit(1757704352.760:149): avc: denied { open } for pid=7592 comm="syz.2.2726" path="net:[4026532471]" dev="nsfs" ino=4026532471 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 160.734431][ T6944] device bridge_slave_1 left promiscuous mode [ 160.740719][ T6944] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.753600][ T6944] device bridge_slave_0 left promiscuous mode [ 160.760473][ T6944] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.803360][ T6944] device veth0_vlan left promiscuous mode [ 161.071522][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.079652][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.089372][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.098444][ T549] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.105544][ T549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.115255][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.149899][ T7612] bond_slave_1: mtu less than device minimum [ 161.170310][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.189353][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.209128][ T7610] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 161.281396][ T7610] device syzkaller0 entered promiscuous mode [ 161.308962][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 161.322656][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.336730][ T7545] device veth0_vlan entered promiscuous mode [ 161.343815][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 161.352319][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.360773][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.370051][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.386133][ T7545] device veth1_macvtap entered promiscuous mode [ 161.397342][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.406485][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.414845][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.460500][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.469002][ T549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.509952][ T7650] device syzkaller0 entered promiscuous mode [ 161.893401][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.901800][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.928040][ T7664] bond_slave_1: mtu less than device minimum [ 162.905630][ T7751] bond_slave_1: mtu less than device minimum [ 163.109597][ T7754] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.116922][ T7754] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.126009][ T7754] device bridge_slave_0 entered promiscuous mode [ 163.136958][ T7754] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.144288][ T7754] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.151916][ T7754] device bridge_slave_1 entered promiscuous mode [ 163.297063][ T7788] device veth1_macvtap left promiscuous mode [ 163.342155][ T7788] device veth1_macvtap entered promiscuous mode [ 163.350417][ T7788] device macsec0 entered promiscuous mode [ 163.767042][ T6944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.784872][ T6944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.843205][ T549] device erspan0 left promiscuous mode [ 163.848804][ T549] GPL: port 1(erspan0) entered disabled state [ 163.902456][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.911220][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.951729][ T6884] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.958871][ T6884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.015817][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.043676][ T6884] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.050789][ T6884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.072810][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.100056][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.110024][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.132266][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.148281][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.183009][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 164.191467][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.204087][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 164.213504][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.233792][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.241579][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.252190][ T549] device bridge_slave_1 left promiscuous mode [ 164.258445][ T549] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.269594][ T549] device bridge_slave_0 left promiscuous mode [ 164.276500][ T549] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.289713][ T549] device veth1_macvtap left promiscuous mode [ 164.296102][ T549] device veth0_vlan left promiscuous mode [ 164.477792][ T7754] device veth0_vlan entered promiscuous mode [ 164.613679][ T7754] device veth1_macvtap entered promiscuous mode [ 164.814190][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.838616][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.889313][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 164.936420][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 164.976808][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.030164][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.082493][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.579929][ T7924] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 165.589274][ T7924] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 165.598497][ T7924] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 165.607671][ T7924] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 165.616813][ T7924] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 165.626189][ T7924] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 165.635295][ T7924] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 165.644505][ T7924] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 165.653924][ T7924] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 165.663115][ T7924] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 167.207642][ T8028] device wg2 entered promiscuous mode [ 167.595607][ T28] audit: type=1400 audit(1757704359.760:150): avc: denied { create } for pid=8044 comm="syz.0.2891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 167.965548][ T8077] device sit0 entered promiscuous mode [ 168.709957][ T8109] device sit0 entered promiscuous mode [ 169.105244][ T8168] device sit0 entered promiscuous mode [ 169.325403][ T8182] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.333344][ T8182] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.341437][ T8182] device bridge_slave_0 entered promiscuous mode [ 169.349564][ T8182] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.357231][ T284] syz-executor (284) used greatest stack depth: 20896 bytes left [ 169.357259][ T8182] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.373713][ T8182] device bridge_slave_1 entered promiscuous mode [ 169.633427][ T8182] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.640605][ T8182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.647930][ T8182] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.655442][ T8182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.771109][ T6944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.779449][ T6944] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.803818][ T6944] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.847122][ T6944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.882291][ T6944] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.889473][ T6944] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.936258][ T6944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.991488][ T6944] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.998662][ T6944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.281270][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.296510][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.357466][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.378964][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.420624][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 170.449307][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.466309][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 170.475220][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.483693][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.491495][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.513243][ T8182] device veth0_vlan entered promiscuous mode [ 170.528484][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 170.537174][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.551768][ T8182] device veth1_macvtap entered promiscuous mode [ 170.596643][ T6889] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 170.612639][ T6889] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.622958][ T6889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.663923][ T6889] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.673161][ T6889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.708499][ T8293] device pim6reg1 entered promiscuous mode [ 171.191589][ T8335] device pim6reg1 entered promiscuous mode [ 171.478612][ T549] device erspan0 left promiscuous mode [ 171.502114][ T549] GPL: port 1(erspan0) entered disabled state [ 171.783791][ T549] device veth0 left promiscuous mode [ 171.789242][ T549] bridge0: port 3(veth0) entered disabled state [ 171.818291][ T549] device bridge_slave_1 left promiscuous mode [ 171.840511][ T549] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.872681][ T549] device bridge_slave_0 left promiscuous mode [ 171.885648][ T549] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.903960][ T549] device veth1_macvtap left promiscuous mode [ 171.911110][ T28] audit: type=1400 audit(1757704364.070:151): avc: denied { create } for pid=8390 comm="syz.2.3020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 171.947503][ T549] device veth0_vlan left promiscuous mode