last executing test programs: 5.944559348s ago: executing program 3 (id=5518): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000071182b000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="0000000000020000000000000000001000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500), 0x0, 0x88, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0xac, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="5400000f000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e030000000500000008000000"], 0x88}, 0x0) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'veth0_to_bridge\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3.09341259s ago: executing program 2 (id=5551): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 3.041157134s ago: executing program 2 (id=5552): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000040)="e8f3ba186997387c84a93843ff2642e8d978ea9a1785d3e3b4ff81fd", 0x80000002, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="b702000026000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a08060000000200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3964663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964e4beba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c328615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c0c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81abfa15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553573c48104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f3274497c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf6770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6870982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980edfa1116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c65a3cf36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9e70617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e68884d7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbcca8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c238e545b28211a92000000001501aed8d72af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db996e633792118efdb6b88023e80da74fdf723c7f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 2.760155737s ago: executing program 2 (id=5556): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8, 0xf2db72b, 0x0, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4eebbcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) recvmsg(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x1000000000000004}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 2.612934539s ago: executing program 3 (id=5557): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0xc, 0x3, 0x7, 0xc1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r0}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2a, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) 2.10774951s ago: executing program 3 (id=5558): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0xc, 0x3, 0x7, 0xc1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r0}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2a, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) 1.929912854s ago: executing program 0 (id=5559): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x10000, 0xfffffcf1, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="01000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x50) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) r6 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r6) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='tlb_flush\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdb9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r8}, 0x10) 1.813703483s ago: executing program 2 (id=5563): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000040)="e8f3ba186997387c84a93843ff2642e8d978ea9a1785d3e3b4ff81fd", 0x80000002, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 1.789308745s ago: executing program 1 (id=5564): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xdeb9065d}, 0x94) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.739416719s ago: executing program 0 (id=5565): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37ce}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) (fail_nth: 9) 1.72847702s ago: executing program 1 (id=5566): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37ce}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x5, &(0x7f0000000180)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x4}, @ldst={0x0, 0x1, 0x3, 0x6, 0xa, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f00000001c0)='GPL\x00', 0x8, 0x8f, &(0x7f0000000280)=""/143, 0x41100, 0x10, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000200)={0x3, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000340)=[{0x0, 0x1, 0xe, 0x4}, {0x3, 0x4, 0xb, 0xa}], 0x10, 0x5}, 0x94) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) 1.138942518s ago: executing program 3 (id=5567): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x21}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7030000e200000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) r6 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)={[{0x2d, 'cpuacct'}, {0x2b, 'cpuacct'}]}, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.137942818s ago: executing program 1 (id=5568): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000400100004012200a4e2000001"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1, r2}, 0x38) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1, r2}, 0x38) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000180)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r7, 0x0, 0x13, 0x0, &(0x7f0000000180)="5486bbac43bbf8e44dcdd0e6b689f0ca471909", 0xfffffffffffffffd, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 1.083929002s ago: executing program 0 (id=5569): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000040), 0x4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) sendmsg$tipc(r5, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) recvmsg(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r4, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x1, &(0x7f0000000700)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1900000004000000040000000900000008000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000100"/28], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r10, 0x18000000000002a0, 0x0, 0x11, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r11}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r8}, 0x10) 1.002683039s ago: executing program 4 (id=5570): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_ext={0x1c, 0x11, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@exit, @call={0x85, 0x0, 0x0, 0x71}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x37, &(0x7f0000000100)=""/55, 0x41100, 0x52, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x1, 0x7, 0x92e}, 0x10, 0xeb8, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x94) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@fallback=0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000480)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x2, &(0x7f0000000500)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x73d2, 0x0, 0x0, 0x0, 0x8001}], &(0x7f0000000540)='syzkaller\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x2, 0x40, 0x5}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000600)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], &(0x7f0000000640)=[{0x5, 0x2, 0x4, 0x4}, {0x1, 0x1, 0x5, 0xc}, {0x2, 0x3, 0x5, 0xc643324f3cc63741}, {0x0, 0x5, 0x0, 0x7}, {0x1, 0x1, 0x0, 0x6}, {0x2, 0x2, 0x4, 0x4}, {0x4, 0x5, 0xa, 0x6}, {0x5, 0x5, 0x2, 0xb}], 0x10, 0x4}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000440)={@map=r4, r0, 0x25, 0x0, r1, @void, @value=r5, @void, @void, r3}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r0, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000780)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x34, &(0x7f0000000880)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) sendmsg(r2, &(0x7f0000000ec0)={&(0x7f0000000ac0)=@caif=@dgm={0x25, 0x81, 0x1}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000b40)="a2e4f0f691669038d3213627adf5b9001e134e5b06df8ded9cfc27b25175b72f59c0b3f9036614f1dfdd81266932911a0e68a88b846e7d63ca28ac32336039046a9d3acfcb26ebd2be3ce581cdf76048c14f472ff2f9f571a34e4776f9dc35b703234277919ab91bb33d44a0e05fe452768c815db1f3576bc5af90e897ca8bb6d428810acad79282161899ac933af0a7ab86ce45b52f5516a0bfa8757739a573e1d9e337c382450a76ae9dd2", 0xac}, {&(0x7f0000000c00)="ae6225a408290d5c3fb87f06f89c22e79de72462b1a87be72def60c2a7c814e911a0d6333214d2b70b33c5784366310b5737a48fc0c3892a0921c0d49c0c74d83132672b62f632fb6a7deabc7844236cae3e914e8ca99fd71ca80064938a9db4e2b383d6155153f5f39078d4ac3cfe097fb17961c34516a61b9eae8d2a878d531d87c292b9b79ef23c73d3b5ec542493cc8e1de3b3d63fa2defa4dfb4328e37169f07a45b7c80d3b4aa689b293a5fbb500ff2f9ba36f", 0xb6}, {&(0x7f0000000cc0)="db82ed88f80695ece4ea79aca7d7c7578ec1eb0cf98a08d785fb91179a6f5ca69c21cb1d8232af143b5ded4c1dbb4f33cf08829c5f192bc9bc6810aacee8588a6a9b5babf8001757c8c5905942097331477740b01aca01d63595bab4d12a699aaf5d80ebde4e4e3738a0bc763b00d7ef17384b2bd8664a4c384a06bb48a2a411a1f236df3530c9fcd214e9799355e3abcd8a2c3830f1dd3217b7b3293d8eb072f7a2f1dda451b0cb1b177cb75a2dd682500b58538f483806ea91c6a262", 0xbd}, {&(0x7f0000000d80)="f8c1dfb08305d5", 0x7}], 0x4, &(0x7f0000000e00)=[{0x98, 0x10b, 0x6, "273852174fb3c56cde5cca9b63c4ef72016407e44ac138e6021d35fb704d0d117f428f134ee070d71d59460e6cddb05f895ffcd3134e8aa282fd81d9b903353efdaf36eeac98e37c13bbc9a6340fe7543e8aa4173f2e87158518d327cf4853ff7ebc371ab1762cb872088d0e6fb4895093c061ec19049702a4c359fcd9b11155872db81a7a0a3c21"}], 0x98}, 0x20008c00) syz_clone(0x1002000, &(0x7f0000000f00)="b1e5df65c80df6", 0x7, &(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)="9db845d14967ad18dba4abd5b64cadfbd95f5a5a6b5d8fe7e79f3f58bbbfdd379ace69f2fd9b8d008bee98f07dc92433425ac5e213b22068785ad9dc1dc4da751a9887cd710446e18f5c0c12c61989620fbaed63cc0a2ffdff69847f7a16bb9edac64785203c34956d124676994ee286da3addfcd4e198ae3425429725f6c22a134dd7864189ec5e92dead4d7511cfb829181f87472dbdcb50cdbdb03f529b1b05f83c79eafc3b79d257323423e25d5528f6cd74ca8b7ce2ef262795f72df5c6ae53349722482f4c48c0611bb4a70796e181357fc73a095b1c199c04f3b7e4f9ba53b2e95a9811ab17d6a2") r7 = openat$cgroup_ro(r2, &(0x7f00000010c0)='pids.events\x00', 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001100)={r2, r7}, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r7) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001180)={0x0, 0x4a, 0x10}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000011c0)=@o_path={&(0x7f0000001140)='./file0\x00', r7, 0x4000, r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000001200)={r2}, 0x8) write$cgroup_freezer_state(r7, &(0x7f0000001240)='THAWED\x00', 0x7) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000012c0)=@o_path={&(0x7f0000001280)='./file1\x00', r8, 0x4000, r0}, 0x18) openat$cgroup_devices(r7, &(0x7f0000001300)='devices.deny\x00', 0x2, 0x0) r10 = getpid() write$cgroup_pid(r7, &(0x7f0000001340)=r10, 0x12) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@base={0xa, 0xc, 0x2, 0x80000001, 0x820, 0xffffffffffffffff, 0x80000000, '\x00', r6, r2, 0x2, 0x3, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001640)={r8, 0x58, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001780)=@bpf_lsm={0x1d, 0x17, &(0x7f0000001400)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xe7}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @exit, @generic={0x2, 0x2, 0x7, 0x10, 0xfffffff7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000014c0)='syzkaller\x00', 0x0, 0xbb, &(0x7f0000001500)=""/187, 0x41100, 0x4c, '\x00', r12, 0x1b, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001680)={0x1, 0x3, 0x6, 0x6}, 0x10, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000016c0)=[r2, r8], &(0x7f0000001700)=[{0x4, 0x3, 0xc, 0x3}, {0x3, 0x1, 0x5, 0x5}, {0x1, 0x2, 0x10, 0x5}, {0x1, 0xd, 0xc, 0xc}, {0x1, 0x4, 0x9, 0x7}, {0x0, 0x1, 0x7, 0x1}], 0x10, 0xd22}, 0x94) sendmsg$sock(r8, &(0x7f0000001dc0)={&(0x7f0000001840)=@xdp={0x2c, 0x4, r6, 0x3b}, 0x80, &(0x7f0000001d00)=[{&(0x7f00000018c0)="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", 0xfc}, {&(0x7f00000019c0)="8b9716cf8c4c3712d8c90f5adfecebf35537319120222f9dcb017e60981956c7457654775f1c1a48bf32094f0a5fc51f0fc993d73b4765fcc4389f99713fe3c0285f718fd1ba21d5578852c140943fce52c21f65b9afe2ee8b8dbc29e7b0c1f785ab65afe32bb7c6f41fcd3561d2e8a0ce3cbe6074bfba9bc9", 0x79}, {&(0x7f0000001a40)="d90f5dac4b8939d49e9e257c2b9a87eb9051e2a0bd050197b9ba43428aa247d1dc531dc778f3194fefa3f9e0dad876089e3e2e8b8d78c932962d05d0b666c9c2e1e254d47a100c07147d0f78e4d0846a346c61154446e2b3c464a67dc5d5df771c6d2b7fbb5deff1c1b2aaded12445f4ca1fa4fe0935c79c505acd1805e5a00989c40e5aa0d64fb1aecc684292ea2cd14bdb9f84c8bb322da52d7873a2f6a530c7bd12e7360305158b26c8e4f36c24ff4ca0f17a476df5b6857ce9964081f6f50eea33bfc695aa73f17621e2961cb4b837ec5e06f9cd3f96b05ea780c373c9a337a3013c3fccb6a85c1b07fb65036f38d2db59e80be92e622c7b", 0xfa}, {&(0x7f0000001b40)="144d9421b38d5290bee07e922678350d3bc1443fa8cc0a57ac1eb0a6e336f866cc9e1f0fd563c00b8925b2b1aee7351b70885d5df3745b36be8d8390a544fc76cdb7e37e6c85e4fa31e70169a6263814d6cd1a136584ea8aec75f7d4", 0x5c}, {&(0x7f0000001bc0)="832ef7cf2ddc60bb6dc6d8b9", 0xc}, {&(0x7f0000001c00)="24c0521de2e6bcbd59dd70ec1ded2455df211af97427781475c4ec2ac7109f52555448f2b864f6fdd14cd4d67169cb93aff7dd8b7f5d8a1c8346880eaf28ae1177572a4ea33341418a7821496cad26f019d0a80bcb61ea11deb91cf75a863ed63d52d859acb6eeb6297888a6c94e1c8dea78e8b4ec57db66ea9e0f9dcce2e871804ad2cea89022975773705dd6cb8bb9d3fde364085229a39e5e5f608e7e47c3a3e2656357f3e7d29d1b23951bc5f7233c6eacd532842269f46ac83cef6bc7b98d81b88edeb34e", 0xc7}], 0x6, &(0x7f0000001d80)=[@timestamping={{0x14, 0x1, 0x25, 0xffffffff}}, @timestamping={{0x14, 0x1, 0x25, 0x1000}}], 0x30}, 0x4000881) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002140)={&(0x7f0000001e00)="297112cf74c3c01396faae58a60a198821107d1dc06f5d9173977d52c70824fa360383354df6c0dbc0e7042fb7972397b35504a2ed8d1fc0f4167009bc1d0bd39bb9ca77e259dceaee7943787f7c48bfebbe9f60c9283cd313ce2bd64d37a16a105fc0fce868120b1f5704c23d169dd6eb06e91b1481b948b45357db23f2e2e270c54856ffc73a5496b75e20d4a4b900c7f65f2ea6d13d42f95a5b1376ef039666a20ace5b79", &(0x7f0000001ec0)=""/253, &(0x7f0000001fc0)="3f21e2b1a844a3ea0c5415e60a67de0424d85a724226a69932c6978792e7d9b95822640c1fe32962c1a95fec4e12487c004a5cc582b58ae28239d34cf96990027732106c4c6607f6e335fe9aec93f7c84e69d825cc44b99d110137248239594f2bc59d114ef67c697c927466f7cdf214244529295d85d189a7e5220f405bcc98c2506582edaa5fbaf4db7a518105e37afd6f7ba104393afed4d48f88671a4e84e089381e381fa355635751b0", &(0x7f0000002080)="c6a6774c769b4b790d27a1e2910edaf3ec296b198726ceb99e6dd485002f743725dd368bc44e007bad083e48c9e807a8ab2315ab46d96d96952bd539a420296755fd5f23168ae379a5b7b58165f00ad2b33dc49337d8a82d82efa4e5320feead41554bed449cba225c0703ae9c25e1a530dc7e841160f94f1f22d98fe6a320d151a20d0fbb", 0xe, r9}, 0x38) openat$cgroup_devices(r2, &(0x7f0000002180)='devices.deny\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000021c0)={@ifindex=r6, r1, 0x11, 0x18, r1, @void, @value=r13, @void, @void, r3}, 0x20) write$cgroup_devices(r2, &(0x7f0000002200)={'b', ' *:* ', 'w\x00'}, 0x8) r14 = syz_clone(0x101080, &(0x7f0000002300)="014e4f04573e06197298ba2bec6b2a1b15927a6ee311cf158a3d02bd75d80d5e", 0x20, &(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)="fddf89b5c89d0d299dca96e215680850af8af191da369984fd41d25cee2b3ed1d0b64701dbf91cf59dd3268c0b06d27a9185097c2ab21561c19f01369d9d25bb712bc1c421fce45efddf0f25cb5ed2dfe9f36ce43f2b6133f5579970457beca659fecdf536109cf63642f3e6242d6dba130f12ac4a94d7615f2dac56a8e424374f8085954bcbcd712c9e52ba5b2e381a208bcc6ca3e76aabe304b108dd6e1a5c116182b9a21d63de6c56bc126e3c2763a8b5cefb095e8b44d4c288b5f01706ad229ce2fd58f053f3ff7657cc419bb7ea121eb0f68ef021d3c3") perf_event_open(&(0x7f0000002280)={0x0, 0x80, 0x81, 0x9, 0x40, 0x3a, 0x0, 0x400, 0x40082, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6af, 0x2, @perf_bp={&(0x7f0000002240), 0x6}, 0x110260, 0x5, 0x8, 0x4, 0x401, 0x9, 0x100, 0x0, 0x4e82, 0x0, 0x3}, r14, 0x0, r7, 0x1) 959.115173ms ago: executing program 2 (id=5571): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r0}, &(0x7f0000004000), &(0x7f0000004040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 861.011271ms ago: executing program 3 (id=5572): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1, 0x0, 0x18100}, 0x0) 847.360531ms ago: executing program 2 (id=5573): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8, 0xf2db72b, 0x0, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4eebbcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) recvmsg(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x1000000000000004}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 805.476715ms ago: executing program 4 (id=5574): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 800.838285ms ago: executing program 3 (id=5575): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000001700)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000001cc0)=ANY=[@ANYRESDEC], 0x27) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000180)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r4}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x71, 0x5, 0x8, 0x8, 0x0, 0x1f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x1}, 0xb06, 0x3, 0x8, 0x1, 0x7f, 0x800, 0x5, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x110000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63be}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xffffdfff00000001}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x28) 743.39638ms ago: executing program 4 (id=5576): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='fib_table_lookup\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000fb7335db91850b43fd75f29cd0fa6df6794fcfeda542311b2b04002da1a29d60b72c777a44f96002b043c21c38b280452208492d25873ea3c3ab065d51a73fd51d729a1085336990a3698a2ebe044d4aa5cc5dfc11d6aabcb08adf86420eef49df2696b38e20b4ba3bf3672bb2359a860ff0b2f015b6f2a3fcc3e9e5f27453b18adcbb17"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYRES16=r0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffd80, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000000eb0000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r6 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0xff1c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYRESOCT=r6], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r9}, 0x18) 710.658413ms ago: executing program 0 (id=5577): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0xc, 0x3, 0x7, 0xc1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r0}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2a, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) 660.397167ms ago: executing program 1 (id=5578): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r2, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r12}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r13}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0xc, &(0x7f00000002c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000340)='GPL\x00', 0xb79b, 0x80, &(0x7f0000000380)=""/128, 0x41000, 0x10, '\x00', r9, 0x25, r10, 0x8, &(0x7f0000000700)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x10, 0x5, 0x400}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r2, r2, r3, r7, r8], &(0x7f00000007c0)=[{0x2, 0x2, 0xf, 0x6}, {0x5, 0x4, 0x2, 0x6}, {0x3, 0x1, 0x5, 0x8}, {0x4, 0x2, 0x3, 0x6}, {0x4, 0x3, 0xb, 0xa}, {0x3, 0x3, 0x2, 0x6}], 0x10, 0x6}, 0x94) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 520.040158ms ago: executing program 4 (id=5579): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/16], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000700)='ns/uts\x00') write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x88}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r4}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000d0000000000000006001d00004000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x1882a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x1882a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) 428.323596ms ago: executing program 4 (id=5580): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0xc, 0x3, 0x7, 0xc1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r0}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2a, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r2, 0x40047451, &(0x7f0000000180)) 425.819726ms ago: executing program 0 (id=5581): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1, 0x0, 0x18100}, 0x0) 265.293259ms ago: executing program 0 (id=5582): r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x86, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x804, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c6, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x61, 0x1, 0x0, 0x0, 0x0, 0x3, 0x30400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4}, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x7b) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) sendmsg$inet(r4, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x20000100) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r9, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0, 0xf5, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000005c0), &(0x7f0000000700), 0x8, 0x3a, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x12, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xffffffd0}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x0, 0x3, 0x2, 0x4, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r10}, 0x94) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="160000005b00000001000000ff0000000000000000006574f698d5223d0168bec9455b733e95e90049c5878dc4b8b2d3720cfa76c4c2ef7f9659d28d570f8cc39a61d6177610be5c8c4a8ec5d42663406858ec59bae4920ccd98d34529bcb2a9a369bfcb8ba30beff445c05744839ca40ed80cbfb8b6e58783707516f097bd27ca56d1cb88796a6061727b62aff79db5794a5f86e1e8bb0f42d2d34735e82305234dcc05397c1d61a6a9f3d84d597b4280436c3fd30e09d9d0506d8225", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r13}, 0x10) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r14, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x2000c0, 0x0) 74.933914ms ago: executing program 1 (id=5583): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r0}, &(0x7f0000004000), &(0x7f0000004040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 33.888128ms ago: executing program 4 (id=5584): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x1d, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2022) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="000000008f9eb959cf00000000000000000000000000000000d2b60e099754a973d145c16eeb8d5771b57fe7e9c105c99929cf54469eea041378054c5c25a92120a18a5e47c6d03afb01fb7600b54d", @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) 0s ago: executing program 1 (id=5585): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) (fail_nth: 9) kernel console output (not intermixed with test programs): ogle Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 379.016638][ T9710] Call Trace: [ 379.019927][ T9710] [ 379.023035][ T9710] __dump_stack+0x21/0x30 [ 379.027397][ T9710] dump_stack_lvl+0xee/0x150 [ 379.032275][ T9710] ? show_regs_print_info+0x20/0x20 [ 379.037589][ T9710] ? call_rcu+0xc4c/0xfe0 [ 379.041942][ T9710] dump_stack+0x15/0x20 [ 379.046198][ T9710] should_fail+0x3c1/0x510 [ 379.050669][ T9710] __should_failslab+0xa4/0xe0 [ 379.055439][ T9710] should_failslab+0x9/0x20 [ 379.059952][ T9710] slab_pre_alloc_hook+0x3b/0xe0 [ 379.064900][ T9710] ? __d_alloc+0x2d/0x6a0 [ 379.069233][ T9710] kmem_cache_alloc+0x44/0x260 [ 379.074002][ T9710] __d_alloc+0x2d/0x6a0 [ 379.078154][ T9710] ? lockref_put_return+0xca/0xe0 [ 379.083183][ T9710] d_alloc+0x4b/0x1d0 [ 379.087181][ T9710] lookup_one_qstr_excl+0xcb/0x250 [ 379.092404][ T9710] filename_create+0x219/0x450 [ 379.097178][ T9710] ? kern_path_create+0x1b0/0x1b0 [ 379.102307][ T9710] do_mkdirat+0x5c/0x4c0 [ 379.106556][ T9710] ? getname_flags+0x206/0x500 [ 379.111325][ T9710] __x64_sys_mkdirat+0x89/0xa0 [ 379.116091][ T9710] x64_sys_call+0x37e/0x9a0 [ 379.120703][ T9710] do_syscall_64+0x4c/0xa0 [ 379.125122][ T9710] ? clear_bhb_loop+0x50/0xa0 [ 379.129812][ T9710] ? clear_bhb_loop+0x50/0xa0 [ 379.134700][ T9710] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 379.140652][ T9710] RIP: 0033:0x7fdd63708be9 [ 379.145087][ T9710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.164804][ T9710] RSP: 002b:00007fdd62171038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 379.173523][ T9710] RAX: ffffffffffffffda RBX: 00007fdd6392ffa0 RCX: 00007fdd63708be9 [ 379.181507][ T9710] RDX: 00000000000001ff RSI: 0000200000000080 RDI: 000000000000000a [ 379.189493][ T9710] RBP: 00007fdd62171090 R08: 0000000000000000 R09: 0000000000000000 [ 379.197463][ T9710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.205436][ T9710] R13: 00007fdd63930038 R14: 00007fdd6392ffa0 R15: 00007ffdfd1ed148 [ 379.213431][ T9710] [ 379.357657][ T9728] device veth1_macvtap left promiscuous mode [ 379.375930][ T9728] device macsec0 left promiscuous mode [ 380.031017][ T9737] device syzkaller0 entered promiscuous mode [ 380.613088][ T9766] device veth0_vlan left promiscuous mode [ 380.631359][ T9766] device veth0_vlan entered promiscuous mode [ 380.714647][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.723234][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.732642][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.573524][ T9797] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 383.263910][ T9879] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 384.295930][ T9911] FAULT_INJECTION: forcing a failure. [ 384.295930][ T9911] name failslab, interval 1, probability 0, space 0, times 0 [ 384.322413][ T9904] device veth0_vlan left promiscuous mode [ 384.342774][ T9904] device veth0_vlan entered promiscuous mode [ 384.350140][ T9911] CPU: 1 PID: 9911 Comm: syz.1.3612 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 384.360719][ T9911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 384.370798][ T9911] Call Trace: [ 384.374276][ T9911] [ 384.377269][ T9911] __dump_stack+0x21/0x30 [ 384.381628][ T9911] dump_stack_lvl+0xee/0x150 [ 384.386253][ T9911] ? show_regs_print_info+0x20/0x20 [ 384.391468][ T9911] dump_stack+0x15/0x20 [ 384.395629][ T9911] should_fail+0x3c1/0x510 [ 384.400049][ T9911] __should_failslab+0xa4/0xe0 [ 384.404825][ T9911] should_failslab+0x9/0x20 [ 384.409330][ T9911] slab_pre_alloc_hook+0x3b/0xe0 [ 384.414270][ T9911] kmem_cache_alloc_trace+0x48/0x270 [ 384.419563][ T9911] ? btf_new_fd+0x115/0x920 [ 384.424071][ T9911] btf_new_fd+0x115/0x920 [ 384.428404][ T9911] ? security_capable+0x87/0xb0 [ 384.433260][ T9911] bpf_btf_load+0x6f/0x90 [ 384.437590][ T9911] __sys_bpf+0x515/0x730 [ 384.441836][ T9911] ? bpf_link_show_fdinfo+0x310/0x310 [ 384.447299][ T9911] ? debug_smp_processor_id+0x17/0x20 [ 384.452674][ T9911] __x64_sys_bpf+0x7c/0x90 [ 384.457201][ T9911] x64_sys_call+0x4b9/0x9a0 [ 384.461715][ T9911] do_syscall_64+0x4c/0xa0 [ 384.466134][ T9911] ? clear_bhb_loop+0x50/0xa0 [ 384.470818][ T9911] ? clear_bhb_loop+0x50/0xa0 [ 384.475499][ T9911] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 384.481401][ T9911] RIP: 0033:0x7fdd63708be9 [ 384.485820][ T9911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 384.505428][ T9911] RSP: 002b:00007fdd62171038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 384.513845][ T9911] RAX: ffffffffffffffda RBX: 00007fdd6392ffa0 RCX: 00007fdd63708be9 [ 384.521821][ T9911] RDX: 0000000000000020 RSI: 0000200000000380 RDI: 0000000000000012 [ 384.529883][ T9911] RBP: 00007fdd62171090 R08: 0000000000000000 R09: 0000000000000000 [ 384.537942][ T9911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 384.545916][ T9911] R13: 00007fdd63930038 R14: 00007fdd6392ffa0 R15: 00007ffdfd1ed148 [ 384.553900][ T9911] [ 385.193691][ T9959] device syzkaller0 entered promiscuous mode [ 386.203049][ T9993] device syzkaller0 entered promiscuous mode [ 390.352217][T10097] device syzkaller0 entered promiscuous mode [ 390.393878][T10098] device wg2 entered promiscuous mode [ 394.842652][T10172] FAULT_INJECTION: forcing a failure. [ 394.842652][T10172] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 394.859731][T10172] CPU: 0 PID: 10172 Comm: syz.3.3710 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 394.870024][T10172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 394.880409][T10172] Call Trace: [ 394.883719][T10172] [ 394.886664][T10172] __dump_stack+0x21/0x30 [ 394.891018][T10172] dump_stack_lvl+0xee/0x150 [ 394.895623][T10172] ? show_regs_print_info+0x20/0x20 [ 394.900845][T10172] dump_stack+0x15/0x20 [ 394.905022][T10172] should_fail+0x3c1/0x510 [ 394.909584][T10172] should_fail_usercopy+0x1a/0x20 [ 394.914629][T10172] _copy_from_user+0x20/0xd0 [ 394.919248][T10172] bpf_test_init+0x13d/0x1c0 [ 394.923856][T10172] bpf_prog_test_run_skb+0x193/0x1150 [ 394.929251][T10172] ? __kasan_check_write+0x14/0x20 [ 394.934389][T10172] ? fput_many+0x15a/0x1a0 [ 394.938835][T10172] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 394.944757][T10172] bpf_prog_test_run+0x3d5/0x620 [ 394.949732][T10172] ? bpf_prog_query+0x230/0x230 [ 394.954614][T10172] ? selinux_bpf+0xce/0xf0 [ 394.959086][T10172] ? security_bpf+0x82/0xa0 [ 394.963615][T10172] __sys_bpf+0x52c/0x730 [ 394.967881][T10172] ? bpf_link_show_fdinfo+0x310/0x310 [ 394.973303][T10172] __x64_sys_bpf+0x7c/0x90 [ 394.977831][T10172] x64_sys_call+0x4b9/0x9a0 [ 394.982360][T10172] do_syscall_64+0x4c/0xa0 [ 394.986804][T10172] ? clear_bhb_loop+0x50/0xa0 [ 394.991504][T10172] ? clear_bhb_loop+0x50/0xa0 [ 394.996210][T10172] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 395.002158][T10172] RIP: 0033:0x7fc5ffa62be9 [ 395.006598][T10172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 395.026229][T10172] RSP: 002b:00007fc5fe4cb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 395.034768][T10172] RAX: ffffffffffffffda RBX: 00007fc5ffc89fa0 RCX: 00007fc5ffa62be9 [ 395.042849][T10172] RDX: 0000000000000048 RSI: 00002000000003c0 RDI: 000000000000000a [ 395.050929][T10172] RBP: 00007fc5fe4cb090 R08: 0000000000000000 R09: 0000000000000000 [ 395.058917][T10172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.066910][T10172] R13: 00007fc5ffc8a038 R14: 00007fc5ffc89fa0 R15: 00007ffd195a85b8 [ 395.074910][T10172] [ 395.294570][T10185] syz.3.3715[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.294657][T10185] syz.3.3715[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.407956][T10186] syz.3.3715 (10186) used obsolete PPPIOCDETACH ioctl [ 395.523399][T10190] FAULT_INJECTION: forcing a failure. [ 395.523399][T10190] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 395.536849][T10190] CPU: 0 PID: 10190 Comm: syz.2.3716 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 395.547125][T10190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 395.557212][T10190] Call Trace: [ 395.560491][T10190] [ 395.563423][T10190] __dump_stack+0x21/0x30 [ 395.567759][T10190] dump_stack_lvl+0xee/0x150 [ 395.572348][T10190] ? show_regs_print_info+0x20/0x20 [ 395.577727][T10190] ? ktime_get_boot_fast_ns+0x1a1/0x1d0 [ 395.583282][T10190] dump_stack+0x15/0x20 [ 395.587442][T10190] should_fail+0x3c1/0x510 [ 395.591864][T10190] should_fail_alloc_page+0x55/0x80 [ 395.597067][T10190] prepare_alloc_pages+0x156/0x600 [ 395.602185][T10190] ? __alloc_pages_bulk+0xab0/0xab0 [ 395.607476][T10190] ? __bpf_trace_mm_page_alloc+0xc0/0xf0 [ 395.613113][T10190] __alloc_pages+0x10a/0x440 [ 395.617708][T10190] ? prep_new_page+0x110/0x110 [ 395.622513][T10190] ? __kasan_check_write+0x14/0x20 [ 395.627628][T10190] __get_free_pages+0x10/0x30 [ 395.632309][T10190] kasan_populate_vmalloc_pte+0x29/0x120 [ 395.637947][T10190] __apply_to_page_range+0x8b0/0xbf0 [ 395.643236][T10190] ? kasan_populate_vmalloc+0x70/0x70 [ 395.648610][T10190] ? kasan_populate_vmalloc+0x70/0x70 [ 395.653999][T10190] apply_to_page_range+0x3b/0x50 [ 395.658939][T10190] kasan_populate_vmalloc+0x60/0x70 [ 395.664141][T10190] alloc_vmap_area+0x185c/0x1990 [ 395.669124][T10190] ? vm_map_ram+0xa60/0xa60 [ 395.673653][T10190] ? kmem_cache_alloc_trace+0x119/0x270 [ 395.679223][T10190] __get_vm_area_node+0x14e/0x350 [ 395.684256][T10190] __vmalloc_node_range+0xdf/0xaf0 [ 395.689370][T10190] ? dev_map_alloc+0x24c/0x560 [ 395.694144][T10190] bpf_map_area_alloc+0xd5/0xe0 [ 395.699174][T10190] ? dev_map_alloc+0x24c/0x560 [ 395.703949][T10190] dev_map_alloc+0x24c/0x560 [ 395.708547][T10190] map_create+0x455/0x21b0 [ 395.712965][T10190] __sys_bpf+0x2cf/0x730 [ 395.717212][T10190] ? bpf_link_show_fdinfo+0x310/0x310 [ 395.722590][T10190] ? debug_smp_processor_id+0x17/0x20 [ 395.727971][T10190] __x64_sys_bpf+0x7c/0x90 [ 395.732400][T10190] x64_sys_call+0x4b9/0x9a0 [ 395.736904][T10190] do_syscall_64+0x4c/0xa0 [ 395.741331][T10190] ? clear_bhb_loop+0x50/0xa0 [ 395.746018][T10190] ? clear_bhb_loop+0x50/0xa0 [ 395.750705][T10190] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 395.756687][T10190] RIP: 0033:0x7f9f83887be9 [ 395.761132][T10190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 395.780847][T10190] RSP: 002b:00007f9f822f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 395.789705][T10190] RAX: ffffffffffffffda RBX: 00007f9f83aaefa0 RCX: 00007f9f83887be9 [ 395.797681][T10190] RDX: 0000000000000050 RSI: 0000200000000bc0 RDI: 0000000000000000 [ 395.805657][T10190] RBP: 00007f9f822f0090 R08: 0000000000000000 R09: 0000000000000000 [ 395.813637][T10190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.821638][T10190] R13: 00007f9f83aaf038 R14: 00007f9f83aaefa0 R15: 00007ffc4f6ebb28 [ 395.829619][T10190] [ 396.241448][ T30] audit: type=1400 audit(1754685354.717:147): avc: denied { create } for pid=10197 comm="syz.0.3720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 396.363451][T10208] FAULT_INJECTION: forcing a failure. [ 396.363451][T10208] name failslab, interval 1, probability 0, space 0, times 0 [ 396.376294][T10208] CPU: 0 PID: 10208 Comm: syz.2.3722 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 396.386564][T10208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 396.396644][T10208] Call Trace: [ 396.399941][T10208] [ 396.402887][T10208] __dump_stack+0x21/0x30 [ 396.407245][T10208] dump_stack_lvl+0xee/0x150 [ 396.411855][T10208] ? show_regs_print_info+0x20/0x20 [ 396.417076][T10208] dump_stack+0x15/0x20 [ 396.421266][T10208] should_fail+0x3c1/0x510 [ 396.425702][T10208] ? fdb_notify+0x78/0x130 [ 396.430142][T10208] __should_failslab+0xa4/0xe0 [ 396.434927][T10208] should_failslab+0x9/0x20 [ 396.439503][T10208] slab_pre_alloc_hook+0x3b/0xe0 [ 396.444595][T10208] ? fdb_notify+0x78/0x130 [ 396.449037][T10208] ? fdb_notify+0x78/0x130 [ 396.453473][T10208] __kmalloc_track_caller+0x6c/0x2c0 [ 396.458900][T10208] ? fdb_notify+0x78/0x130 [ 396.463345][T10208] ? fdb_notify+0x78/0x130 [ 396.467878][T10208] __alloc_skb+0x21a/0x740 [ 396.472318][T10208] fdb_notify+0x78/0x130 [ 396.476676][T10208] fdb_insert+0x16b/0x260 [ 396.481032][T10208] br_fdb_changeaddr+0x187/0x1c0 [ 396.485993][T10208] br_device_event+0x335/0x790 [ 396.490799][T10208] ? br_boolopt_multi_get+0xf0/0xf0 [ 396.496020][T10208] ? packet_notifier+0x8bc/0x8d0 [ 396.500985][T10208] ? addrconf_notify+0x37b/0xde0 [ 396.505950][T10208] raw_notifier_call_chain+0x90/0x100 [ 396.511345][T10208] dev_set_mac_address+0x318/0x420 [ 396.516490][T10208] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 396.522347][T10208] dev_set_mac_address_user+0x31/0x50 [ 396.527760][T10208] dev_ifsioc+0x757/0xe70 [ 396.532165][T10208] ? dev_ioctl+0xd10/0xd10 [ 396.536613][T10208] ? __kasan_check_write+0x14/0x20 [ 396.541759][T10208] ? mutex_lock+0x95/0x1a0 [ 396.546347][T10208] ? wait_for_completion_killable_timeout+0x10/0x10 [ 396.552968][T10208] ? dev_get_by_name_rcu+0xc8/0xf0 [ 396.558109][T10208] dev_ioctl+0x560/0xd10 [ 396.562384][T10208] sock_do_ioctl+0x22e/0x300 [ 396.567002][T10208] ? sock_show_fdinfo+0xa0/0xa0 [ 396.571964][T10208] ? selinux_file_ioctl+0x377/0x480 [ 396.577199][T10208] sock_ioctl+0x4bc/0x6b0 [ 396.581560][T10208] ? sock_poll+0x3d0/0x3d0 [ 396.586102][T10208] ? __fget_files+0x2c4/0x320 [ 396.590807][T10208] ? security_file_ioctl+0x84/0xa0 [ 396.595978][T10208] ? sock_poll+0x3d0/0x3d0 [ 396.600414][T10208] __se_sys_ioctl+0x121/0x1a0 [ 396.605123][T10208] __x64_sys_ioctl+0x7b/0x90 [ 396.609742][T10208] x64_sys_call+0x2f/0x9a0 [ 396.614180][T10208] do_syscall_64+0x4c/0xa0 [ 396.618658][T10208] ? clear_bhb_loop+0x50/0xa0 [ 396.623353][T10208] ? clear_bhb_loop+0x50/0xa0 [ 396.628058][T10208] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 396.633976][T10208] RIP: 0033:0x7f9f83887be9 [ 396.638525][T10208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 396.658164][T10208] RSP: 002b:00007f9f822f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 396.666609][T10208] RAX: ffffffffffffffda RBX: 00007f9f83aaefa0 RCX: 00007f9f83887be9 [ 396.674701][T10208] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 396.682795][T10208] RBP: 00007f9f822f0090 R08: 0000000000000000 R09: 0000000000000000 [ 396.690880][T10208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.698876][T10208] R13: 00007f9f83aaf038 R14: 00007f9f83aaefa0 R15: 00007ffc4f6ebb28 [ 396.706920][T10208] [ 397.340323][T10229] device veth1_macvtap left promiscuous mode [ 398.816034][T10282] device syzkaller0 entered promiscuous mode [ 404.478041][T10434] device syzkaller0 entered promiscuous mode [ 405.647946][T10470] device pim6reg1 entered promiscuous mode [ 405.946122][T10471] device syzkaller0 entered promiscuous mode [ 407.123648][T10522] FAULT_INJECTION: forcing a failure. [ 407.123648][T10522] name failslab, interval 1, probability 0, space 0, times 0 [ 407.136381][T10522] CPU: 1 PID: 10522 Comm: syz.4.3835 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 407.146649][T10522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 407.156733][T10522] Call Trace: [ 407.160022][T10522] [ 407.162961][T10522] __dump_stack+0x21/0x30 [ 407.167301][T10522] dump_stack_lvl+0xee/0x150 [ 407.171925][T10522] ? show_regs_print_info+0x20/0x20 [ 407.177137][T10522] dump_stack+0x15/0x20 [ 407.181308][T10522] should_fail+0x3c1/0x510 [ 407.185736][T10522] ? inet6_rt_notify+0x287/0x470 [ 407.190684][T10522] __should_failslab+0xa4/0xe0 [ 407.195458][T10522] should_failslab+0x9/0x20 [ 407.199968][T10522] slab_pre_alloc_hook+0x3b/0xe0 [ 407.204906][T10522] ? inet6_rt_notify+0x287/0x470 [ 407.209848][T10522] ? inet6_rt_notify+0x287/0x470 [ 407.214960][T10522] __kmalloc_track_caller+0x6c/0x2c0 [ 407.220277][T10522] ? inet6_rt_notify+0x287/0x470 [ 407.225212][T10522] ? inet6_rt_notify+0x287/0x470 [ 407.230160][T10522] __alloc_skb+0x21a/0x740 [ 407.234626][T10522] inet6_rt_notify+0x287/0x470 [ 407.239393][T10522] ? rt6_nh_dump_exceptions+0x690/0x690 [ 407.244942][T10522] ? __check_object_size+0x8e/0x3c0 [ 407.250160][T10522] fib6_del+0xbf9/0xf60 [ 407.254324][T10522] ? fib6_locate+0x550/0x550 [ 407.258921][T10522] ? __kasan_check_write+0x14/0x20 [ 407.264037][T10522] ? finish_task_switch+0x209/0x780 [ 407.269237][T10522] ? fib6_ifdown+0x2eb/0x4e0 [ 407.273835][T10522] fib6_clean_node+0x296/0x520 [ 407.278600][T10522] ? node_free_rcu+0x30/0x30 [ 407.283203][T10522] ? __kasan_check_read+0x11/0x20 [ 407.288229][T10522] fib6_walk_continue+0x4fc/0x700 [ 407.293281][T10522] fib6_walk+0x153/0x290 [ 407.297531][T10522] fib6_clean_all+0x16a/0x230 [ 407.302213][T10522] ? tracing_record_taskinfo+0x7c/0x220 [ 407.307759][T10522] ? rt6_sync_down_dev+0x130/0x130 [ 407.312874][T10522] ? fib6_del+0xf60/0xf60 [ 407.317208][T10522] ? node_free_rcu+0x30/0x30 [ 407.321804][T10522] ? rt6_sync_down_dev+0x130/0x130 [ 407.326918][T10522] ? schedule_preempt_disabled+0x20/0x20 [ 407.332579][T10522] ? try_to_wake_up+0x611/0x1160 [ 407.337568][T10522] rt6_disable_ip+0x119/0x700 [ 407.342245][T10522] ? preempt_schedule_thunk+0x16/0x18 [ 407.347625][T10522] ? __queue_work+0x913/0xc60 [ 407.352305][T10522] ? fib6_ifdown+0x4e0/0x4e0 [ 407.356903][T10522] ? __kasan_check_read+0x11/0x20 [ 407.361945][T10522] addrconf_ifdown+0x144/0x1880 [ 407.366807][T10522] ? nf_nat_masq_schedule+0x229/0x4c0 [ 407.372213][T10522] ? addrconf_cleanup+0x1c0/0x1c0 [ 407.377263][T10522] ? __kasan_check_write+0x14/0x20 [ 407.382375][T10522] ? mutex_unlock+0x89/0x220 [ 407.386982][T10522] ? __mutex_lock_slowpath+0x10/0x10 [ 407.392367][T10522] ? nf_nat_masq_schedule+0x4c0/0x4c0 [ 407.397740][T10522] ? masq_device_event+0xd0/0xd0 [ 407.402688][T10522] addrconf_notify+0x3bd/0xde0 [ 407.407451][T10522] raw_notifier_call_chain+0x90/0x100 [ 407.412826][T10522] dev_close_many+0x32d/0x4d0 [ 407.417506][T10522] ? __kasan_check_write+0x14/0x20 [ 407.422806][T10522] ? __dev_open+0x4c0/0x4c0 [ 407.427312][T10522] ? mutex_unlock+0x89/0x220 [ 407.431903][T10522] ? __kasan_check_read+0x11/0x20 [ 407.436935][T10522] unregister_netdevice_many+0x44c/0x1990 [ 407.442683][T10522] ? __kasan_check_write+0x14/0x20 [ 407.447800][T10522] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 407.453264][T10522] ? alloc_netdev_mqs+0xc90/0xc90 [ 407.458389][T10522] ? locks_remove_file+0x312/0xf40 [ 407.463506][T10522] ? queue_delayed_work_on+0x101/0x150 [ 407.468972][T10522] ? __kasan_check_read+0x11/0x20 [ 407.473999][T10522] unregister_netdevice_queue+0x31c/0x360 [ 407.479719][T10522] ? __kasan_check_read+0x11/0x20 [ 407.484746][T10522] ? list_netdevice+0x4c0/0x4c0 [ 407.489603][T10522] ? linkwatch_fire_event+0x307/0x380 [ 407.495067][T10522] __tun_detach+0xca6/0x1450 [ 407.499710][T10522] tun_chr_close+0x92/0x140 [ 407.504217][T10522] ? tun_chr_open+0x540/0x540 [ 407.508931][T10522] __fput+0x20b/0x8b0 [ 407.512935][T10522] ____fput+0x15/0x20 [ 407.517017][T10522] task_work_run+0x127/0x190 [ 407.521615][T10522] exit_to_user_mode_loop+0xd0/0xe0 [ 407.526815][T10522] exit_to_user_mode_prepare+0x5a/0xa0 [ 407.532309][T10522] syscall_exit_to_user_mode+0x1a/0x30 [ 407.537781][T10522] do_syscall_64+0x58/0xa0 [ 407.542209][T10522] ? clear_bhb_loop+0x50/0xa0 [ 407.546926][T10522] ? clear_bhb_loop+0x50/0xa0 [ 407.551717][T10522] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 407.557708][T10522] RIP: 0033:0x7f8119069be9 [ 407.562127][T10522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.581739][T10522] RSP: 002b:00007f8117ad2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 407.590155][T10522] RAX: 0000000000000000 RBX: 00007f8119290fa0 RCX: 00007f8119069be9 [ 407.598477][T10522] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 407.606448][T10522] RBP: 00007f8117ad2090 R08: 0000000000000000 R09: 0000000000000000 [ 407.614435][T10522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.622405][T10522] R13: 00007f8119291038 R14: 00007f8119290fa0 R15: 00007ffd790d1ff8 [ 407.630384][T10522] [ 409.920881][T10637] FAULT_INJECTION: forcing a failure. [ 409.920881][T10637] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 409.995622][T10637] CPU: 1 PID: 10637 Comm: syz.3.3870 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 410.005930][T10637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 410.016008][T10637] Call Trace: [ 410.019301][T10637] [ 410.022256][T10637] __dump_stack+0x21/0x30 [ 410.026619][T10637] dump_stack_lvl+0xee/0x150 [ 410.031241][T10637] ? show_regs_print_info+0x20/0x20 [ 410.036471][T10637] dump_stack+0x15/0x20 [ 410.040777][T10637] should_fail+0x3c1/0x510 [ 410.045258][T10637] should_fail_usercopy+0x1a/0x20 [ 410.050349][T10637] _copy_to_user+0x20/0x90 [ 410.054856][T10637] simple_read_from_buffer+0xe9/0x160 [ 410.060277][T10637] proc_fail_nth_read+0x19a/0x210 [ 410.065366][T10637] ? proc_fault_inject_write+0x2f0/0x2f0 [ 410.071047][T10637] ? security_file_permission+0x83/0xa0 [ 410.076621][T10637] ? proc_fault_inject_write+0x2f0/0x2f0 [ 410.082312][T10637] vfs_read+0x282/0xbe0 [ 410.086493][T10637] ? kernel_read+0x1f0/0x1f0 [ 410.091192][T10637] ? __kasan_check_write+0x14/0x20 [ 410.096335][T10637] ? mutex_lock+0x95/0x1a0 [ 410.100772][T10637] ? wait_for_completion_killable_timeout+0x10/0x10 [ 410.107387][T10637] ? __fget_files+0x2c4/0x320 [ 410.112093][T10637] ? __fdget_pos+0x2d2/0x380 [ 410.116754][T10637] ? ksys_read+0x71/0x240 [ 410.121105][T10637] ksys_read+0x140/0x240 [ 410.125367][T10637] ? vfs_write+0xf70/0xf70 [ 410.129804][T10637] ? debug_smp_processor_id+0x17/0x20 [ 410.135198][T10637] __x64_sys_read+0x7b/0x90 [ 410.139720][T10637] x64_sys_call+0x96d/0x9a0 [ 410.144248][T10637] do_syscall_64+0x4c/0xa0 [ 410.148687][T10637] ? clear_bhb_loop+0x50/0xa0 [ 410.153389][T10637] ? clear_bhb_loop+0x50/0xa0 [ 410.158093][T10637] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 410.164010][T10637] RIP: 0033:0x7fc5ffa615fc [ 410.168461][T10637] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 410.188364][T10637] RSP: 002b:00007fc5fe4cb030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 410.197253][T10637] RAX: ffffffffffffffda RBX: 00007fc5ffc89fa0 RCX: 00007fc5ffa615fc [ 410.205255][T10637] RDX: 000000000000000f RSI: 00007fc5fe4cb0a0 RDI: 0000000000000008 [ 410.213254][T10637] RBP: 00007fc5fe4cb090 R08: 0000000000000000 R09: 0000000000000000 [ 410.221285][T10637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.229377][T10637] R13: 00007fc5ffc8a038 R14: 00007fc5ffc89fa0 R15: 00007ffd195a85b8 [ 410.237377][T10637] [ 410.565352][T10655] device sit0 entered promiscuous mode [ 411.574432][T10714] device veth0_vlan left promiscuous mode [ 411.701555][T10714] device veth0_vlan entered promiscuous mode [ 411.733301][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.741955][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 411.752092][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 412.837536][T10749] device pim6reg1 entered promiscuous mode [ 418.939978][T10865] device sit0 left promiscuous mode [ 419.023671][T10874] device sit0 entered promiscuous mode [ 419.334179][T10884] device veth1_macvtap left promiscuous mode [ 423.323043][T10968] bond_slave_1: mtu less than device minimum [ 423.526884][T10976] device veth0_vlan left promiscuous mode [ 423.544951][T10976] device veth0_vlan entered promiscuous mode [ 423.586426][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.613045][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 423.642275][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 425.074195][T11009] device sit0 entered promiscuous mode [ 425.479057][T11018] FAULT_INJECTION: forcing a failure. [ 425.479057][T11018] name failslab, interval 1, probability 0, space 0, times 0 [ 425.601788][T11018] CPU: 1 PID: 11018 Comm: syz.2.4002 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 425.612099][T11018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 425.622279][T11018] Call Trace: [ 425.625688][T11018] [ 425.628658][T11018] __dump_stack+0x21/0x30 [ 425.633022][T11018] dump_stack_lvl+0xee/0x150 [ 425.637827][T11018] ? show_regs_print_info+0x20/0x20 [ 425.643040][T11018] ? pcpu_block_refresh_hint+0x21d/0x320 [ 425.648701][T11018] dump_stack+0x15/0x20 [ 425.652861][T11018] should_fail+0x3c1/0x510 [ 425.657286][T11018] __should_failslab+0xa4/0xe0 [ 425.662063][T11018] should_failslab+0x9/0x20 [ 425.666573][T11018] slab_pre_alloc_hook+0x3b/0xe0 [ 425.671522][T11018] ? kvasprintf_const+0xd7/0x240 [ 425.676467][T11018] __kmalloc_track_caller+0x6c/0x2c0 [ 425.681779][T11018] ? kvasprintf_const+0xd7/0x240 [ 425.686824][T11018] kstrdup_const+0x55/0x90 [ 425.691242][T11018] kvasprintf_const+0xd7/0x240 [ 425.696005][T11018] kobject_set_name_vargs+0x61/0x110 [ 425.701296][T11018] dev_set_name+0xd1/0x120 [ 425.705713][T11018] ? get_device+0x30/0x30 [ 425.710071][T11018] ? pm_runtime_init+0x258/0x330 [ 425.715020][T11018] ? device_initialize+0x1e1/0x420 [ 425.720150][T11018] netdev_register_kobject+0xb2/0x320 [ 425.725524][T11018] ? raw_notifier_call_chain+0xe9/0x100 [ 425.731081][T11018] register_netdevice+0xdfa/0x13a0 [ 425.736208][T11018] ? netif_stacked_transfer_operstate+0x220/0x220 [ 425.742630][T11018] ? memcpy+0x56/0x70 [ 425.746620][T11018] ip6gre_tunnel_locate+0x2b0/0x870 [ 425.751823][T11018] ? ip6gre_tnl_change+0xaa0/0xaa0 [ 425.757051][T11018] ? memcpy+0x56/0x70 [ 425.761054][T11018] ip6gre_tunnel_siocdevprivate+0xafd/0xda0 [ 425.766952][T11018] ? ip6gre_tunnel_init+0x160/0x160 [ 425.772155][T11018] ? full_name_hash+0xa0/0xf0 [ 425.776836][T11018] dev_ifsioc+0xaf5/0xe70 [ 425.781177][T11018] ? dev_ioctl+0xd10/0xd10 [ 425.785601][T11018] ? __kasan_check_write+0x14/0x20 [ 425.790710][T11018] ? mutex_lock+0x95/0x1a0 [ 425.795129][T11018] ? wait_for_completion_killable_timeout+0x10/0x10 [ 425.801722][T11018] ? dev_get_by_name_rcu+0xc8/0xf0 [ 425.806853][T11018] dev_ioctl+0x5fd/0xd10 [ 425.811121][T11018] sock_ioctl+0x64a/0x6b0 [ 425.815469][T11018] ? sock_poll+0x3d0/0x3d0 [ 425.819893][T11018] ? security_file_ioctl+0x84/0xa0 [ 425.825012][T11018] ? sock_poll+0x3d0/0x3d0 [ 425.829433][T11018] __se_sys_ioctl+0x121/0x1a0 [ 425.834126][T11018] __x64_sys_ioctl+0x7b/0x90 [ 425.838721][T11018] x64_sys_call+0x2f/0x9a0 [ 425.843139][T11018] do_syscall_64+0x4c/0xa0 [ 425.847645][T11018] ? clear_bhb_loop+0x50/0xa0 [ 425.852332][T11018] ? clear_bhb_loop+0x50/0xa0 [ 425.857021][T11018] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 425.862917][T11018] RIP: 0033:0x7f9f83887be9 [ 425.867367][T11018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 425.887002][T11018] RSP: 002b:00007f9f822f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 425.895422][T11018] RAX: ffffffffffffffda RBX: 00007f9f83aaefa0 RCX: 00007f9f83887be9 [ 425.903404][T11018] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 425.911383][T11018] RBP: 00007f9f822f0090 R08: 0000000000000000 R09: 0000000000000000 [ 425.919358][T11018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 425.927335][T11018] R13: 00007f9f83aaf038 R14: 00007f9f83aaefa0 R15: 00007ffc4f6ebb28 [ 425.935318][T11018] [ 427.961104][T11082] syz.3.4025[11082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.961184][T11082] syz.3.4025[11082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.001231][T11080] device syzkaller0 entered promiscuous mode [ 429.449199][T11118] FAULT_INJECTION: forcing a failure. [ 429.449199][T11118] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 429.479603][T11118] CPU: 1 PID: 11118 Comm: syz.1.4037 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 429.490005][T11118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 429.500082][T11118] Call Trace: [ 429.503383][T11118] [ 429.506331][T11118] __dump_stack+0x21/0x30 [ 429.510689][T11118] dump_stack_lvl+0xee/0x150 [ 429.515290][T11118] ? show_regs_print_info+0x20/0x20 [ 429.520497][T11118] dump_stack+0x15/0x20 [ 429.524661][T11118] should_fail+0x3c1/0x510 [ 429.529258][T11118] should_fail_usercopy+0x1a/0x20 [ 429.534290][T11118] _copy_from_iter+0x21a/0x1050 [ 429.539149][T11118] ? __kasan_check_write+0x14/0x20 [ 429.544274][T11118] ? skb_set_owner_w+0x24d/0x370 [ 429.549309][T11118] ? copy_mc_pipe_to_iter+0x770/0x770 [ 429.554688][T11118] ? __kernel_text_address+0xa0/0x100 [ 429.560067][T11118] ? check_stack_object+0x81/0x140 [ 429.565188][T11118] ? __kasan_check_read+0x11/0x20 [ 429.570308][T11118] ? __check_object_size+0x2f4/0x3c0 [ 429.575799][T11118] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 429.581523][T11118] ? __kasan_check_write+0x14/0x20 [ 429.586640][T11118] ? skb_put+0x10e/0x1f0 [ 429.590896][T11118] tun_get_user+0xc3c/0x33c0 [ 429.595601][T11118] ? tun_do_read+0x1c40/0x1c40 [ 429.600429][T11118] ? kstrtouint_from_user+0x1a0/0x200 [ 429.605807][T11118] ? kstrtol_from_user+0x260/0x260 [ 429.610925][T11118] ? putname+0x111/0x160 [ 429.615177][T11118] ? avc_policy_seqno+0x1b/0x70 [ 429.620045][T11118] ? selinux_file_permission+0x2aa/0x510 [ 429.625703][T11118] tun_chr_write_iter+0x1eb/0x2e0 [ 429.630737][T11118] vfs_write+0x802/0xf70 [ 429.635016][T11118] ? file_end_write+0x1b0/0x1b0 [ 429.639977][T11118] ? __fget_files+0x2c4/0x320 [ 429.644669][T11118] ? __fdget_pos+0x1f7/0x380 [ 429.649263][T11118] ? ksys_write+0x71/0x240 [ 429.653799][T11118] ksys_write+0x140/0x240 [ 429.658147][T11118] ? __ia32_sys_read+0x90/0x90 [ 429.662939][T11118] ? debug_smp_processor_id+0x17/0x20 [ 429.668321][T11118] __x64_sys_write+0x7b/0x90 [ 429.672934][T11118] x64_sys_call+0x8ef/0x9a0 [ 429.677446][T11118] do_syscall_64+0x4c/0xa0 [ 429.681953][T11118] ? clear_bhb_loop+0x50/0xa0 [ 429.686638][T11118] ? clear_bhb_loop+0x50/0xa0 [ 429.691425][T11118] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 429.697604][T11118] RIP: 0033:0x7fdd63708be9 [ 429.702110][T11118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.721721][T11118] RSP: 002b:00007fdd62150038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 429.730170][T11118] RAX: ffffffffffffffda RBX: 00007fdd63930090 RCX: 00007fdd63708be9 [ 429.738150][T11118] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 429.746133][T11118] RBP: 00007fdd62150090 R08: 0000000000000000 R09: 0000000000000000 [ 429.754109][T11118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.762093][T11118] R13: 00007fdd63930128 R14: 00007fdd63930090 R15: 00007ffdfd1ed148 [ 429.770088][T11118] [ 431.184017][T11159] device macsec0 entered promiscuous mode [ 431.505102][ T30] audit: type=1400 audit(1754685389.977:148): avc: denied { create } for pid=11158 comm="syz.0.4055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 432.852546][T11222] device macsec0 left promiscuous mode [ 433.899191][T11250] FAULT_INJECTION: forcing a failure. [ 433.899191][T11250] name failslab, interval 1, probability 0, space 0, times 0 [ 433.935435][T11250] CPU: 1 PID: 11250 Comm: syz.3.4088 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 433.945912][T11250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 433.955996][T11250] Call Trace: [ 433.959302][T11250] [ 433.962252][T11250] __dump_stack+0x21/0x30 [ 433.966699][T11250] dump_stack_lvl+0xee/0x150 [ 433.971324][T11250] ? show_regs_print_info+0x20/0x20 [ 433.976552][T11250] ? __kasan_check_read+0x11/0x20 [ 433.981648][T11250] ? preempt_schedule_irq+0xbb/0x110 [ 433.986966][T11250] dump_stack+0x15/0x20 [ 433.991250][T11250] should_fail+0x3c1/0x510 [ 433.995695][T11250] __should_failslab+0xa4/0xe0 [ 434.000488][T11250] should_failslab+0x9/0x20 [ 434.005027][T11250] slab_pre_alloc_hook+0x3b/0xe0 [ 434.010006][T11250] __kmalloc+0x6d/0x2c0 [ 434.014190][T11250] ? sk_prot_alloc+0xed/0x320 [ 434.018910][T11250] sk_prot_alloc+0xed/0x320 [ 434.023438][T11250] sk_alloc+0x38/0x430 [ 434.027557][T11250] bpf_prog_test_run_skb+0x24b/0x1150 [ 434.032972][T11250] ? __kasan_check_write+0x14/0x20 [ 434.038201][T11250] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 434.044140][T11250] bpf_prog_test_run+0x3d5/0x620 [ 434.049197][T11250] ? bpf_prog_query+0x230/0x230 [ 434.054078][T11250] ? selinux_bpf+0xce/0xf0 [ 434.058533][T11250] ? security_bpf+0x82/0xa0 [ 434.063066][T11250] __sys_bpf+0x52c/0x730 [ 434.067336][T11250] ? bpf_link_show_fdinfo+0x310/0x310 [ 434.072740][T11250] ? debug_smp_processor_id+0x17/0x20 [ 434.078145][T11250] __x64_sys_bpf+0x7c/0x90 [ 434.082585][T11250] x64_sys_call+0x4b9/0x9a0 [ 434.087126][T11250] do_syscall_64+0x4c/0xa0 [ 434.091569][T11250] ? clear_bhb_loop+0x50/0xa0 [ 434.096274][T11250] ? clear_bhb_loop+0x50/0xa0 [ 434.100977][T11250] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 434.106898][T11250] RIP: 0033:0x7fc5ffa62be9 [ 434.111338][T11250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 434.130972][T11250] RSP: 002b:00007fc5fe4cb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 434.139419][T11250] RAX: ffffffffffffffda RBX: 00007fc5ffc89fa0 RCX: 00007fc5ffa62be9 [ 434.147416][T11250] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 434.155412][T11250] RBP: 00007fc5fe4cb090 R08: 0000000000000000 R09: 0000000000000000 [ 434.163532][T11250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.171768][T11250] R13: 00007fc5ffc8a038 R14: 00007fc5ffc89fa0 R15: 00007ffd195a85b8 [ 434.179753][T11250] [ 435.642773][T11299] FAULT_INJECTION: forcing a failure. [ 435.642773][T11299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.666202][T11299] CPU: 1 PID: 11299 Comm: syz.2.4106 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 435.676511][T11299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 435.686599][T11299] Call Trace: [ 435.689900][T11299] [ 435.692853][T11299] __dump_stack+0x21/0x30 [ 435.697208][T11299] dump_stack_lvl+0xee/0x150 [ 435.701826][T11299] ? show_regs_print_info+0x20/0x20 [ 435.707049][T11299] dump_stack+0x15/0x20 [ 435.711224][T11299] should_fail+0x3c1/0x510 [ 435.715667][T11299] should_fail_usercopy+0x1a/0x20 [ 435.720727][T11299] _copy_to_user+0x20/0x90 [ 435.725273][T11299] simple_read_from_buffer+0xe9/0x160 [ 435.730671][T11299] proc_fail_nth_read+0x19a/0x210 [ 435.735729][T11299] ? proc_fault_inject_write+0x2f0/0x2f0 [ 435.741507][T11299] ? security_file_permission+0x83/0xa0 [ 435.747082][T11299] ? proc_fault_inject_write+0x2f0/0x2f0 [ 435.752742][T11299] vfs_read+0x282/0xbe0 [ 435.756930][T11299] ? kernel_read+0x1f0/0x1f0 [ 435.761676][T11299] ? __kasan_check_write+0x14/0x20 [ 435.766812][T11299] ? mutex_lock+0x95/0x1a0 [ 435.771251][T11299] ? wait_for_completion_killable_timeout+0x10/0x10 [ 435.777864][T11299] ? __fget_files+0x2c4/0x320 [ 435.782569][T11299] ? __fdget_pos+0x2d2/0x380 [ 435.787294][T11299] ? ksys_read+0x71/0x240 [ 435.791647][T11299] ksys_read+0x140/0x240 [ 435.795917][T11299] ? vfs_write+0xf70/0xf70 [ 435.800357][T11299] ? debug_smp_processor_id+0x17/0x20 [ 435.805780][T11299] __x64_sys_read+0x7b/0x90 [ 435.810308][T11299] x64_sys_call+0x96d/0x9a0 [ 435.814839][T11299] do_syscall_64+0x4c/0xa0 [ 435.819279][T11299] ? clear_bhb_loop+0x50/0xa0 [ 435.823982][T11299] ? clear_bhb_loop+0x50/0xa0 [ 435.828739][T11299] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 435.834671][T11299] RIP: 0033:0x7f9f838865fc [ 435.839106][T11299] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 435.858959][T11299] RSP: 002b:00007f9f822f0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 435.867551][T11299] RAX: ffffffffffffffda RBX: 00007f9f83aaefa0 RCX: 00007f9f838865fc [ 435.875553][T11299] RDX: 000000000000000f RSI: 00007f9f822f00a0 RDI: 0000000000000008 [ 435.883554][T11299] RBP: 00007f9f822f0090 R08: 0000000000000000 R09: 0000000000000000 [ 435.891549][T11299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.899545][T11299] R13: 00007f9f83aaf038 R14: 00007f9f83aaefa0 R15: 00007ffc4f6ebb28 [ 435.907671][T11299] [ 437.070489][T11330] device veth0_vlan left promiscuous mode [ 437.084549][T11330] device veth0_vlan entered promiscuous mode [ 438.137824][T11363] device macsec0 entered promiscuous mode [ 439.269951][T11393] device macsec0 left promiscuous mode [ 440.589502][T11433] FAULT_INJECTION: forcing a failure. [ 440.589502][T11433] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 440.655430][T11433] CPU: 0 PID: 11433 Comm: syz.1.4151 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 440.665758][T11433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 440.675841][T11433] Call Trace: [ 440.679140][T11433] [ 440.682198][T11433] __dump_stack+0x21/0x30 [ 440.686554][T11433] dump_stack_lvl+0xee/0x150 [ 440.691176][T11433] ? show_regs_print_info+0x20/0x20 [ 440.696495][T11433] dump_stack+0x15/0x20 [ 440.700681][T11433] should_fail+0x3c1/0x510 [ 440.705128][T11433] should_fail_alloc_page+0x55/0x80 [ 440.710364][T11433] prepare_alloc_pages+0x156/0x600 [ 440.715514][T11433] ? __alloc_pages_bulk+0xab0/0xab0 [ 440.720749][T11433] ? avc_denied+0x1b0/0x1b0 [ 440.725293][T11433] __alloc_pages+0x10a/0x440 [ 440.730020][T11433] ? prep_new_page+0x110/0x110 [ 440.734841][T11433] ? __kasan_check_write+0x14/0x20 [ 440.739981][T11433] ? avc_has_perm_noaudit+0x460/0x460 [ 440.745372][T11433] pipe_write+0x570/0x18d0 [ 440.749804][T11433] ? file_has_perm+0x4a1/0x640 [ 440.754591][T11433] ? pipe_write+0x191/0x18d0 [ 440.759187][T11433] ? pipe_read+0xfe0/0xfe0 [ 440.763615][T11433] ? selinux_file_permission+0x3f4/0x510 [ 440.769258][T11433] ? memset+0x35/0x40 [ 440.773418][T11433] ? iov_iter_init+0xbc/0x180 [ 440.778101][T11433] vfs_write+0x802/0xf70 [ 440.782350][T11433] ? file_end_write+0x1b0/0x1b0 [ 440.787203][T11433] ? __fget_files+0x2c4/0x320 [ 440.791886][T11433] ? __fdget_pos+0x1f7/0x380 [ 440.796484][T11433] ? ksys_write+0x71/0x240 [ 440.800902][T11433] ksys_write+0x140/0x240 [ 440.805333][T11433] ? __ia32_sys_read+0x90/0x90 [ 440.810108][T11433] ? debug_smp_processor_id+0x17/0x20 [ 440.815490][T11433] __x64_sys_write+0x7b/0x90 [ 440.820082][T11433] x64_sys_call+0x8ef/0x9a0 [ 440.824587][T11433] do_syscall_64+0x4c/0xa0 [ 440.829006][T11433] ? clear_bhb_loop+0x50/0xa0 [ 440.833904][T11433] ? clear_bhb_loop+0x50/0xa0 [ 440.838588][T11433] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 440.844486][T11433] RIP: 0033:0x7fdd63708be9 [ 440.848993][T11433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 440.868998][T11433] RSP: 002b:00007fdd62171038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 440.877428][T11433] RAX: ffffffffffffffda RBX: 00007fdd6392ffa0 RCX: 00007fdd63708be9 [ 440.885409][T11433] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 440.893389][T11433] RBP: 00007fdd62171090 R08: 0000000000000000 R09: 0000000000000000 [ 440.901466][T11433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 440.909439][T11433] R13: 00007fdd63930038 R14: 00007fdd6392ffa0 R15: 00007ffdfd1ed148 [ 440.917430][T11433] [ 441.359018][T11451] device syzkaller0 entered promiscuous mode [ 444.983853][T11560] FAULT_INJECTION: forcing a failure. [ 444.983853][T11560] name failslab, interval 1, probability 0, space 0, times 0 [ 445.045443][T11560] CPU: 1 PID: 11560 Comm: syz.4.4198 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 445.055830][T11560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 445.065937][T11560] Call Trace: [ 445.069244][T11560] [ 445.072192][T11560] __dump_stack+0x21/0x30 [ 445.076637][T11560] dump_stack_lvl+0xee/0x150 [ 445.081255][T11560] ? show_regs_print_info+0x20/0x20 [ 445.086485][T11560] dump_stack+0x15/0x20 [ 445.090688][T11560] should_fail+0x3c1/0x510 [ 445.095173][T11560] __should_failslab+0xa4/0xe0 [ 445.100147][T11560] should_failslab+0x9/0x20 [ 445.104674][T11560] slab_pre_alloc_hook+0x3b/0xe0 [ 445.109634][T11560] __kmalloc+0x6d/0x2c0 [ 445.113829][T11560] ? bpf_test_init+0x100/0x1c0 [ 445.118623][T11560] bpf_test_init+0x100/0x1c0 [ 445.123242][T11560] bpf_prog_test_run_skb+0x193/0x1150 [ 445.128649][T11560] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 445.134832][T11560] ? __kasan_check_write+0x14/0x20 [ 445.140076][T11560] ? fput_many+0x15a/0x1a0 [ 445.144524][T11560] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 445.150449][T11560] bpf_prog_test_run+0x3d5/0x620 [ 445.155410][T11560] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 445.161590][T11560] ? bpf_prog_query+0x230/0x230 [ 445.166463][T11560] ? selinux_bpf+0xce/0xf0 [ 445.170906][T11560] ? security_bpf+0x82/0xa0 [ 445.175430][T11560] __sys_bpf+0x52c/0x730 [ 445.179694][T11560] ? bpf_link_show_fdinfo+0x310/0x310 [ 445.185109][T11560] __x64_sys_bpf+0x7c/0x90 [ 445.189547][T11560] x64_sys_call+0x4b9/0x9a0 [ 445.194156][T11560] do_syscall_64+0x4c/0xa0 [ 445.198602][T11560] ? clear_bhb_loop+0x50/0xa0 [ 445.203309][T11560] ? clear_bhb_loop+0x50/0xa0 [ 445.208011][T11560] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 445.213939][T11560] RIP: 0033:0x7f8119069be9 [ 445.218380][T11560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 445.238005][T11560] RSP: 002b:00007f8117ad2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 445.246455][T11560] RAX: ffffffffffffffda RBX: 00007f8119290fa0 RCX: 00007f8119069be9 [ 445.254457][T11560] RDX: 0000000000000048 RSI: 00002000000003c0 RDI: 000000000000000a [ 445.262449][T11560] RBP: 00007f8117ad2090 R08: 0000000000000000 R09: 0000000000000000 [ 445.270446][T11560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 445.278523][T11560] R13: 00007f8119291038 R14: 00007f8119290fa0 R15: 00007ffd790d1ff8 [ 445.286527][T11560] [ 445.738105][T11574] FAULT_INJECTION: forcing a failure. [ 445.738105][T11574] name failslab, interval 1, probability 0, space 0, times 0 [ 445.835455][T11574] CPU: 0 PID: 11574 Comm: syz.3.4202 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 445.845962][T11574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 445.856049][T11574] Call Trace: [ 445.859351][T11574] [ 445.862301][T11574] __dump_stack+0x21/0x30 [ 445.866665][T11574] dump_stack_lvl+0xee/0x150 [ 445.871285][T11574] ? show_regs_print_info+0x20/0x20 [ 445.876514][T11574] dump_stack+0x15/0x20 [ 445.880697][T11574] should_fail+0x3c1/0x510 [ 445.885151][T11574] ? tipc_buf_acquire+0x2b/0xe0 [ 445.890057][T11574] __should_failslab+0xa4/0xe0 [ 445.894861][T11574] should_failslab+0x9/0x20 [ 445.899394][T11574] slab_pre_alloc_hook+0x3b/0xe0 [ 445.904529][T11574] ? tipc_buf_acquire+0x2b/0xe0 [ 445.909417][T11574] ? tipc_buf_acquire+0x2b/0xe0 [ 445.914305][T11574] __kmalloc_track_caller+0x6c/0x2c0 [ 445.919626][T11574] ? tipc_buf_acquire+0x2b/0xe0 [ 445.924513][T11574] ? tipc_buf_acquire+0x2b/0xe0 [ 445.929388][T11574] __alloc_skb+0x21a/0x740 [ 445.933939][T11574] tipc_buf_acquire+0x2b/0xe0 [ 445.938644][T11574] tipc_msg_build+0x8f1/0xfb0 [ 445.943356][T11574] __tipc_sendmsg+0x19dd/0x2680 [ 445.948234][T11574] ? _raw_spin_lock+0xe0/0xe0 [ 445.952941][T11574] ? local_bh_enable+0x30/0x30 [ 445.957728][T11574] ? wait_woken+0x170/0x170 [ 445.962396][T11574] ? avc_has_perm+0x158/0x240 [ 445.967107][T11574] ? __kasan_check_write+0x14/0x20 [ 445.972251][T11574] ? _raw_spin_lock_bh+0x8e/0xe0 [ 445.977220][T11574] ? _raw_spin_lock_irq+0xe0/0xe0 [ 445.982274][T11574] ? unwind_get_return_address+0x4d/0x90 [ 445.987938][T11574] ? stack_trace_save+0xe0/0xe0 [ 445.992815][T11574] ? __local_bh_enable_ip+0x58/0x80 [ 445.998149][T11574] ? lock_sock_nested+0x1f1/0x290 [ 446.003298][T11574] ? sock_init_data+0xc0/0xc0 [ 446.008014][T11574] ? stack_trace_save+0x98/0xe0 [ 446.012888][T11574] tipc_sendmsg+0x55/0x70 [ 446.017261][T11574] ? tipc_recvmsg+0x13a0/0x13a0 [ 446.022132][T11574] ____sys_sendmsg+0x5a2/0x8c0 [ 446.026933][T11574] ? __sys_sendmsg_sock+0x40/0x40 [ 446.031985][T11574] ? import_iovec+0x7c/0xb0 [ 446.036515][T11574] ___sys_sendmsg+0x1f0/0x260 [ 446.041223][T11574] ? __sys_sendmsg+0x250/0x250 [ 446.046025][T11574] ? __fdget+0x1a1/0x230 [ 446.050416][T11574] __x64_sys_sendmsg+0x1e2/0x2a0 [ 446.055382][T11574] ? ___sys_sendmsg+0x260/0x260 [ 446.060257][T11574] ? ksys_write+0x1eb/0x240 [ 446.064874][T11574] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 446.070968][T11574] x64_sys_call+0x4b/0x9a0 [ 446.075420][T11574] do_syscall_64+0x4c/0xa0 [ 446.079869][T11574] ? clear_bhb_loop+0x50/0xa0 [ 446.084572][T11574] ? clear_bhb_loop+0x50/0xa0 [ 446.089317][T11574] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 446.095241][T11574] RIP: 0033:0x7fc5ffa62be9 [ 446.099723][T11574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 446.119571][T11574] RSP: 002b:00007fc5fe4cb038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 446.128025][T11574] RAX: ffffffffffffffda RBX: 00007fc5ffc89fa0 RCX: 00007fc5ffa62be9 [ 446.136030][T11574] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 446.144046][T11574] RBP: 00007fc5fe4cb090 R08: 0000000000000000 R09: 0000000000000000 [ 446.152245][T11574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 446.160228][T11574] R13: 00007fc5ffc8a038 R14: 00007fc5ffc89fa0 R15: 00007ffd195a85b8 [ 446.168645][T11574] [ 446.776974][T11598] device pim6reg1 entered promiscuous mode [ 447.856987][T11626] device sit0 left promiscuous mode [ 447.922206][T11626] device sit0 entered promiscuous mode [ 450.038254][T11699] device sit0 left promiscuous mode [ 455.783554][T11839] FAULT_INJECTION: forcing a failure. [ 455.783554][T11839] name failslab, interval 1, probability 0, space 0, times 0 [ 455.831713][T11839] CPU: 1 PID: 11839 Comm: syz.1.4295 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 455.842122][T11839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 455.852388][T11839] Call Trace: [ 455.855854][T11839] [ 455.858917][T11839] __dump_stack+0x21/0x30 [ 455.863281][T11839] dump_stack_lvl+0xee/0x150 [ 455.867892][T11839] ? show_regs_print_info+0x20/0x20 [ 455.873118][T11839] ? memcpy+0x56/0x70 [ 455.877133][T11839] dump_stack+0x15/0x20 [ 455.881308][T11839] should_fail+0x3c1/0x510 [ 455.885748][T11839] __should_failslab+0xa4/0xe0 [ 455.890806][T11839] should_failslab+0x9/0x20 [ 455.895326][T11839] slab_pre_alloc_hook+0x3b/0xe0 [ 455.900277][T11839] kmem_cache_alloc_trace+0x48/0x270 [ 455.905588][T11839] ? tipc_group_create+0xa1/0x650 [ 455.910629][T11839] ? _raw_spin_lock_irq+0xe0/0xe0 [ 455.915677][T11839] tipc_group_create+0xa1/0x650 [ 455.920543][T11839] ? __local_bh_enable_ip+0x58/0x80 [ 455.925958][T11839] tipc_sk_join+0x234/0x6a0 [ 455.930485][T11839] ? sock_init_data+0xc0/0xc0 [ 455.935180][T11839] ? __tipc_sendstream+0x11a0/0x11a0 [ 455.940491][T11839] ? __kasan_check_write+0x14/0x20 [ 455.945614][T11839] ? _copy_from_user+0x95/0xd0 [ 455.950405][T11839] tipc_setsockopt+0x684/0x900 [ 455.955220][T11839] ? tipc_shutdown+0x400/0x400 [ 455.960087][T11839] ? security_socket_setsockopt+0x82/0xa0 [ 455.965825][T11839] ? tipc_shutdown+0x400/0x400 [ 455.970615][T11839] __sys_setsockopt+0x2f0/0x460 [ 455.975572][T11839] ? __kasan_check_write+0x14/0x20 [ 455.980708][T11839] ? __ia32_sys_recv+0xb0/0xb0 [ 455.985490][T11839] ? ksys_write+0x1eb/0x240 [ 455.990023][T11839] ? __ia32_sys_read+0x90/0x90 [ 455.994909][T11839] __x64_sys_setsockopt+0xbf/0xd0 [ 455.999970][T11839] x64_sys_call+0x982/0x9a0 [ 456.004512][T11839] do_syscall_64+0x4c/0xa0 [ 456.008949][T11839] ? clear_bhb_loop+0x50/0xa0 [ 456.013666][T11839] ? clear_bhb_loop+0x50/0xa0 [ 456.018515][T11839] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 456.024441][T11839] RIP: 0033:0x7fdd63708be9 [ 456.028870][T11839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.048498][T11839] RSP: 002b:00007fdd62171038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 456.057060][T11839] RAX: ffffffffffffffda RBX: 00007fdd6392ffa0 RCX: 00007fdd63708be9 [ 456.065221][T11839] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000007 [ 456.073206][T11839] RBP: 00007fdd62171090 R08: 00000000000004bd R09: 0000000000000000 [ 456.081196][T11839] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 456.089189][T11839] R13: 00007fdd63930038 R14: 00007fdd6392ffa0 R15: 00007ffdfd1ed148 [ 456.097185][T11839] [ 459.481443][T11862] FAULT_INJECTION: forcing a failure. [ 459.481443][T11862] name failslab, interval 1, probability 0, space 0, times 0 [ 459.578307][T11862] CPU: 0 PID: 11862 Comm: syz.1.4304 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 459.588623][T11862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 459.598801][T11862] Call Trace: [ 459.602359][T11862] [ 459.605319][T11862] __dump_stack+0x21/0x30 [ 459.609688][T11862] dump_stack_lvl+0xee/0x150 [ 459.614318][T11862] ? show_regs_print_info+0x20/0x20 [ 459.619552][T11862] ? memcpy+0x56/0x70 [ 459.623571][T11862] dump_stack+0x15/0x20 [ 459.627802][T11862] should_fail+0x3c1/0x510 [ 459.632254][T11862] __should_failslab+0xa4/0xe0 [ 459.637314][T11862] should_failslab+0x9/0x20 [ 459.641850][T11862] slab_pre_alloc_hook+0x3b/0xe0 [ 459.646841][T11862] kmem_cache_alloc_trace+0x48/0x270 [ 459.652170][T11862] ? tipc_group_create+0xa1/0x650 [ 459.657234][T11862] ? _raw_spin_lock_irq+0xe0/0xe0 [ 459.662294][T11862] tipc_group_create+0xa1/0x650 [ 459.667199][T11862] ? __local_bh_enable_ip+0x58/0x80 [ 459.672455][T11862] tipc_sk_join+0x234/0x6a0 [ 459.676990][T11862] ? sock_init_data+0xc0/0xc0 [ 459.681700][T11862] ? __tipc_sendstream+0x11a0/0x11a0 [ 459.687013][T11862] ? __kasan_check_write+0x14/0x20 [ 459.692163][T11862] ? _copy_from_user+0x95/0xd0 [ 459.696965][T11862] tipc_setsockopt+0x684/0x900 [ 459.701873][T11862] ? tipc_shutdown+0x400/0x400 [ 459.706665][T11862] ? security_socket_setsockopt+0x82/0xa0 [ 459.712421][T11862] ? tipc_shutdown+0x400/0x400 [ 459.717218][T11862] __sys_setsockopt+0x2f0/0x460 [ 459.722155][T11862] ? __kasan_check_write+0x14/0x20 [ 459.727300][T11862] ? __ia32_sys_recv+0xb0/0xb0 [ 459.732274][T11862] ? ksys_write+0x1eb/0x240 [ 459.736826][T11862] ? __ia32_sys_read+0x90/0x90 [ 459.741623][T11862] __x64_sys_setsockopt+0xbf/0xd0 [ 459.746677][T11862] x64_sys_call+0x982/0x9a0 [ 459.751204][T11862] do_syscall_64+0x4c/0xa0 [ 459.755647][T11862] ? clear_bhb_loop+0x50/0xa0 [ 459.760353][T11862] ? clear_bhb_loop+0x50/0xa0 [ 459.765062][T11862] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 459.770979][T11862] RIP: 0033:0x7fdd63708be9 [ 459.775422][T11862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 459.795250][T11862] RSP: 002b:00007fdd62171038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 459.803702][T11862] RAX: ffffffffffffffda RBX: 00007fdd6392ffa0 RCX: 00007fdd63708be9 [ 459.811797][T11862] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000006 [ 459.819798][T11862] RBP: 00007fdd62171090 R08: 00000000000004bd R09: 0000000000000000 [ 459.827801][T11862] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 459.835892][T11862] R13: 00007fdd63930038 R14: 00007fdd6392ffa0 R15: 00007ffdfd1ed148 [ 459.843914][T11862] [ 464.749313][T12030] FAULT_INJECTION: forcing a failure. [ 464.749313][T12030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 464.786290][T12030] CPU: 0 PID: 12030 Comm: syz.3.4366 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 464.796689][T12030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 464.806784][T12030] Call Trace: [ 464.810097][T12030] [ 464.813049][T12030] __dump_stack+0x21/0x30 [ 464.817408][T12030] dump_stack_lvl+0xee/0x150 [ 464.822011][T12030] ? show_regs_print_info+0x20/0x20 [ 464.827221][T12030] ? fixup_exception+0xd34/0x1360 [ 464.832260][T12030] dump_stack+0x15/0x20 [ 464.836426][T12030] should_fail+0x3c1/0x510 [ 464.840854][T12030] should_fail_alloc_page+0x55/0x80 [ 464.846156][T12030] prepare_alloc_pages+0x156/0x600 [ 464.851429][T12030] ? __alloc_pages_bulk+0xab0/0xab0 [ 464.856667][T12030] ? 0xffffffffa000e4d4 [ 464.860837][T12030] ? is_bpf_text_address+0x177/0x190 [ 464.866186][T12030] __alloc_pages+0x10a/0x440 [ 464.870797][T12030] ? prep_new_page+0x110/0x110 [ 464.875588][T12030] skb_page_frag_refill+0x202/0x3a0 [ 464.880804][T12030] tun_get_user+0x785/0x33c0 [ 464.885414][T12030] ? tun_do_read+0x1c40/0x1c40 [ 464.890194][T12030] ? kstrtouint_from_user+0x1a0/0x200 [ 464.895578][T12030] ? kstrtol_from_user+0x260/0x260 [ 464.900709][T12030] ? memset+0x35/0x40 [ 464.904736][T12030] ? putname+0x111/0x160 [ 464.908994][T12030] ? avc_policy_seqno+0x1b/0x70 [ 464.914036][T12030] ? selinux_file_permission+0x2aa/0x510 [ 464.919687][T12030] tun_chr_write_iter+0x1eb/0x2e0 [ 464.924899][T12030] vfs_write+0x802/0xf70 [ 464.929153][T12030] ? file_end_write+0x1b0/0x1b0 [ 464.934044][T12030] ? __fget_files+0x2c4/0x320 [ 464.938842][T12030] ? __fdget_pos+0x1f7/0x380 [ 464.943461][T12030] ? ksys_write+0x71/0x240 [ 464.947987][T12030] ksys_write+0x140/0x240 [ 464.952333][T12030] ? __ia32_sys_read+0x90/0x90 [ 464.957115][T12030] ? debug_smp_processor_id+0x17/0x20 [ 464.962522][T12030] __x64_sys_write+0x7b/0x90 [ 464.967166][T12030] x64_sys_call+0x8ef/0x9a0 [ 464.971700][T12030] do_syscall_64+0x4c/0xa0 [ 464.976243][T12030] ? clear_bhb_loop+0x50/0xa0 [ 464.980942][T12030] ? clear_bhb_loop+0x50/0xa0 [ 464.985665][T12030] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 464.991572][T12030] RIP: 0033:0x7fc5ffa62be9 [ 464.995999][T12030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.015617][T12030] RSP: 002b:00007fc5fe4cb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 465.024050][T12030] RAX: ffffffffffffffda RBX: 00007fc5ffc89fa0 RCX: 00007fc5ffa62be9 [ 465.032030][T12030] RDX: 0000000000000015 RSI: 0000200000000000 RDI: 00000000000000c8 [ 465.040094][T12030] RBP: 00007fc5fe4cb090 R08: 0000000000000000 R09: 0000000000000000 [ 465.048102][T12030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.056083][T12030] R13: 00007fc5ffc8a038 R14: 00007fc5ffc89fa0 R15: 00007ffd195a85b8 [ 465.064075][T12030] [ 468.763221][T12059] FAULT_INJECTION: forcing a failure. [ 468.763221][T12059] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 468.893127][T12059] CPU: 0 PID: 12059 Comm: syz.4.4373 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 468.903522][T12059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 468.913608][T12059] Call Trace: [ 468.916915][T12059] [ 468.919854][T12059] __dump_stack+0x21/0x30 [ 468.924280][T12059] dump_stack_lvl+0xee/0x150 [ 468.928877][T12059] ? show_regs_print_info+0x20/0x20 [ 468.934095][T12059] dump_stack+0x15/0x20 [ 468.938256][T12059] should_fail+0x3c1/0x510 [ 468.942682][T12059] should_fail_alloc_page+0x55/0x80 [ 468.948012][T12059] prepare_alloc_pages+0x156/0x600 [ 468.953150][T12059] ? __alloc_pages_bulk+0xab0/0xab0 [ 468.958351][T12059] ? slab_post_alloc_hook+0x4f/0x2b0 [ 468.963645][T12059] ? alloc_vmap_area+0x17a/0x1990 [ 468.968687][T12059] ? __get_vm_area_node+0x14e/0x350 [ 468.973889][T12059] ? __vmalloc_node_range+0xdf/0xaf0 [ 468.979185][T12059] ? kvmalloc_node+0xa6/0x300 [ 468.983873][T12059] __alloc_pages+0x10a/0x440 [ 468.988490][T12059] ? prep_new_page+0x110/0x110 [ 468.993392][T12059] ? __kasan_check_write+0x14/0x20 [ 468.998517][T12059] __get_free_pages+0x10/0x30 [ 469.003200][T12059] kasan_populate_vmalloc_pte+0x29/0x120 [ 469.008849][T12059] __apply_to_page_range+0x8b0/0xbf0 [ 469.014143][T12059] ? kasan_populate_vmalloc+0x70/0x70 [ 469.019531][T12059] ? kasan_populate_vmalloc+0x70/0x70 [ 469.024911][T12059] apply_to_page_range+0x3b/0x50 [ 469.029858][T12059] kasan_populate_vmalloc+0x60/0x70 [ 469.035142][T12059] alloc_vmap_area+0x185c/0x1990 [ 469.040088][T12059] ? vm_map_ram+0xa60/0xa60 [ 469.044597][T12059] ? __get_vm_area_node+0x11d/0x350 [ 469.049799][T12059] __get_vm_area_node+0x14e/0x350 [ 469.054833][T12059] __vmalloc_node_range+0xdf/0xaf0 [ 469.059950][T12059] ? btf_new_fd+0x1ee/0x920 [ 469.064457][T12059] ? __kasan_kmalloc_large+0x1a/0xb0 [ 469.069748][T12059] ? kmalloc_order+0xb9/0x160 [ 469.074434][T12059] ? kmalloc_order_trace+0x18/0xb0 [ 469.079549][T12059] ? btf_new_fd+0x1ee/0x920 [ 469.084067][T12059] __vmalloc_node+0x7f/0x90 [ 469.088573][T12059] ? btf_new_fd+0x1ee/0x920 [ 469.093081][T12059] kvmalloc_node+0xa6/0x300 [ 469.097587][T12059] ? vm_mmap+0xb0/0xb0 [ 469.101662][T12059] ? btf_new_fd+0x1b2/0x920 [ 469.106170][T12059] btf_new_fd+0x1ee/0x920 [ 469.110520][T12059] bpf_btf_load+0x6f/0x90 [ 469.114859][T12059] __sys_bpf+0x515/0x730 [ 469.119106][T12059] ? bpf_link_show_fdinfo+0x310/0x310 [ 469.124568][T12059] ? debug_smp_processor_id+0x17/0x20 [ 469.130067][T12059] __x64_sys_bpf+0x7c/0x90 [ 469.134501][T12059] x64_sys_call+0x4b9/0x9a0 [ 469.139013][T12059] do_syscall_64+0x4c/0xa0 [ 469.143439][T12059] ? clear_bhb_loop+0x50/0xa0 [ 469.148126][T12059] ? clear_bhb_loop+0x50/0xa0 [ 469.152808][T12059] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 469.158875][T12059] RIP: 0033:0x7f8119069be9 [ 469.163294][T12059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 469.182917][T12059] RSP: 002b:00007f8117ad2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 469.191356][T12059] RAX: ffffffffffffffda RBX: 00007f8119290fa0 RCX: 00007f8119069be9 [ 469.199352][T12059] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 469.207328][T12059] RBP: 00007f8117ad2090 R08: 0000000000000000 R09: 0000000000000000 [ 469.215300][T12059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 469.223277][T12059] R13: 00007f8119291038 R14: 00007f8119290fa0 R15: 00007ffd790d1ff8 [ 469.231273][T12059] [ 470.710133][T12108] tap0: tun_chr_ioctl cmd 1074025681 [ 470.856932][T12106] device wg2 entered promiscuous mode [ 470.948359][T12113] FAULT_INJECTION: forcing a failure. [ 470.948359][T12113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 470.983794][T12113] CPU: 1 PID: 12113 Comm: syz.0.4392 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 470.994474][T12113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 471.004556][T12113] Call Trace: [ 471.007843][T12113] [ 471.010789][T12113] __dump_stack+0x21/0x30 [ 471.015124][T12113] dump_stack_lvl+0xee/0x150 [ 471.019719][T12113] ? show_regs_print_info+0x20/0x20 [ 471.024923][T12113] dump_stack+0x15/0x20 [ 471.029085][T12113] should_fail+0x3c1/0x510 [ 471.033505][T12113] should_fail_usercopy+0x1a/0x20 [ 471.038531][T12113] _copy_from_user+0x20/0xd0 [ 471.043123][T12113] iovec_from_user+0x1bc/0x2f0 [ 471.047910][T12113] __import_iovec+0x71/0x400 [ 471.052508][T12113] ? kstrtol_from_user+0x260/0x260 [ 471.057621][T12113] import_iovec+0x7c/0xb0 [ 471.061961][T12113] ___sys_recvmsg+0x420/0x4f0 [ 471.066771][T12113] ? __sys_recvmsg+0x250/0x250 [ 471.071537][T12113] ? vfs_write+0xc17/0xf70 [ 471.075969][T12113] ? __fdget+0x1a1/0x230 [ 471.080213][T12113] __x64_sys_recvmsg+0x1df/0x2a0 [ 471.085169][T12113] ? ___sys_recvmsg+0x4f0/0x4f0 [ 471.090022][T12113] ? ksys_write+0x1eb/0x240 [ 471.094533][T12113] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 471.100601][T12113] x64_sys_call+0x705/0x9a0 [ 471.105103][T12113] do_syscall_64+0x4c/0xa0 [ 471.109521][T12113] ? clear_bhb_loop+0x50/0xa0 [ 471.114214][T12113] ? clear_bhb_loop+0x50/0xa0 [ 471.118901][T12113] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 471.124829][T12113] RIP: 0033:0x7f3bbed17be9 [ 471.129247][T12113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 471.148876][T12113] RSP: 002b:00007f3bbd780038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 471.157480][T12113] RAX: ffffffffffffffda RBX: 00007f3bbef3efa0 RCX: 00007f3bbed17be9 [ 471.165547][T12113] RDX: 0000000000000061 RSI: 0000200000000080 RDI: 0000000000000006 [ 471.173522][T12113] RBP: 00007f3bbd780090 R08: 0000000000000000 R09: 0000000000000000 [ 471.181495][T12113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 471.189483][T12113] R13: 00007f3bbef3f038 R14: 00007f3bbef3efa0 R15: 00007ffe4bc22c08 [ 471.197465][T12113] [ 471.349490][T12129] device sit0 entered promiscuous mode [ 472.290021][T12147] FAULT_INJECTION: forcing a failure. [ 472.290021][T12147] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 472.301898][T12148] device sit0 left promiscuous mode [ 472.331370][T12147] CPU: 0 PID: 12147 Comm: syz.1.4406 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 472.341678][T12147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 472.351761][T12147] Call Trace: [ 472.355068][T12147] [ 472.358025][T12147] __dump_stack+0x21/0x30 [ 472.362385][T12147] dump_stack_lvl+0xee/0x150 [ 472.367004][T12147] ? show_regs_print_info+0x20/0x20 [ 472.372237][T12147] dump_stack+0x15/0x20 [ 472.376680][T12147] should_fail+0x3c1/0x510 [ 472.381121][T12147] should_fail_usercopy+0x1a/0x20 [ 472.386173][T12147] _copy_from_user+0x20/0xd0 [ 472.390907][T12147] perf_copy_attr+0x154/0x870 [ 472.395615][T12147] __se_sys_perf_event_open+0xcb/0x1b80 [ 472.401300][T12147] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 472.406967][T12147] ? sched_clock+0x9/0x10 [ 472.411315][T12147] ? sched_clock_cpu+0x18/0x3c0 [ 472.416182][T12147] __x64_sys_perf_event_open+0xbf/0xd0 [ 472.421674][T12147] x64_sys_call+0x50d/0x9a0 [ 472.426195][T12147] do_syscall_64+0x4c/0xa0 [ 472.430631][T12147] ? clear_bhb_loop+0x50/0xa0 [ 472.435332][T12147] ? clear_bhb_loop+0x50/0xa0 [ 472.440032][T12147] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 472.445954][T12147] RIP: 0033:0x7fdd63708be9 [ 472.450392][T12147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 472.470016][T12147] RSP: 002b:00007fdd62171038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 472.478457][T12147] RAX: ffffffffffffffda RBX: 00007fdd6392ffa0 RCX: 00007fdd63708be9 [ 472.486448][T12147] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000003c0 [ 472.494523][T12147] RBP: 00007fdd62171090 R08: 0000000000000000 R09: 0000000000000000 [ 472.502533][T12147] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 472.510520][T12147] R13: 00007fdd63930038 R14: 00007fdd6392ffa0 R15: 00007ffdfd1ed148 [ 472.518737][T12147] [ 472.757269][T12158] device syzkaller0 entered promiscuous mode [ 473.479103][T12184] device wg2 entered promiscuous mode [ 474.346074][T12208] device syzkaller0 entered promiscuous mode [ 477.136076][T12264] -1: renamed from syzkaller0 [ 477.681420][T12282] FAULT_INJECTION: forcing a failure. [ 477.681420][T12282] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 477.731340][T12282] CPU: 0 PID: 12282 Comm: syz.2.4452 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 477.741762][T12282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 477.751836][T12282] Call Trace: [ 477.755131][T12282] [ 477.758072][T12282] __dump_stack+0x21/0x30 [ 477.762508][T12282] dump_stack_lvl+0xee/0x150 [ 477.767108][T12282] ? show_regs_print_info+0x20/0x20 [ 477.772322][T12282] dump_stack+0x15/0x20 [ 477.776505][T12282] should_fail+0x3c1/0x510 [ 477.780950][T12282] should_fail_alloc_page+0x55/0x80 [ 477.786257][T12282] prepare_alloc_pages+0x156/0x600 [ 477.791388][T12282] ? __alloc_pages_bulk+0xab0/0xab0 [ 477.796668][T12282] ? slab_post_alloc_hook+0x4f/0x2b0 [ 477.801965][T12282] ? alloc_vmap_area+0x63a/0x1990 [ 477.806994][T12282] ? __get_vm_area_node+0x14e/0x350 [ 477.812311][T12282] ? __vmalloc_node_range+0xdf/0xaf0 [ 477.817612][T12282] ? dev_map_create_hash+0x26/0x1c0 [ 477.822821][T12282] __alloc_pages+0x10a/0x440 [ 477.827419][T12282] ? prep_new_page+0x110/0x110 [ 477.832185][T12282] ? __kasan_check_write+0x14/0x20 [ 477.837425][T12282] __get_free_pages+0x10/0x30 [ 477.842304][T12282] kasan_populate_vmalloc_pte+0x29/0x120 [ 477.847975][T12282] __apply_to_page_range+0x8b0/0xbf0 [ 477.853291][T12282] ? kasan_populate_vmalloc+0x70/0x70 [ 477.858676][T12282] ? kasan_populate_vmalloc+0x70/0x70 [ 477.864054][T12282] apply_to_page_range+0x3b/0x50 [ 477.869000][T12282] kasan_populate_vmalloc+0x60/0x70 [ 477.874235][T12282] alloc_vmap_area+0x185c/0x1990 [ 477.879185][T12282] ? vm_map_ram+0xa60/0xa60 [ 477.883700][T12282] ? kmem_cache_alloc_trace+0x119/0x270 [ 477.889270][T12282] __get_vm_area_node+0x14e/0x350 [ 477.894308][T12282] __vmalloc_node_range+0xdf/0xaf0 [ 477.899427][T12282] ? dev_map_create_hash+0x26/0x1c0 [ 477.904641][T12282] bpf_map_area_alloc+0xd5/0xe0 [ 477.909506][T12282] ? dev_map_create_hash+0x26/0x1c0 [ 477.914721][T12282] dev_map_create_hash+0x26/0x1c0 [ 477.919864][T12282] dev_map_alloc+0x2d4/0x560 [ 477.924456][T12282] map_create+0x455/0x21b0 [ 477.928874][T12282] __sys_bpf+0x2cf/0x730 [ 477.933208][T12282] ? bpf_link_show_fdinfo+0x310/0x310 [ 477.938618][T12282] ? debug_smp_processor_id+0x17/0x20 [ 477.944001][T12282] __x64_sys_bpf+0x7c/0x90 [ 477.948425][T12282] x64_sys_call+0x4b9/0x9a0 [ 477.952930][T12282] do_syscall_64+0x4c/0xa0 [ 477.957350][T12282] ? clear_bhb_loop+0x50/0xa0 [ 477.962038][T12282] ? clear_bhb_loop+0x50/0xa0 [ 477.966722][T12282] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 477.972621][T12282] RIP: 0033:0x7f9f83887be9 [ 477.977052][T12282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 477.996659][T12282] RSP: 002b:00007f9f822f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 478.005079][T12282] RAX: ffffffffffffffda RBX: 00007f9f83aaefa0 RCX: 00007f9f83887be9 [ 478.013227][T12282] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 478.021198][T12282] RBP: 00007f9f822f0090 R08: 0000000000000000 R09: 0000000000000000 [ 478.029173][T12282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 478.037152][T12282] R13: 00007f9f83aaf038 R14: 00007f9f83aaefa0 R15: 00007ffc4f6ebb28 [ 478.045133][T12282] [ 479.057720][T12311] device wg2 entered promiscuous mode [ 481.857515][T12406] bond_slave_1: mtu less than device minimum [ 484.849362][T12485] FAULT_INJECTION: forcing a failure. [ 484.849362][T12485] name failslab, interval 1, probability 0, space 0, times 0 [ 484.875496][T12485] CPU: 1 PID: 12485 Comm: syz.1.4526 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 484.885912][T12485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 484.895985][T12485] Call Trace: [ 484.899274][T12485] [ 484.902209][T12485] __dump_stack+0x21/0x30 [ 484.906563][T12485] dump_stack_lvl+0xee/0x150 [ 484.911156][T12485] ? show_regs_print_info+0x20/0x20 [ 484.916366][T12485] ? avc_has_perm_noaudit+0x2f4/0x460 [ 484.921762][T12485] dump_stack+0x15/0x20 [ 484.925931][T12485] should_fail+0x3c1/0x510 [ 484.930357][T12485] __should_failslab+0xa4/0xe0 [ 484.935130][T12485] should_failslab+0x9/0x20 [ 484.939635][T12485] slab_pre_alloc_hook+0x3b/0xe0 [ 484.944579][T12485] ? __alloc_skb+0xe0/0x740 [ 484.949094][T12485] kmem_cache_alloc+0x44/0x260 [ 484.953864][T12485] __alloc_skb+0xe0/0x740 [ 484.958208][T12485] alloc_skb_with_frags+0xa8/0x620 [ 484.963433][T12485] sock_alloc_send_pskb+0x853/0x980 [ 484.968636][T12485] ? is_bpf_text_address+0x177/0x190 [ 484.973927][T12485] ? __kernel_text_address+0xa0/0x100 [ 484.979309][T12485] ? sock_kzfree_s+0x60/0x60 [ 484.983903][T12485] ? stack_trace_save+0x98/0xe0 [ 484.988764][T12485] tun_get_user+0x4e6/0x33c0 [ 484.993458][T12485] ? __kasan_poison_slab+0x70/0x70 [ 484.998581][T12485] ? kmem_cache_free+0x100/0x320 [ 485.003521][T12485] ? __x64_sys_openat+0x136/0x160 [ 485.008557][T12485] ? x64_sys_call+0x219/0x9a0 [ 485.013237][T12485] ? tun_do_read+0x1c40/0x1c40 [ 485.018099][T12485] ? kstrtouint_from_user+0x1a0/0x200 [ 485.023486][T12485] ? kstrtol_from_user+0x260/0x260 [ 485.028607][T12485] ? putname+0x111/0x160 [ 485.033030][T12485] ? avc_policy_seqno+0x1b/0x70 [ 485.037916][T12485] ? selinux_file_permission+0x2aa/0x510 [ 485.043561][T12485] tun_chr_write_iter+0x1eb/0x2e0 [ 485.048607][T12485] vfs_write+0x802/0xf70 [ 485.052854][T12485] ? file_end_write+0x1b0/0x1b0 [ 485.057709][T12485] ? __fget_files+0x2c4/0x320 [ 485.062492][T12485] ? __fdget_pos+0x1f7/0x380 [ 485.067084][T12485] ? ksys_write+0x71/0x240 [ 485.071513][T12485] ksys_write+0x140/0x240 [ 485.076021][T12485] ? __ia32_sys_read+0x90/0x90 [ 485.080783][T12485] ? debug_smp_processor_id+0x17/0x20 [ 485.086162][T12485] __x64_sys_write+0x7b/0x90 [ 485.090758][T12485] x64_sys_call+0x8ef/0x9a0 [ 485.095262][T12485] do_syscall_64+0x4c/0xa0 [ 485.099689][T12485] ? clear_bhb_loop+0x50/0xa0 [ 485.104367][T12485] ? clear_bhb_loop+0x50/0xa0 [ 485.109149][T12485] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 485.115053][T12485] RIP: 0033:0x7fdd63708be9 [ 485.119474][T12485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.139106][T12485] RSP: 002b:00007fdd62171038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 485.147609][T12485] RAX: ffffffffffffffda RBX: 00007fdd6392ffa0 RCX: 00007fdd63708be9 [ 485.155680][T12485] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 485.163656][T12485] RBP: 00007fdd62171090 R08: 0000000000000000 R09: 0000000000000000 [ 485.171715][T12485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 485.179707][T12485] R13: 00007fdd63930038 R14: 00007fdd6392ffa0 R15: 00007ffdfd1ed148 [ 485.187687][T12485] [ 488.318626][T12556] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.333621][T12556] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.346680][T12556] device bridge_slave_0 entered promiscuous mode [ 488.570767][T12556] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.577951][T12556] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.585460][T12556] device bridge_slave_1 entered promiscuous mode [ 488.593755][T12572] device syzkaller0 entered promiscuous mode [ 489.686596][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 489.724919][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 489.782831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 489.801804][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 489.816179][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 489.823393][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 489.890775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 489.964862][T12556] device veth0_vlan entered promiscuous mode [ 489.981806][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 489.993944][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 490.002951][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.010049][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 490.028849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 490.038938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 490.047794][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 490.056248][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 490.064364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 490.072986][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 490.081447][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 490.089559][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.098005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 490.105791][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 490.999180][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 491.012890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 491.039097][ T45] device gretap0 left promiscuous mode [ 491.044634][ T45] bridge0: port 3(gretap0) entered disabled state [ 491.150214][T12556] device veth1_macvtap entered promiscuous mode [ 491.254428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 491.300235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 491.371190][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 491.441594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 491.495761][ T45] device bridge_slave_1 left promiscuous mode [ 491.501954][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.535717][ T45] device bridge_slave_0 left promiscuous mode [ 491.562501][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.342595][T12647] device wg2 left promiscuous mode [ 494.245816][T12709] device wg2 left promiscuous mode [ 494.386503][T12711] device pim6reg1 entered promiscuous mode [ 494.567307][T12712] device wg2 entered promiscuous mode [ 495.006733][T12724] device veth1_macvtap left promiscuous mode [ 495.530384][T12757] device wg2 left promiscuous mode [ 495.651693][T12758] device wg2 entered promiscuous mode [ 498.459826][T12810] device syzkaller0 entered promiscuous mode [ 498.568134][T12817] device wg2 left promiscuous mode [ 498.844662][T12825] device wg2 entered promiscuous mode [ 499.121808][T12831] device wg2 entered promiscuous mode [ 501.676204][T12884] FAULT_INJECTION: forcing a failure. [ 501.676204][T12884] name failslab, interval 1, probability 0, space 0, times 0 [ 501.705369][T12884] CPU: 0 PID: 12884 Comm: syz.4.4674 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 501.715764][T12884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 501.725921][T12884] Call Trace: [ 501.729212][T12884] [ 501.732144][T12884] __dump_stack+0x21/0x30 [ 501.736496][T12884] dump_stack_lvl+0xee/0x150 [ 501.741102][T12884] ? show_regs_print_info+0x20/0x20 [ 501.746327][T12884] dump_stack+0x15/0x20 [ 501.750492][T12884] should_fail+0x3c1/0x510 [ 501.754916][T12884] ? tipc_buf_acquire+0x2b/0xe0 [ 501.759775][T12884] __should_failslab+0xa4/0xe0 [ 501.764549][T12884] should_failslab+0x9/0x20 [ 501.769054][T12884] slab_pre_alloc_hook+0x3b/0xe0 [ 501.773996][T12884] ? tipc_buf_acquire+0x2b/0xe0 [ 501.778854][T12884] ? tipc_buf_acquire+0x2b/0xe0 [ 501.783708][T12884] __kmalloc_track_caller+0x6c/0x2c0 [ 501.788997][T12884] ? tipc_buf_acquire+0x2b/0xe0 [ 501.793861][T12884] ? tipc_buf_acquire+0x2b/0xe0 [ 501.798709][T12884] __alloc_skb+0x21a/0x740 [ 501.803133][T12884] tipc_buf_acquire+0x2b/0xe0 [ 501.807807][T12884] tipc_msg_build+0x544/0xfb0 [ 501.812490][T12884] __tipc_sendmsg+0x19dd/0x2680 [ 501.817419][T12884] ? _raw_spin_lock+0xe0/0xe0 [ 501.822129][T12884] ? local_bh_enable+0x30/0x30 [ 501.826920][T12884] ? wait_woken+0x170/0x170 [ 501.831431][T12884] ? avc_has_perm+0x158/0x240 [ 501.836116][T12884] ? __kasan_check_write+0x14/0x20 [ 501.841350][T12884] ? _raw_spin_lock_bh+0x8e/0xe0 [ 501.846416][T12884] ? _raw_spin_lock_irq+0xe0/0xe0 [ 501.851461][T12884] ? __local_bh_enable_ip+0x58/0x80 [ 501.856677][T12884] ? lock_sock_nested+0x1f1/0x290 [ 501.861708][T12884] ? sock_init_data+0xc0/0xc0 [ 501.866386][T12884] ? stack_trace_save+0x98/0xe0 [ 501.871243][T12884] ? __pcpu_freelist_pop+0x4b6/0x4d0 [ 501.876538][T12884] tipc_sendmsg+0x55/0x70 [ 501.880892][T12884] ? tipc_recvmsg+0x13a0/0x13a0 [ 501.885747][T12884] ____sys_sendmsg+0x5a2/0x8c0 [ 501.890523][T12884] ? __sys_sendmsg_sock+0x40/0x40 [ 501.895579][T12884] ? import_iovec+0x7c/0xb0 [ 501.900089][T12884] ___sys_sendmsg+0x1f0/0x260 [ 501.904774][T12884] ? __sys_sendmsg+0x250/0x250 [ 501.909546][T12884] ? __fdget+0x1a1/0x230 [ 501.913792][T12884] __x64_sys_sendmsg+0x1e2/0x2a0 [ 501.918731][T12884] ? ___sys_sendmsg+0x260/0x260 [ 501.923585][T12884] ? ksys_write+0x1eb/0x240 [ 501.928093][T12884] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 501.934195][T12884] x64_sys_call+0x4b/0x9a0 [ 501.938626][T12884] do_syscall_64+0x4c/0xa0 [ 501.943064][T12884] ? clear_bhb_loop+0x50/0xa0 [ 501.947758][T12884] ? clear_bhb_loop+0x50/0xa0 [ 501.952534][T12884] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 501.958435][T12884] RIP: 0033:0x7f8119069be9 [ 501.962857][T12884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 501.982730][T12884] RSP: 002b:00007f8117ad2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 501.991143][T12884] RAX: ffffffffffffffda RBX: 00007f8119290fa0 RCX: 00007f8119069be9 [ 501.999200][T12884] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 502.007171][T12884] RBP: 00007f8117ad2090 R08: 0000000000000000 R09: 0000000000000000 [ 502.015166][T12884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 502.023144][T12884] R13: 00007f8119291038 R14: 00007f8119290fa0 R15: 00007ffd790d1ff8 [ 502.031125][T12884] [ 502.317914][T12903] device wg2 left promiscuous mode [ 503.535393][T12903] device wg2 entered promiscuous mode [ 505.996445][T12970] device wg2 left promiscuous mode [ 506.039899][T12970] device wg2 entered promiscuous mode [ 507.389250][T13011] device syzkaller0 entered promiscuous mode [ 508.343846][T13049] device syzkaller0 entered promiscuous mode [ 509.284530][T13074] device sit0 entered promiscuous mode [ 510.041082][T13085] device sit0 left promiscuous mode [ 510.164557][T13086] device sit0 entered promiscuous mode [ 511.396631][T13126] device wg2 left promiscuous mode [ 511.506247][T13126] device wg2 entered promiscuous mode [ 512.779877][T13155] device syzkaller0 entered promiscuous mode [ 512.825383][T13158] FAULT_INJECTION: forcing a failure. [ 512.825383][T13158] name failslab, interval 1, probability 0, space 0, times 0 [ 512.850997][T13158] CPU: 1 PID: 13158 Comm: syz.4.4779 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 512.861302][T13158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 512.871382][T13158] Call Trace: [ 512.874801][T13158] [ 512.877753][T13158] __dump_stack+0x21/0x30 [ 512.882126][T13158] dump_stack_lvl+0xee/0x150 [ 512.886744][T13158] ? show_regs_print_info+0x20/0x20 [ 512.891968][T13158] dump_stack+0x15/0x20 [ 512.896135][T13158] should_fail+0x3c1/0x510 [ 512.900574][T13158] __should_failslab+0xa4/0xe0 [ 512.905350][T13158] should_failslab+0x9/0x20 [ 512.909887][T13158] slab_pre_alloc_hook+0x3b/0xe0 [ 512.914842][T13158] ? security_inode_alloc+0x33/0x110 [ 512.920153][T13158] kmem_cache_alloc+0x44/0x260 [ 512.924931][T13158] security_inode_alloc+0x33/0x110 [ 512.930052][T13158] inode_init_always+0x711/0x990 [ 512.935001][T13158] new_inode_pseudo+0x91/0x210 [ 512.939774][T13158] __sock_create+0x12c/0x7a0 [ 512.944377][T13158] __sys_socketpair+0x1a1/0x590 [ 512.949237][T13158] __x64_sys_socketpair+0x9b/0xb0 [ 512.954278][T13158] x64_sys_call+0x36/0x9a0 [ 512.958694][T13158] do_syscall_64+0x4c/0xa0 [ 512.963115][T13158] ? clear_bhb_loop+0x50/0xa0 [ 512.967883][T13158] ? clear_bhb_loop+0x50/0xa0 [ 512.972568][T13158] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 512.978552][T13158] RIP: 0033:0x7f8119069be9 [ 512.982971][T13158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 513.002579][T13158] RSP: 002b:00007f8117ad2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 513.010995][T13158] RAX: ffffffffffffffda RBX: 00007f8119290fa0 RCX: 00007f8119069be9 [ 513.018969][T13158] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000018 [ 513.027025][T13158] RBP: 00007f8117ad2090 R08: 0000000000000000 R09: 0000000000000000 [ 513.035156][T13158] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 513.043126][T13158] R13: 00007f8119291038 R14: 00007f8119290fa0 R15: 00007ffd790d1ff8 [ 513.051108][T13158] [ 513.082156][T13158] socket: no more sockets [ 513.307988][T13170] device wg2 left promiscuous mode [ 513.506522][T13170] device wg2 entered promiscuous mode [ 514.541844][T13203] device wg2 left promiscuous mode [ 514.697717][T13206] device wg2 entered promiscuous mode [ 515.112889][T13209] ±ÿ: renamed from team_slave_1 [ 516.100475][T13237] device wg2 left promiscuous mode [ 516.139557][T13240] syz.2.4808[13240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.139633][T13240] syz.2.4808[13240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.219065][T13242] device syzkaller0 entered promiscuous mode [ 516.258211][T13237] device wg2 entered promiscuous mode [ 516.285724][T13242] FAULT_INJECTION: forcing a failure. [ 516.285724][T13242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 516.312032][T13242] CPU: 0 PID: 13242 Comm: syz.0.4809 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 516.322381][T13242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 516.332723][T13242] Call Trace: [ 516.336024][T13242] [ 516.338967][T13242] __dump_stack+0x21/0x30 [ 516.343336][T13242] dump_stack_lvl+0xee/0x150 [ 516.346217][T13245] device pim6reg1 entered promiscuous mode [ 516.347953][T13242] ? show_regs_print_info+0x20/0x20 [ 516.359052][T13242] ? __kmalloc_track_caller+0x13c/0x2c0 [ 516.364670][T13242] ? alloc_skb_with_frags+0xa8/0x620 [ 516.369974][T13242] ? tun_chr_write_iter+0x1eb/0x2e0 [ 516.375188][T13242] ? vfs_write+0x802/0xf70 [ 516.379765][T13242] dump_stack+0x15/0x20 [ 516.383938][T13242] should_fail+0x3c1/0x510 [ 516.388373][T13242] should_fail_alloc_page+0x55/0x80 [ 516.393619][T13242] prepare_alloc_pages+0x156/0x600 [ 516.398760][T13242] ? __alloc_pages_bulk+0xab0/0xab0 [ 516.403987][T13242] __alloc_pages+0x10a/0x440 [ 516.408618][T13242] ? prep_new_page+0x110/0x110 [ 516.413405][T13242] ? __alloc_skb+0x463/0x740 [ 516.418015][T13242] alloc_skb_with_frags+0x20c/0x620 [ 516.423332][T13242] sock_alloc_send_pskb+0x853/0x980 [ 516.428560][T13242] ? sock_kzfree_s+0x60/0x60 [ 516.432744][T13245] device syzkaller0 entered promiscuous mode [ 516.433174][T13242] ? bpf_prog_8f4d9728dfbc680e+0x21/0x590 [ 516.445051][T13242] ? iov_iter_advance+0x1f9/0x360 [ 516.450115][T13242] tun_get_user+0x4e6/0x33c0 [ 516.454733][T13242] ? get_perf_callchain+0x2e0/0x480 [ 516.459959][T13242] ? tun_do_read+0x1c40/0x1c40 [ 516.464742][T13242] ? kstrtouint_from_user+0x1a0/0x200 [ 516.470132][T13242] ? kstrtol_from_user+0x260/0x260 [ 516.475256][T13242] ? bpf_prog_8f4d9728dfbc680e+0x21/0x590 [ 516.480988][T13242] ? hist_enable_count_trigger+0x228/0x240 [ 516.486813][T13242] ? putname+0x111/0x160 [ 516.491067][T13242] ? avc_policy_seqno+0x1b/0x70 [ 516.496042][T13242] ? selinux_file_permission+0x2aa/0x510 [ 516.501781][T13242] tun_chr_write_iter+0x1eb/0x2e0 [ 516.506820][T13242] vfs_write+0x802/0xf70 [ 516.511076][T13242] ? file_end_write+0x1b0/0x1b0 [ 516.515940][T13242] ? __fget_files+0x2c4/0x320 [ 516.520624][T13242] ? __fdget_pos+0x1f7/0x380 [ 516.525303][T13242] ? ksys_write+0x71/0x240 [ 516.529734][T13242] ksys_write+0x140/0x240 [ 516.534088][T13242] ? __ia32_sys_read+0x90/0x90 [ 516.538854][T13242] ? debug_smp_processor_id+0x17/0x20 [ 516.544248][T13242] __x64_sys_write+0x7b/0x90 [ 516.548845][T13242] x64_sys_call+0x8ef/0x9a0 [ 516.553357][T13242] do_syscall_64+0x4c/0xa0 [ 516.557784][T13242] ? clear_bhb_loop+0x50/0xa0 [ 516.562551][T13242] ? clear_bhb_loop+0x50/0xa0 [ 516.567406][T13242] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 516.573305][T13242] RIP: 0033:0x7f3bbed17be9 [ 516.577721][T13242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 516.597378][T13242] RSP: 002b:00007f3bbd780038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 516.605926][T13242] RAX: ffffffffffffffda RBX: 00007f3bbef3efa0 RCX: 00007f3bbed17be9 [ 516.613897][T13242] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000006 [ 516.621868][T13242] RBP: 00007f3bbd780090 R08: 0000000000000000 R09: 0000000000000000 [ 516.629945][T13242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 516.637923][T13242] R13: 00007f3bbef3f038 R14: 00007f3bbef3efa0 R15: 00007ffe4bc22c08 [ 516.645902][T13242] [ 518.902793][T13276] device syzkaller0 entered promiscuous mode [ 518.956290][T13278] device wg2 left promiscuous mode [ 519.114255][T13278] device wg2 entered promiscuous mode [ 523.688328][T13368] device syzkaller0 entered promiscuous mode [ 525.342648][T13405] device wg2 entered promiscuous mode [ 525.444062][T13413] device wg2 left promiscuous mode [ 525.511738][T13417] device wg2 left promiscuous mode [ 525.666202][T13419] device wg2 entered promiscuous mode [ 525.749995][T13413] device wg2 entered promiscuous mode [ 526.323076][T13451] FAULT_INJECTION: forcing a failure. [ 526.323076][T13451] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 526.385479][T13451] CPU: 0 PID: 13451 Comm: syz.3.4889 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 526.395863][T13451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 526.406110][T13451] Call Trace: [ 526.409399][T13451] [ 526.412340][T13451] __dump_stack+0x21/0x30 [ 526.416684][T13451] dump_stack_lvl+0xee/0x150 [ 526.421279][T13451] ? show_regs_print_info+0x20/0x20 [ 526.426482][T13451] dump_stack+0x15/0x20 [ 526.430647][T13451] should_fail+0x3c1/0x510 [ 526.435067][T13451] should_fail_usercopy+0x1a/0x20 [ 526.440093][T13451] _copy_from_user+0x20/0xd0 [ 526.444687][T13451] bpf_test_init+0x13d/0x1c0 [ 526.449283][T13451] bpf_prog_test_run_skb+0x193/0x1150 [ 526.454691][T13451] ? __kasan_check_write+0x14/0x20 [ 526.459896][T13451] ? fput_many+0x15a/0x1a0 [ 526.464316][T13451] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 526.470220][T13451] bpf_prog_test_run+0x3d5/0x620 [ 526.475163][T13451] ? bpf_prog_query+0x230/0x230 [ 526.480017][T13451] ? selinux_bpf+0xce/0xf0 [ 526.484454][T13451] ? security_bpf+0x82/0xa0 [ 526.488962][T13451] __sys_bpf+0x52c/0x730 [ 526.493204][T13451] ? bpf_link_show_fdinfo+0x310/0x310 [ 526.498582][T13451] ? debug_smp_processor_id+0x17/0x20 [ 526.503969][T13451] __x64_sys_bpf+0x7c/0x90 [ 526.508389][T13451] x64_sys_call+0x4b9/0x9a0 [ 526.512899][T13451] do_syscall_64+0x4c/0xa0 [ 526.517325][T13451] ? clear_bhb_loop+0x50/0xa0 [ 526.522008][T13451] ? clear_bhb_loop+0x50/0xa0 [ 526.526711][T13451] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 526.532611][T13451] RIP: 0033:0x7f6181ad7be9 [ 526.537030][T13451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 526.556638][T13451] RSP: 002b:00007f6180540038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 526.565081][T13451] RAX: ffffffffffffffda RBX: 00007f6181cfefa0 RCX: 00007f6181ad7be9 [ 526.573147][T13451] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 526.581124][T13451] RBP: 00007f6180540090 R08: 0000000000000000 R09: 0000000000000000 [ 526.589106][T13451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 526.597125][T13451] R13: 00007f6181cff038 R14: 00007f6181cfefa0 R15: 00007ffd2da78568 [ 526.605111][T13451] [ 527.039905][T13478] device wg2 left promiscuous mode [ 527.052443][T13479] device wg2 left promiscuous mode [ 527.113721][T13478] device wg2 entered promiscuous mode [ 527.164472][T13479] device wg2 entered promiscuous mode [ 527.466987][T13509] device wg2 left promiscuous mode [ 527.690205][T13515] device wg2 entered promiscuous mode [ 528.012743][T13520] device syzkaller0 entered promiscuous mode [ 528.587044][T13555] device wg2 left promiscuous mode [ 528.736998][T13556] device wg2 entered promiscuous mode [ 528.824323][T13560] device wg2 left promiscuous mode [ 529.370054][T13594] device wg2 left promiscuous mode [ 529.534675][T13594] device wg2 entered promiscuous mode [ 529.615599][T13603] FAULT_INJECTION: forcing a failure. [ 529.615599][T13603] name failslab, interval 1, probability 0, space 0, times 0 [ 529.695495][T13603] CPU: 0 PID: 13603 Comm: syz.3.4948 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 529.705811][T13603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 529.715899][T13603] Call Trace: [ 529.719201][T13603] [ 529.722155][T13603] __dump_stack+0x21/0x30 [ 529.726648][T13603] dump_stack_lvl+0xee/0x150 [ 529.731268][T13603] ? show_regs_print_info+0x20/0x20 [ 529.736487][T13603] dump_stack+0x15/0x20 [ 529.740785][T13603] should_fail+0x3c1/0x510 [ 529.745244][T13603] __should_failslab+0xa4/0xe0 [ 529.750041][T13603] should_failslab+0x9/0x20 [ 529.754589][T13603] slab_pre_alloc_hook+0x3b/0xe0 [ 529.759566][T13603] ? __alloc_skb+0xe0/0x740 [ 529.764100][T13603] kmem_cache_alloc+0x44/0x260 [ 529.768895][T13603] __alloc_skb+0xe0/0x740 [ 529.773260][T13603] br_info_notify+0xae/0x170 [ 529.777964][T13603] br_ifinfo_notify+0x2a/0x40 [ 529.782684][T13603] br_device_event+0x6af/0x790 [ 529.787477][T13603] ? br_boolopt_multi_get+0xf0/0xf0 [ 529.792696][T13603] ? packet_notifier+0x8bc/0x8d0 [ 529.797654][T13603] ? addrconf_notify+0x37b/0xde0 [ 529.802742][T13603] raw_notifier_call_chain+0x90/0x100 [ 529.808204][T13603] dev_set_mac_address+0x318/0x420 [ 529.813353][T13603] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 529.819195][T13603] dev_set_mac_address_user+0x31/0x50 [ 529.824693][T13603] dev_ifsioc+0x757/0xe70 [ 529.829066][T13603] ? dev_ioctl+0xd10/0xd10 [ 529.833505][T13603] ? __kasan_check_write+0x14/0x20 [ 529.838641][T13603] ? mutex_lock+0x95/0x1a0 [ 529.843168][T13603] ? wait_for_completion_killable_timeout+0x10/0x10 [ 529.849780][T13603] ? dev_get_by_name_rcu+0xc8/0xf0 [ 529.854913][T13603] dev_ioctl+0x560/0xd10 [ 529.859177][T13603] sock_do_ioctl+0x22e/0x300 [ 529.863794][T13603] ? sock_show_fdinfo+0xa0/0xa0 [ 529.868671][T13603] ? selinux_file_ioctl+0x377/0x480 [ 529.873905][T13603] sock_ioctl+0x4bc/0x6b0 [ 529.878263][T13603] ? sock_poll+0x3d0/0x3d0 [ 529.882706][T13603] ? __fget_files+0x2c4/0x320 [ 529.887410][T13603] ? security_file_ioctl+0x84/0xa0 [ 529.892542][T13603] ? sock_poll+0x3d0/0x3d0 [ 529.896992][T13603] __se_sys_ioctl+0x121/0x1a0 [ 529.901695][T13603] __x64_sys_ioctl+0x7b/0x90 [ 529.906312][T13603] x64_sys_call+0x2f/0x9a0 [ 529.910761][T13603] do_syscall_64+0x4c/0xa0 [ 529.915196][T13603] ? clear_bhb_loop+0x50/0xa0 [ 529.919901][T13603] ? clear_bhb_loop+0x50/0xa0 [ 529.924596][T13603] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 529.930507][T13603] RIP: 0033:0x7f6181ad7be9 [ 529.934935][T13603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 529.954642][T13603] RSP: 002b:00007f6180540038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.963081][T13603] RAX: ffffffffffffffda RBX: 00007f6181cfefa0 RCX: 00007f6181ad7be9 [ 529.971242][T13603] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 529.979245][T13603] RBP: 00007f6180540090 R08: 0000000000000000 R09: 0000000000000000 [ 529.987233][T13603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 529.995230][T13603] R13: 00007f6181cff038 R14: 00007f6181cfefa0 R15: 00007ffd2da78568 [ 530.003226][T13603] [ 530.085741][T13619] FAULT_INJECTION: forcing a failure. [ 530.085741][T13619] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 530.100819][T13619] CPU: 0 PID: 13619 Comm: syz.1.4955 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 530.111117][T13619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 530.121190][T13619] Call Trace: [ 530.124482][T13619] [ 530.127430][T13619] __dump_stack+0x21/0x30 [ 530.131793][T13619] dump_stack_lvl+0xee/0x150 [ 530.136385][T13619] ? show_regs_print_info+0x20/0x20 [ 530.141592][T13619] dump_stack+0x15/0x20 [ 530.145744][T13619] should_fail+0x3c1/0x510 [ 530.150165][T13619] should_fail_alloc_page+0x55/0x80 [ 530.155462][T13619] prepare_alloc_pages+0x156/0x600 [ 530.160665][T13619] ? __alloc_pages_bulk+0xab0/0xab0 [ 530.165871][T13619] ? flush_tlb_one_user+0x50/0x50 [ 530.170899][T13619] ? cgroup_rstat_updated+0xf5/0x370 [ 530.176186][T13619] __alloc_pages+0x10a/0x440 [ 530.180779][T13619] ? prep_new_page+0x110/0x110 [ 530.185544][T13619] wp_page_copy+0x1c9/0x18f0 [ 530.190140][T13619] ? insert_page_into_pte_locked+0x310/0x310 [ 530.196146][T13619] ? _raw_spin_lock+0x8e/0xe0 [ 530.200825][T13619] ? _raw_spin_trylock_bh+0x130/0x130 [ 530.206199][T13619] ? vm_normal_page+0x1dd/0x1f0 [ 530.211046][T13619] do_wp_page+0x731/0xc90 [ 530.215374][T13619] handle_pte_fault+0x73c/0x2680 [ 530.220314][T13619] ? fault_around_bytes_set+0xc0/0xc0 [ 530.225687][T13619] do_handle_mm_fault+0x1a6d/0x1d50 [ 530.230922][T13619] ? numa_migrate_prep+0xd0/0xd0 [ 530.235869][T13619] ? __find_vma+0x30/0x150 [ 530.240285][T13619] do_user_addr_fault+0x841/0x1180 [ 530.245405][T13619] ? do_kern_addr_fault+0x80/0x80 [ 530.250445][T13619] ? new_inode_pseudo+0x91/0x210 [ 530.255404][T13619] ? new_inode+0x28/0x1e0 [ 530.259738][T13619] ? proc_pid_make_inode+0x27/0x1d0 [ 530.264939][T13619] ? proc_pident_instantiate+0x69/0x2b0 [ 530.270489][T13619] ? proc_pident_lookup+0x1c0/0x270 [ 530.275684][T13619] ? proc_tid_base_lookup+0x2b/0x30 [ 530.280891][T13619] ? path_openat+0xfcf/0x2f10 [ 530.285565][T13619] ? do_filp_open+0x1b3/0x3e0 [ 530.290242][T13619] ? do_sys_openat2+0x14c/0x7b0 [ 530.295090][T13619] ? __x64_sys_openat+0x136/0x160 [ 530.300116][T13619] ? x64_sys_call+0x219/0x9a0 [ 530.304794][T13619] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 530.310867][T13619] exc_page_fault+0x51/0xb0 [ 530.315375][T13619] asm_exc_page_fault+0x27/0x30 [ 530.320226][T13619] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 530.326815][T13619] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 530.346436][T13619] RSP: 0018:ffffc90001d5f678 EFLAGS: 00050206 [ 530.352514][T13619] RAX: ffffffff8249ea01 RBX: ffff8881442000c8 RCX: 000000000000950f [ 530.360482][T13619] RDX: 000000000000ff0f RSI: ffff888144206ac8 RDI: 0000200000007000 [ 530.368451][T13619] RBP: ffffc90001d5f7c8 R08: dffffc0000000000 R09: ffffed1028841ffb [ 530.376433][T13619] R10: 0000000000000000 R11: 0000000000001fd8 R12: 000020000001050f [ 530.384497][T13619] R13: 000000000000ff0f R14: 0000200000000600 R15: 0000000000000000 [ 530.392563][T13619] ? _copy_to_iter+0x1b1/0x1070 [ 530.397419][T13619] ? _copy_to_iter+0x296/0x1070 [ 530.402290][T13619] ? memcpy+0x56/0x70 [ 530.406292][T13619] ? avc_has_perm_noaudit+0x2f4/0x460 [ 530.411668][T13619] ? iov_iter_init+0x180/0x180 [ 530.416458][T13619] ? __kasan_check_write+0x14/0x20 [ 530.421697][T13619] ? _raw_spin_lock_bh+0x8e/0xe0 [ 530.426640][T13619] ? check_stack_object+0x81/0x140 [ 530.431767][T13619] ? __check_object_size+0x2f4/0x3c0 [ 530.437059][T13619] simple_copy_to_iter+0x50/0x70 [ 530.441999][T13619] __skb_datagram_iter+0xe0/0x710 [ 530.447022][T13619] ? tsk_importance+0x150/0x150 [ 530.451891][T13619] ? skb_copy_datagram_iter+0x150/0x150 [ 530.457438][T13619] skb_copy_datagram_iter+0x40/0x150 [ 530.462746][T13619] tipc_recvmsg+0x79b/0x13a0 [ 530.467366][T13619] ? tipc_send_packet+0xa0/0xa0 [ 530.472226][T13619] ? security_socket_recvmsg+0x87/0xb0 [ 530.477696][T13619] ? tipc_send_packet+0xa0/0xa0 [ 530.482545][T13619] ____sys_recvmsg+0x291/0x580 [ 530.487408][T13619] ? __sys_recvmsg_sock+0x50/0x50 [ 530.492433][T13619] ? memset+0x35/0x40 [ 530.496418][T13619] ? import_iovec+0x7c/0xb0 [ 530.500924][T13619] ___sys_recvmsg+0x1af/0x4f0 [ 530.505610][T13619] ? __sys_recvmsg+0x250/0x250 [ 530.510380][T13619] ? vfs_write+0xc17/0xf70 [ 530.514802][T13619] ? __fdget+0x1a1/0x230 [ 530.519069][T13619] __x64_sys_recvmsg+0x1df/0x2a0 [ 530.524010][T13619] ? ___sys_recvmsg+0x4f0/0x4f0 [ 530.528861][T13619] ? ksys_write+0x1eb/0x240 [ 530.533368][T13619] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 530.539449][T13619] x64_sys_call+0x705/0x9a0 [ 530.544038][T13619] do_syscall_64+0x4c/0xa0 [ 530.548455][T13619] ? clear_bhb_loop+0x50/0xa0 [ 530.553132][T13619] ? clear_bhb_loop+0x50/0xa0 [ 530.557813][T13619] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 530.563709][T13619] RIP: 0033:0x7fdd63708be9 [ 530.568124][T13619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 530.587736][T13619] RSP: 002b:00007fdd62171038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 530.596160][T13619] RAX: ffffffffffffffda RBX: 00007fdd6392ffa0 RCX: 00007fdd63708be9 [ 530.604134][T13619] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000006 [ 530.612105][T13619] RBP: 00007fdd62171090 R08: 0000000000000000 R09: 0000000000000000 [ 530.620080][T13619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 530.628059][T13619] R13: 00007fdd63930038 R14: 00007fdd6392ffa0 R15: 00007ffdfd1ed148 [ 530.636043][T13619] [ 531.973399][T13689] FAULT_INJECTION: forcing a failure. [ 531.973399][T13689] name failslab, interval 1, probability 0, space 0, times 0 [ 531.988468][T13689] CPU: 1 PID: 13689 Comm: syz.0.4979 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 531.998762][T13689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 532.009534][T13689] Call Trace: [ 532.012834][T13689] [ 532.015784][T13689] __dump_stack+0x21/0x30 [ 532.020141][T13689] dump_stack_lvl+0xee/0x150 [ 532.024762][T13689] ? show_regs_print_info+0x20/0x20 [ 532.029991][T13689] ? node_free_rcu+0x30/0x30 [ 532.034607][T13689] dump_stack+0x15/0x20 [ 532.038790][T13689] should_fail+0x3c1/0x510 [ 532.043239][T13689] __should_failslab+0xa4/0xe0 [ 532.048041][T13689] should_failslab+0x9/0x20 [ 532.052573][T13689] slab_pre_alloc_hook+0x3b/0xe0 [ 532.057541][T13689] ? __alloc_skb+0xe0/0x740 [ 532.062069][T13689] kmem_cache_alloc+0x44/0x260 [ 532.066858][T13689] __alloc_skb+0xe0/0x740 [ 532.071210][T13689] __ipv6_ifa_notify+0x1e8/0xdb0 [ 532.076176][T13689] ? inet6_fill_ifla6_attrs+0x25c0/0x25c0 [ 532.081926][T13689] ? detach_if_pending+0x18d/0x300 [ 532.087069][T13689] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 532.092899][T13689] ? __kasan_check_write+0x14/0x20 [ 532.098034][T13689] ? try_to_grab_pending+0x1a2/0x580 [ 532.103345][T13689] ? rt6_disable_ip+0x676/0x700 [ 532.108234][T13689] ? mod_delayed_work_on+0xe0/0xe0 [ 532.113373][T13689] ? __kasan_check_write+0x14/0x20 [ 532.118532][T13689] ? _raw_spin_lock_bh+0x8e/0xe0 [ 532.123501][T13689] ? _raw_spin_lock_irq+0xe0/0xe0 [ 532.128636][T13689] ? __kasan_check_write+0x14/0x20 [ 532.133780][T13689] addrconf_ifdown+0xd5c/0x1880 [ 532.138657][T13689] ? addrconf_cleanup+0x1c0/0x1c0 [ 532.143708][T13689] ? __kasan_check_write+0x14/0x20 [ 532.148851][T13689] ? mutex_unlock+0x89/0x220 [ 532.153467][T13689] ? __mutex_lock_slowpath+0x10/0x10 [ 532.158784][T13689] ? nf_nat_masq_schedule+0x4c0/0x4c0 [ 532.164198][T13689] ? masq_device_event+0xd0/0xd0 [ 532.169160][T13689] addrconf_notify+0x3bd/0xde0 [ 532.173952][T13689] raw_notifier_call_chain+0x90/0x100 [ 532.179349][T13689] dev_close_many+0x32d/0x4d0 [ 532.184062][T13689] ? debug_smp_processor_id+0x17/0x20 [ 532.189463][T13689] ? __dev_open+0x4c0/0x4c0 [ 532.193990][T13689] ? _raw_spin_lock+0x8e/0xe0 [ 532.198691][T13689] ? __kasan_check_read+0x11/0x20 [ 532.203761][T13689] unregister_netdevice_many+0x44c/0x1990 [ 532.209511][T13689] ? __mod_timer+0x7ae/0xb30 [ 532.214125][T13689] ? alloc_netdev_mqs+0xc90/0xc90 [ 532.219171][T13689] ? add_timer+0x68/0x80 [ 532.223481][T13689] ? __queue_delayed_work+0x173/0x200 [ 532.228876][T13689] ? queue_delayed_work_on+0x101/0x150 [ 532.234358][T13689] ? __kasan_check_read+0x11/0x20 [ 532.239401][T13689] unregister_netdevice_queue+0x31c/0x360 [ 532.245152][T13689] ? __kasan_check_read+0x11/0x20 [ 532.250196][T13689] ? list_netdevice+0x4c0/0x4c0 [ 532.255076][T13689] ? linkwatch_fire_event+0x307/0x380 [ 532.260477][T13689] __tun_detach+0xca6/0x1450 [ 532.265097][T13689] tun_chr_close+0x92/0x140 [ 532.269625][T13689] ? tun_chr_open+0x540/0x540 [ 532.274319][T13689] __fput+0x20b/0x8b0 [ 532.278324][T13689] ____fput+0x15/0x20 [ 532.282321][T13689] task_work_run+0x127/0x190 [ 532.286931][T13689] exit_to_user_mode_loop+0xd0/0xe0 [ 532.292150][T13689] exit_to_user_mode_prepare+0x5a/0xa0 [ 532.297903][T13689] syscall_exit_to_user_mode+0x1a/0x30 [ 532.303394][T13689] do_syscall_64+0x58/0xa0 [ 532.307847][T13689] ? clear_bhb_loop+0x50/0xa0 [ 532.312662][T13689] ? clear_bhb_loop+0x50/0xa0 [ 532.317378][T13689] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 532.323387][T13689] RIP: 0033:0x7f3bbed17be9 [ 532.327842][T13689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 532.347522][T13689] RSP: 002b:00007f3bbd75f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 532.356159][T13689] RAX: 0000000000000000 RBX: 00007f3bbef3f090 RCX: 00007f3bbed17be9 [ 532.364151][T13689] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 532.372141][T13689] RBP: 00007f3bbd75f090 R08: 0000000000000000 R09: 0000000000000000 [ 532.380117][T13689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 532.388086][T13689] R13: 00007f3bbef3f128 R14: 00007f3bbef3f090 R15: 00007ffe4bc22c08 [ 532.396234][T13689] [ 532.921297][T13723] FAULT_INJECTION: forcing a failure. [ 532.921297][T13723] name failslab, interval 1, probability 0, space 0, times 0 [ 533.045726][T13723] CPU: 0 PID: 13723 Comm: syz.0.4994 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 533.056219][T13723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 533.066306][T13723] Call Trace: [ 533.069604][T13723] [ 533.072555][T13723] __dump_stack+0x21/0x30 [ 533.076912][T13723] dump_stack_lvl+0xee/0x150 [ 533.081536][T13723] ? show_regs_print_info+0x20/0x20 [ 533.086767][T13723] ? avc_has_perm_noaudit+0x2f4/0x460 [ 533.092169][T13723] dump_stack+0x15/0x20 [ 533.096355][T13723] should_fail+0x3c1/0x510 [ 533.100813][T13723] __should_failslab+0xa4/0xe0 [ 533.105605][T13723] should_failslab+0x9/0x20 [ 533.110152][T13723] slab_pre_alloc_hook+0x3b/0xe0 [ 533.115124][T13723] ? __alloc_skb+0xe0/0x740 [ 533.119669][T13723] kmem_cache_alloc+0x44/0x260 [ 533.124465][T13723] __alloc_skb+0xe0/0x740 [ 533.128825][T13723] alloc_skb_with_frags+0xa8/0x620 [ 533.133987][T13723] sock_alloc_send_pskb+0x853/0x980 [ 533.139219][T13723] ? is_bpf_text_address+0x177/0x190 [ 533.144626][T13723] ? __kernel_text_address+0xa0/0x100 [ 533.150031][T13723] ? sock_kzfree_s+0x60/0x60 [ 533.154671][T13723] ? stack_trace_save+0x98/0xe0 [ 533.159548][T13723] tun_get_user+0x4e6/0x33c0 [ 533.164169][T13723] ? __kasan_poison_slab+0x70/0x70 [ 533.169400][T13723] ? kmem_cache_free+0x100/0x320 [ 533.174366][T13723] ? __x64_sys_openat+0x136/0x160 [ 533.179426][T13723] ? x64_sys_call+0x219/0x9a0 [ 533.184135][T13723] ? tun_do_read+0x1c40/0x1c40 [ 533.188925][T13723] ? kstrtouint_from_user+0x1a0/0x200 [ 533.194319][T13723] ? kstrtol_from_user+0x260/0x260 [ 533.199467][T13723] ? putname+0x111/0x160 [ 533.203742][T13723] ? avc_policy_seqno+0x1b/0x70 [ 533.208598][T13723] ? selinux_file_permission+0x2aa/0x510 [ 533.214242][T13723] tun_chr_write_iter+0x1eb/0x2e0 [ 533.219273][T13723] vfs_write+0x802/0xf70 [ 533.223544][T13723] ? file_end_write+0x1b0/0x1b0 [ 533.228407][T13723] ? __fget_files+0x2c4/0x320 [ 533.233088][T13723] ? __fdget_pos+0x1f7/0x380 [ 533.237681][T13723] ? ksys_write+0x71/0x240 [ 533.242100][T13723] ksys_write+0x140/0x240 [ 533.246608][T13723] ? __ia32_sys_read+0x90/0x90 [ 533.251376][T13723] ? debug_smp_processor_id+0x17/0x20 [ 533.256768][T13723] __x64_sys_write+0x7b/0x90 [ 533.261368][T13723] x64_sys_call+0x8ef/0x9a0 [ 533.266038][T13723] do_syscall_64+0x4c/0xa0 [ 533.270462][T13723] ? clear_bhb_loop+0x50/0xa0 [ 533.275151][T13723] ? clear_bhb_loop+0x50/0xa0 [ 533.279961][T13723] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 533.286118][T13723] RIP: 0033:0x7f3bbed17be9 [ 533.290533][T13723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 533.310232][T13723] RSP: 002b:00007f3bbd780038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 533.318652][T13723] RAX: ffffffffffffffda RBX: 00007f3bbef3efa0 RCX: 00007f3bbed17be9 [ 533.326627][T13723] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 533.334630][T13723] RBP: 00007f3bbd780090 R08: 0000000000000000 R09: 0000000000000000 [ 533.342765][T13723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 533.350751][T13723] R13: 00007f3bbef3f038 R14: 00007f3bbef3efa0 R15: 00007ffe4bc22c08 [ 533.358737][T13723] [ 533.634321][T13755] device wg2 left promiscuous mode [ 533.687741][T13755] device wg2 entered promiscuous mode [ 533.752633][T13759] device wg2 left promiscuous mode [ 533.898749][T13759] device wg2 entered promiscuous mode [ 534.916128][ T30] audit: type=1400 audit(1754685493.397:149): avc: denied { create } for pid=13808 comm="syz.1.5029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 535.435682][T13846] device wg2 left promiscuous mode [ 535.503574][T13846] device wg2 entered promiscuous mode [ 536.100666][T13868] device wg2 left promiscuous mode [ 537.371038][T13922] device wg2 entered promiscuous mode [ 539.348523][T13977] device wg2 left promiscuous mode [ 539.528106][T13979] device wg2 entered promiscuous mode [ 539.896813][T13994] device wg2 entered promiscuous mode [ 540.270457][T14015] device wg2 left promiscuous mode [ 540.397791][T14017] device wg2 entered promiscuous mode [ 541.363512][T14058] device wg2 left promiscuous mode [ 541.645149][T14058] device wg2 entered promiscuous mode [ 541.950759][T14073] device wg2 left promiscuous mode [ 542.132387][T14075] device wg2 entered promiscuous mode [ 542.746628][T14101] device wg2 left promiscuous mode [ 543.135797][T14103] device wg2 entered promiscuous mode [ 543.480931][T14127] device veth0_vlan left promiscuous mode [ 543.516636][T14127] device veth0_vlan entered promiscuous mode [ 543.543685][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.553241][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 543.561316][ T411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 543.611560][T14133] device wg2 left promiscuous mode [ 543.648001][T14138] device wg2 entered promiscuous mode [ 546.905361][ T30] audit: type=1400 audit(1754685505.377:150): avc: denied { write } for pid=14258 comm="syz.1.5204" name="cgroup.subtree_control" dev="cgroup2" ino=256 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 547.016788][ T30] audit: type=1400 audit(1754685505.467:151): avc: denied { open } for pid=14258 comm="syz.1.5204" path="" dev="cgroup2" ino=256 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 547.920520][T14296] device sit0 entered promiscuous mode [ 552.096565][T14341] device wg2 left promiscuous mode [ 552.172862][T14341] device wg2 entered promiscuous mode [ 554.567397][T14371] device wg2 left promiscuous mode [ 554.663988][T14372] device syzkaller0 entered promiscuous mode [ 554.796818][T14371] device wg2 entered promiscuous mode [ 554.823058][T14374] device wg2 left promiscuous mode [ 555.226820][T14397] device wg2 left promiscuous mode [ 555.313228][T14397] device wg2 entered promiscuous mode [ 555.440902][T14410] device wg2 left promiscuous mode [ 555.548944][T14410] device wg2 entered promiscuous mode [ 555.702543][T14418] device wg2 left promiscuous mode [ 556.114835][T14419] device syzkaller0 entered promiscuous mode [ 556.186881][T14418] device wg2 entered promiscuous mode [ 558.940145][T14443] device wg2 entered promiscuous mode [ 559.776754][T14484] device wg2 left promiscuous mode [ 559.935863][T14484] device wg2 entered promiscuous mode [ 560.885739][T14522] device wg2 left promiscuous mode [ 560.969402][T14522] device wg2 entered promiscuous mode [ 562.166125][T14565] device pim6reg1 entered promiscuous mode [ 562.213980][T14568] device wg2 left promiscuous mode [ 562.387533][T14568] device wg2 entered promiscuous mode [ 563.110050][T14607] device wg2 left promiscuous mode [ 563.193583][T14607] device wg2 entered promiscuous mode [ 567.086200][T14741] FAULT_INJECTION: forcing a failure. [ 567.086200][T14741] name failslab, interval 1, probability 0, space 0, times 0 [ 567.145503][T14741] CPU: 1 PID: 14741 Comm: syz.4.5388 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 567.155813][T14741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 567.165901][T14741] Call Trace: [ 567.169204][T14741] [ 567.172194][T14741] __dump_stack+0x21/0x30 [ 567.176563][T14741] dump_stack_lvl+0xee/0x150 [ 567.181182][T14741] ? show_regs_print_info+0x20/0x20 [ 567.186416][T14741] dump_stack+0x15/0x20 [ 567.190598][T14741] should_fail+0x3c1/0x510 [ 567.195040][T14741] __should_failslab+0xa4/0xe0 [ 567.199831][T14741] should_failslab+0x9/0x20 [ 567.204357][T14741] slab_pre_alloc_hook+0x3b/0xe0 [ 567.209429][T14741] kmem_cache_alloc_trace+0x48/0x270 [ 567.214848][T14741] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 567.220594][T14741] selinux_sk_alloc_security+0x7e/0x1a0 [ 567.226190][T14741] security_sk_alloc+0x72/0xa0 [ 567.230974][T14741] sk_prot_alloc+0x108/0x320 [ 567.235663][T14741] sk_alloc+0x38/0x430 [ 567.239749][T14741] tipc_sk_create+0xe6/0x1df0 [ 567.244450][T14741] ? __kasan_check_write+0x14/0x20 [ 567.249665][T14741] ? _raw_spin_lock+0x8e/0xe0 [ 567.254461][T14741] ? _raw_spin_trylock_bh+0x130/0x130 [ 567.259847][T14741] ? security_inode_alloc+0xc0/0x110 [ 567.265150][T14741] ? inode_init_always+0x729/0x990 [ 567.270281][T14741] __sock_create+0x38d/0x7a0 [ 567.274892][T14741] __sys_socketpair+0x218/0x590 [ 567.279757][T14741] __x64_sys_socketpair+0x9b/0xb0 [ 567.284798][T14741] x64_sys_call+0x36/0x9a0 [ 567.289308][T14741] do_syscall_64+0x4c/0xa0 [ 567.293758][T14741] ? clear_bhb_loop+0x50/0xa0 [ 567.298453][T14741] ? clear_bhb_loop+0x50/0xa0 [ 567.303156][T14741] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 567.309067][T14741] RIP: 0033:0x7f8119069be9 [ 567.313496][T14741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 567.333219][T14741] RSP: 002b:00007f8117ad2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 567.341828][T14741] RAX: ffffffffffffffda RBX: 00007f8119290fa0 RCX: 00007f8119069be9 [ 567.349813][T14741] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 567.357809][T14741] RBP: 00007f8117ad2090 R08: 0000000000000000 R09: 0000000000000000 [ 567.365808][T14741] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 567.373876][T14741] R13: 00007f8119291038 R14: 00007f8119290fa0 R15: 00007ffd790d1ff8 [ 567.381870][T14741] [ 569.833098][T14769] device wg2 left promiscuous mode [ 569.847808][T14769] device wg2 entered promiscuous mode [ 570.196014][T14785] device wg2 left promiscuous mode [ 570.261075][T14789] device wg2 entered promiscuous mode [ 571.243454][T14826] device wg2 left promiscuous mode [ 571.343016][T14826] device wg2 entered promiscuous mode [ 573.971164][T14883] device wg2 left promiscuous mode [ 574.039975][T14883] device wg2 entered promiscuous mode [ 577.729464][ T30] audit: type=1400 audit(1754685536.207:152): avc: denied { create } for pid=14985 comm="syz.3.5477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 578.505996][T15009] device wg2 left promiscuous mode [ 578.523899][T15009] device wg2 entered promiscuous mode [ 578.642619][T15014] device wg2 left promiscuous mode [ 578.678452][T15014] device wg2 entered promiscuous mode [ 579.404663][T15041] syz.1.5496[15041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 579.404741][T15041] syz.1.5496[15041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 579.418525][T15041] syzkaller0: refused to change device tx_queue_len [ 580.831971][ T30] audit: type=1400 audit(1754685539.307:153): avc: denied { create } for pid=15081 comm="syz.4.5510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 581.162532][T15092] syz.4.5515[15092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.162612][T15092] syz.4.5515[15092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 582.756100][T15134] device wg2 left promiscuous mode [ 582.782326][T15134] device wg2 entered promiscuous mode [ 583.079378][T15142] device pim6reg1 entered promiscuous mode [ 584.115813][T15182] device veth0_vlan left promiscuous mode [ 584.136155][T15182] device veth0_vlan entered promiscuous mode [ 584.609198][T15198] device sit0 entered promiscuous mode [ 585.407328][T15222] FAULT_INJECTION: forcing a failure. [ 585.407328][T15222] name failslab, interval 1, probability 0, space 0, times 0 [ 585.420239][T15222] CPU: 1 PID: 15222 Comm: syz.0.5565 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 585.430503][T15222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 585.440588][T15222] Call Trace: [ 585.443914][T15222] [ 585.446865][T15222] __dump_stack+0x21/0x30 [ 585.451230][T15222] dump_stack_lvl+0xee/0x150 [ 585.455842][T15222] ? show_regs_print_info+0x20/0x20 [ 585.461141][T15222] ? stack_trace_save+0x98/0xe0 [ 585.466005][T15222] dump_stack+0x15/0x20 [ 585.470165][T15222] should_fail+0x3c1/0x510 [ 585.474587][T15222] __should_failslab+0xa4/0xe0 [ 585.479372][T15222] should_failslab+0x9/0x20 [ 585.483975][T15222] slab_pre_alloc_hook+0x3b/0xe0 [ 585.488923][T15222] ? __alloc_skb+0xe0/0x740 [ 585.493428][T15222] kmem_cache_alloc+0x44/0x260 [ 585.498205][T15222] ? __netif_receive_skb+0xc8/0x280 [ 585.503508][T15222] __alloc_skb+0xe0/0x740 [ 585.507874][T15222] ndisc_send_ns+0x343/0xaf0 [ 585.512493][T15222] ? ndisc_send_skb+0xc70/0xc70 [ 585.517478][T15222] ? ipv6_chk_addr_and_flags+0x3e/0x60 [ 585.522976][T15222] ndisc_solicit+0x30a/0x440 [ 585.527577][T15222] ? ndisc_cleanup+0x40/0x40 [ 585.532197][T15222] ? skb_clone+0x202/0x360 [ 585.536635][T15222] ? ndisc_cleanup+0x40/0x40 [ 585.541225][T15222] __neigh_event_send+0xcc3/0x11c0 [ 585.546337][T15222] ? __local_bh_enable_ip+0x58/0x80 [ 585.551552][T15222] neigh_resolve_output+0x1e1/0x770 [ 585.556755][T15222] ? __local_bh_enable_ip+0x58/0x80 [ 585.561957][T15222] ip6_finish_output2+0x10b7/0x1760 [ 585.567253][T15222] ? __ip6_finish_output+0x7d0/0x7d0 [ 585.572550][T15222] ? __local_bh_enable_ip+0x58/0x80 [ 585.577765][T15222] ? local_bh_enable+0x1f/0x30 [ 585.582528][T15222] __ip6_finish_output+0x61e/0x7d0 [ 585.587658][T15222] ip6_finish_output+0x31/0x240 [ 585.592511][T15222] ? ip6_output+0x384/0x3b0 [ 585.597140][T15222] ip6_output+0x1d1/0x3b0 [ 585.601471][T15222] ? ac6_seq_show+0xf0/0xf0 [ 585.605975][T15222] ? ip6_output+0x3b0/0x3b0 [ 585.610481][T15222] ip6_local_out+0x21a/0x3d0 [ 585.615074][T15222] ? dst_output+0x80/0x80 [ 585.619405][T15222] ? __ip6_local_out+0x350/0x350 [ 585.624348][T15222] ? __kasan_check_read+0x11/0x20 [ 585.629491][T15222] ? ip6_setup_cork+0xd10/0x1290 [ 585.634435][T15222] ip6_push_pending_frames+0x17d/0x2d0 [ 585.639895][T15222] icmpv6_push_pending_frames+0x29f/0x440 [ 585.645673][T15222] icmp6_send+0xf6d/0x14c0 [ 585.650095][T15222] ? icmpv6_push_pending_frames+0x440/0x440 [ 585.655996][T15222] ? numa_migrate_prep+0xd0/0xd0 [ 585.660948][T15222] ? __skb_flow_dissect+0x520c/0x5930 [ 585.666320][T15222] icmpv6_param_prob+0x2f/0x40 [ 585.671085][T15222] ip6_parse_tlv+0x1a4c/0x1ba0 [ 585.676006][T15222] ipv6_parse_hopopts+0x2a3/0x580 [ 585.681056][T15222] ip6_rcv_core+0xca7/0x1390 [ 585.685666][T15222] ipv6_rcv+0xca/0x210 [ 585.689764][T15222] ? irqentry_exit+0x37/0x40 [ 585.694360][T15222] ? exc_page_fault+0x5e/0xb0 [ 585.699042][T15222] ? ip6_rcv_finish+0x360/0x360 [ 585.703903][T15222] ? asm_exc_page_fault+0x27/0x30 [ 585.708932][T15222] ? _copy_from_iter+0x201/0x1050 [ 585.714075][T15222] ? ip6_rcv_finish+0x360/0x360 [ 585.718927][T15222] __netif_receive_skb+0xc8/0x280 [ 585.723962][T15222] ? _copy_from_iter+0x4ae/0x1050 [ 585.729086][T15222] ? __kasan_check_write+0x14/0x20 [ 585.734203][T15222] netif_receive_skb+0x98/0x3d0 [ 585.739149][T15222] ? netif_receive_skb_core+0x100/0x100 [ 585.744697][T15222] ? __kernel_text_address+0xa0/0x100 [ 585.750070][T15222] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 585.755621][T15222] tun_rx_batched+0x5e8/0x710 [ 585.760306][T15222] ? local_bh_enable+0x30/0x30 [ 585.765077][T15222] tun_get_user+0x279c/0x33c0 [ 585.769755][T15222] ? __kasan_poison_slab+0x70/0x70 [ 585.774882][T15222] ? kmem_cache_free+0x100/0x320 [ 585.779826][T15222] ? __x64_sys_openat+0x136/0x160 [ 585.784852][T15222] ? x64_sys_call+0x219/0x9a0 [ 585.789534][T15222] ? tun_do_read+0x1c40/0x1c40 [ 585.794300][T15222] ? kstrtouint_from_user+0x1a0/0x200 [ 585.799686][T15222] ? kstrtol_from_user+0x260/0x260 [ 585.804827][T15222] ? avc_policy_seqno+0x1b/0x70 [ 585.809699][T15222] ? selinux_file_permission+0x2aa/0x510 [ 585.815470][T15222] tun_chr_write_iter+0x1eb/0x2e0 [ 585.820506][T15222] vfs_write+0x802/0xf70 [ 585.824758][T15222] ? file_end_write+0x1b0/0x1b0 [ 585.829615][T15222] ? __fget_files+0x2c4/0x320 [ 585.834305][T15222] ? __fdget_pos+0x1f7/0x380 [ 585.838990][T15222] ? ksys_write+0x71/0x240 [ 585.843417][T15222] ksys_write+0x140/0x240 [ 585.847751][T15222] ? __ia32_sys_read+0x90/0x90 [ 585.852519][T15222] ? debug_smp_processor_id+0x17/0x20 [ 585.857902][T15222] __x64_sys_write+0x7b/0x90 [ 585.862494][T15222] x64_sys_call+0x8ef/0x9a0 [ 585.867039][T15222] do_syscall_64+0x4c/0xa0 [ 585.871476][T15222] ? clear_bhb_loop+0x50/0xa0 [ 585.876158][T15222] ? clear_bhb_loop+0x50/0xa0 [ 585.880840][T15222] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 585.886738][T15222] RIP: 0033:0x7f3bbed17be9 [ 585.891160][T15222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 585.910764][T15222] RSP: 002b:00007f3bbd780038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 585.919183][T15222] RAX: ffffffffffffffda RBX: 00007f3bbef3efa0 RCX: 00007f3bbed17be9 [ 585.927154][T15222] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 585.935143][T15222] RBP: 00007f3bbd780090 R08: 0000000000000000 R09: 0000000000000000 [ 585.943120][T15222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 585.951112][T15222] R13: 00007f3bbef3f038 R14: 00007f3bbef3efa0 R15: 00007ffe4bc22c08 [ 585.959108][T15222] [ 586.411049][T15251] bond_slave_1: mtu less than device minimum [ 587.176996][T15280] FAULT_INJECTION: forcing a failure. [ 587.176996][T15280] name failslab, interval 1, probability 0, space 0, times 0 [ 587.189909][T15280] CPU: 1 PID: 15280 Comm: syz.1.5585 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 587.200200][T15280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 587.210279][T15280] Call Trace: [ 587.213579][T15280] [ 587.216525][T15280] __dump_stack+0x21/0x30 [ 587.220970][T15280] dump_stack_lvl+0xee/0x150 [ 587.225596][T15280] ? show_regs_print_info+0x20/0x20 [ 587.230829][T15280] dump_stack+0x15/0x20 [ 587.235012][T15280] should_fail+0x3c1/0x510 [ 587.239455][T15280] __should_failslab+0xa4/0xe0 [ 587.244257][T15280] should_failslab+0x9/0x20 [ 587.248781][T15280] slab_pre_alloc_hook+0x3b/0xe0 [ 587.253750][T15280] kmem_cache_alloc_trace+0x48/0x270 [ 587.259058][T15280] ? sk_psock_skb_ingress_self+0x5f/0x330 [ 587.264809][T15280] ? migrate_disable+0x180/0x180 [ 587.269766][T15280] sk_psock_skb_ingress_self+0x5f/0x330 [ 587.275337][T15280] ? migrate_disable+0xd6/0x180 [ 587.280208][T15280] sk_psock_verdict_recv+0x636/0x800 [ 587.285514][T15280] unix_read_sock+0x10a/0x2c0 [ 587.290214][T15280] ? sk_psock_skb_redirect+0x440/0x440 [ 587.295695][T15280] ? unix_stream_splice_actor+0x120/0x120 [ 587.301434][T15280] ? copy_page_from_iter+0x2e1/0x680 [ 587.306743][T15280] ? copy_user_enhanced_fast_string+0xe/0x40 [ 587.312771][T15280] ? sk_psock_skb_redirect+0x440/0x440 [ 587.318259][T15280] ? unix_set_peek_off+0xa0/0xa0 [ 587.323300][T15280] unix_stream_read_sock+0x61/0x90 [ 587.328432][T15280] sk_psock_verdict_data_ready+0x115/0x170 [ 587.334261][T15280] ? sk_psock_start_verdict+0xc0/0xc0 [ 587.339741][T15280] ? _raw_spin_lock+0x8e/0xe0 [ 587.344444][T15280] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 587.350270][T15280] ? skb_queue_tail+0xcb/0xf0 [ 587.354971][T15280] unix_stream_sendmsg+0x7c4/0xc80 [ 587.360115][T15280] ? unix_show_fdinfo+0xa0/0xa0 [ 587.365013][T15280] ? security_socket_sendmsg+0x82/0xa0 [ 587.370512][T15280] ? unix_show_fdinfo+0xa0/0xa0 [ 587.375379][T15280] ____sys_sendmsg+0x5a2/0x8c0 [ 587.380163][T15280] ? __sys_sendmsg_sock+0x40/0x40 [ 587.385210][T15280] ? import_iovec+0x7c/0xb0 [ 587.389734][T15280] ___sys_sendmsg+0x1f0/0x260 [ 587.394438][T15280] ? __sys_sendmsg+0x250/0x250 [ 587.399229][T15280] ? __fdget+0x1a1/0x230 [ 587.403611][T15280] __x64_sys_sendmsg+0x1e2/0x2a0 [ 587.408570][T15280] ? ___sys_sendmsg+0x260/0x260 [ 587.413718][T15280] ? ksys_write+0x1eb/0x240 [ 587.418263][T15280] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 587.424362][T15280] x64_sys_call+0x4b/0x9a0 [ 587.428805][T15280] do_syscall_64+0x4c/0xa0 [ 587.433362][T15280] ? clear_bhb_loop+0x50/0xa0 [ 587.438054][T15280] ? clear_bhb_loop+0x50/0xa0 [ 587.442752][T15280] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 587.448688][T15280] RIP: 0033:0x7fdd63708be9 [ 587.453117][T15280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 587.472914][T15280] RSP: 002b:00007fdd62171038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 587.481349][T15280] RAX: ffffffffffffffda RBX: 00007fdd6392ffa0 RCX: 00007fdd63708be9 [ 587.489338][T15280] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000008 [ 587.497496][T15280] RBP: 00007fdd62171090 R08: 0000000000000000 R09: 0000000000000000 [ 587.505486][T15280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.513474][T15280] R13: 00007fdd63930038 R14: 00007fdd6392ffa0 R15: 00007ffdfd1ed148 [ 587.521472][T15280] [ 587.526033][ T6154] ------------[ cut here ]------------ [ 587.531530][ T6154] kernel BUG at net/core/skbuff.c:1727! [ 587.546083][ T6154] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 587.552224][ T6154] CPU: 1 PID: 6154 Comm: kworker/1:38 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 587.562613][ T6154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 587.572798][ T6154] Workqueue: events sk_psock_backlog [ 587.578129][ T6154] RIP: 0010:pskb_expand_head+0x11a5/0x11d0 [ 587.584024][ T6154] Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c de f3 ff ff 4c 89 e7 e8 4c 06 f4 fd e9 d1 f3 ff ff e8 82 8b b5 fd 0f 0b e8 7b 8b b5 fd <0f> 0b 48 8b 4d d0 80 e1 07 80 c1 03 38 c1 0f 8c b2 fa ff ff 48 8b [ 587.603658][ T6154] RSP: 0018:ffffc90005e27a08 EFLAGS: 00010293 [ 587.609766][ T6154] RAX: ffffffff83b32455 RBX: dffffc0000000000 RCX: ffff88811c808000 [ 587.617776][ T6154] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 587.625780][ T6154] RBP: ffffc90005e27aa8 R08: dffffc0000000000 R09: ffffed1022db2d5e [ 587.633786][ T6154] R10: ffffed1022db2d5e R11: 1ffff11022db2d5d R12: 0000000000000e80 [ 587.641815][ T6154] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000008080 [ 587.649848][ T6154] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 587.658812][ T6154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 587.665433][ T6154] CR2: 0000200000295000 CR3: 00000001246d0000 CR4: 00000000003506a0 [ 587.673464][ T6154] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 587.681597][ T6154] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 587.689599][ T6154] Call Trace: [ 587.692904][ T6154] [ 587.695967][ T6154] __pskb_pull_tail+0xb1/0x1480 [ 587.700863][ T6154] sk_psock_skb_ingress_enqueue+0x67/0x410 [ 587.706797][ T6154] ? kmem_cache_alloc_trace+0x119/0x270 [ 587.712382][ T6154] ? sk_psock_backlog+0x876/0x1230 [ 587.717538][ T6154] sk_psock_backlog+0xa72/0x1230 [ 587.722529][ T6154] ? sk_psock_init+0x6f0/0x6f0 [ 587.727341][ T6154] ? __kasan_check_write+0x14/0x20 [ 587.732490][ T6154] ? pwq_dec_nr_in_flight+0x18c/0x3c0 [ 587.737908][ T6154] process_one_work+0x6be/0xba0 [ 587.742798][ T6154] worker_thread+0xa59/0x1200 [ 587.747517][ T6154] ? __kthread_parkme+0xac/0x200 [ 587.752490][ T6154] kthread+0x411/0x500 [ 587.756597][ T6154] ? worker_clr_flags+0x190/0x190 [ 587.761661][ T6154] ? kthread_blkcg+0xd0/0xd0 [ 587.766282][ T6154] ret_from_fork+0x1f/0x30 [ 587.770738][ T6154] [ 587.773787][ T6154] Modules linked in: [ 587.812887][ T6154] ---[ end trace 26bdef7828e79a25 ]--- [ 587.822424][ T6154] RIP: 0010:pskb_expand_head+0x11a5/0x11d0 [ 587.828605][ T6154] Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c de f3 ff ff 4c 89 e7 e8 4c 06 f4 fd e9 d1 f3 ff ff e8 82 8b b5 fd 0f 0b e8 7b 8b b5 fd <0f> 0b 48 8b 4d d0 80 e1 07 80 c1 03 38 c1 0f 8c b2 fa ff ff 48 8b [ 587.854814][ T6154] RSP: 0018:ffffc90005e27a08 EFLAGS: 00010293 [ 587.860975][ T6154] RAX: ffffffff83b32455 RBX: dffffc0000000000 RCX: ffff88811c808000 [ 587.869363][ T6154] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 587.879199][ T6154] RBP: ffffc90005e27aa8 R08: dffffc0000000000 R09: ffffed1022db2d5e [ 587.887267][ T6154] R10: ffffed1022db2d5e R11: 1ffff11022db2d5d R12: 0000000000000e80 [ 587.895262][ T6154] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000008080 [ 587.903425][ T6154] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 587.912450][ T6154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 587.919111][ T6154] CR2: 00007f811925f198 CR3: 000000010d830000 CR4: 00000000003506a0 [ 587.927171][ T6154] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 587.935242][ T6154] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 587.944373][ T6154] Kernel panic - not syncing: Fatal exception [ 587.950778][ T6154] Kernel Offset: disabled [ 587.955125][ T6154] Rebooting in 86400 seconds..