last executing test programs: 3.327261129s ago: executing program 2 (id=8556): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r4 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r4, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000000)='.[!-\x00'}, 0x30) (async) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/1810], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x35, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000200)=r10, 0x4) (async) sendmsg$inet(r9, &(0x7f0000002640)={0x0, 0x0, 0x0}, 0x404c010) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x4) 3.228416111s ago: executing program 2 (id=8559): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x34, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000e00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYRESHEX=r3], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af0ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x3, 0x100005, 0xb, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000380), &(0x7f0000000380), 0x2, r10}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000240)='tlb_flush\x00', r5}, 0x10) syz_clone(0x8804000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x66}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 2.948127365s ago: executing program 2 (id=8562): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0100000004000000050000000800000000000000", @ANYRES32, @ANYBLOB="00000000000000040000000000360000000000005badbea3acca40ab11546b8711db4496d2f34358612f42668e6528009dcabf6d2a55ce6a2a30a896f4fed57d957647bf296f593f351b9592088577b438bfad3c024ce882eeac93b14c07b5f99edb2b98a7ff7b974e9ccf256e565550177bc5ac6c49a871667c8872f02411412f924f227ef26375452e61f9d999c0d74bb6dee3e07958a30bac7d5afebac1afb3c2eee062924b236715d692", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3d, &(0x7f0000002600), 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="18b4f83d76a0000000000000000071122100000000009500"/38], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000400)={r0, 0x0, 0x2b, 0x0, &(0x7f0000000000)="c467960c88bee51411d0c98ed539e9477566b507ed371c3bc9bcd172cd47dcd60ae9edf28c6fabd74fe2a6", 0x0, 0x2, 0x0, 0xb5, 0x0, &(0x7f00000005c0)="a876f0c1a228ff3f06bcf4f631460f70cea26371c6151f7b4fdcb73d5a625e235519bff5dc5a970caafacab68635182b6a65823084cab5ff5cb92d7e272cccec1ecf4770355a87fcea05d049aee4349e868a15004248c9835cb7c587c473cba95d1a272d6e9d0d79e8e900c564b97a4c2da029e62e78f03d97172f6043a25fafd0703ed3a7d42e5964d211a83fb77e0224839584ffd125db7c7b499381b78f7f2aaeadf8ef6dd72902444ea24c814dd4f42bf2a9a5", 0x0, 0x2, 0x0, 0x3}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f0000000cc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func={0x1, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x61]}}, &(0x7f0000000940)=""/222, 0x3b, 0xde, 0x1, 0x0, 0x0, @void, @value}, 0x28) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r5}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000600)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xe}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x1, 0x7ffb, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x7801, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 2.358084464s ago: executing program 1 (id=8566): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) 2.323290945s ago: executing program 1 (id=8568): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYRESOCT=r0], 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYRES8=r2], 0x0, 0x10001, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f0000000000)=r1}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xfffffffffffffd48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) sendmsg$inet(r5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r7, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r4, @ANYBLOB="00000000c0bd755b94d308b306660001000000407d00"/31, @ANYBLOB="9e24bd48815579d69dc5164c67779c", @ANYRES32, @ANYRESHEX=r3], 0x48) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001540)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000e12020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000006fd6850000002d000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sys_enter\x00', r8}, 0x10) getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="620ac4ff000000006910160000000000950000000000000039a09a522b2f5652b47adf5bd030cff18901ba78d3fa33aeba869afbf2dd6e4d68d78af4244af3f685808969feeeac0097e2466ad65a8bd4129ad48eca361987da64ae448104513457f857c36bc340e6f2b0b1f6e865fe1dac5be9452fef2db4a7b3735ae953984405420c476ac36ffdb40e411e4633fc3ffc"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x40, 0x0, 0x2, 0x0, 0x9, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp={0x0, 0x9}, 0x1500, 0xc8, 0xfffffffe, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x18) 2.029483849s ago: executing program 2 (id=8572): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000060000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000086c0000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.428770008s ago: executing program 1 (id=8574): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000181200000000f3ff0f00ccbe00000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2a, &(0x7f0000000100)=r3, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000100), &(0x7f0000000180)=r0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0], 0x0, 0xb9, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x7a, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x7f, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x2}, 0x108008, 0x8, 0xfffffffb, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000e000001000000000400000007010000080700007500fcff0000000095000000d3031a00041f8ea47c2eb2b7639c2ad3a4c89eb40634ab9b5ade7978eb59ff70cd62adbe9c31865cf39dc9e93813d9433f34dad576b1897b3533f883f9e873d9c435ab89afdd4ff0c24c0053f1721e9dc694f461734e10ea76584696317ca540336bc0e60e7d6d44484e01102b1c830d2630c3932755946ba8848b0d93caec1f4d89f99dcd2e9cb4d3646bc48d7ece5cbb87cdd67955cf5c813c05411a276d6afe065ac5849c64aebf30294fc59168bcb9a25164a1826a81cf45e576ef4dd94e292cbbf69d0787fa4b596ce132d7e976b136871cebb77ad2e34ffcf52557e6a0403769815ed13ca7b6c9f2fd7d11461997a57b35715cee9809008af9df0690f5d42d2e0f2d967aa4bc96a7d4b343411ef4d962699ffc5c434cf53339430fe9d668405875e14bea5c4aea70b9de7b9fb36561bdc896a0cc666f0d9b49832984ed9effda637edfb97defbd3219055f5a7ee877c79ec93133f0109e9746acd0cba749390a9b575a129f1838688c21ea8db8"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000007380)=ANY=[@ANYBLOB="850000008b0000007600000000000000270900000000000095000000271100003a97d357d515c8a6d7af50d2244909015794341b9e81fdc7a937159761ecc0da795c5bede8256eee30e76dd29dc439170eb513be75aad42efcfd51c70ad96460173410947694d51aec03d0a48276dcf9e70b2beb39310cb0e9254c81a1140d5945"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) 1.425136378s ago: executing program 0 (id=8584): r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xd2, 0x3, 0x8, 0x5d, 0x0, 0x100000000, 0x9058, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x1}, 0x800, 0x1, 0x7522, 0x4, 0x9, 0x7, 0xe, 0x0, 0x1, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x3) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x6f, 0x6, 0xe, 0x0, 0x6, 0x10034, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x953d, 0x1, @perf_bp, 0x800, 0x5, 0x7fff, 0x6, 0xea, 0x6, 0x6, 0x0, 0x5c10b65, 0x0, 0x800}, 0x0, 0x10, r0, 0x1) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/cgroup\x00') close(r0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000180)=0x3) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x800000, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000240)={0x3, &(0x7f0000000200)=[{0x8, 0x1, 0x6e, 0x5}, {0x0, 0x4, 0xa, 0x4}, {0x9, 0xb, 0x4, 0x15bc}]}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000014c0)={0x18, 0x1a, &(0x7f00000002c0)=@raw=[@alu={0x0, 0x1, 0x0, 0xb, 0x7, 0xfffffffffffffffc, 0x8}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @alu={0x4, 0x0, 0xb, 0x2, 0xb, 0xffffffffffffffe0, 0xfffffffffffffff5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd8000000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xf}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x80}], &(0x7f00000003c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001400)={0xa, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000001440)=[{0x5, 0x2, 0x3, 0x7}, {0x2, 0x3, 0xd, 0x4}, {0x0, 0x3, 0x6, 0x5}, {0x5, 0x5, 0xe, 0x3}, {0x2, 0x5, 0x5, 0x3}, {0x1, 0x2, 0xb, 0x8}], 0x10, 0x1000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000280)='neigh_create\x00', r4, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000015c0)='|)#(\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001600)={0xffffffffffffffff, 0x3, 0x4}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001880)={0x1, 0x58, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001b00)={0xffffffffffffffff, 0x20, &(0x7f0000001ac0)={&(0x7f0000001900)=""/150, 0x96, 0x0, &(0x7f00000019c0)=""/250, 0xfa}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x73, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001c80)={0x1b, 0xa, &(0x7f0000001680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0e3, 0x0, 0x0, 0x0, 0x5}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @map_fd={0x18, 0x4, 0x1, 0x0, r6}]}, &(0x7f0000001700)='syzkaller\x00', 0xffff, 0x8e, &(0x7f0000001740)=""/142, 0x40f00, 0x4, '\x00', r7, @fallback=0x22, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, r8, r4, 0x8, &(0x7f0000001bc0)=[r9], &(0x7f0000001c00)=[{0x2, 0x2, 0x5, 0x7}, {0x0, 0x5, 0x7, 0x7}, {0x3, 0x5, 0xd, 0xc}, {0x5, 0x1, 0xc, 0xa}, {0x3, 0x2, 0xb, 0x6}, {0x2, 0x4, 0x5, 0xc}, {0x3, 0x5, 0xa}, {0x8, 0x4, 0x2, 0xc}], 0x10, 0x7, @void, @value}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000001d40), 0x40000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001d80)={'netdevsim0\x00', 0x4000}) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001dc0)={r10, r9}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001e00)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001e40)={0x8}, 0x8) r11 = gettid() r12 = perf_event_open(&(0x7f0000001e80)={0x1, 0x80, 0x3, 0x4, 0x6, 0x1, 0x0, 0x5, 0x8, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7e9d, 0x0, @perf_config_ext={0x6, 0xfffffffffffffff8}, 0x109069, 0x6bdf, 0x1800000, 0x1, 0x3, 0x200, 0x6, 0x0, 0x4, 0x0, 0x2}, r2, 0xc, r0, 0x7) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000001f00)={'geneve1\x00', 0x400}) perf_event_open(&(0x7f0000001f40)={0x1, 0x80, 0xf9, 0x10, 0x50, 0x2, 0x0, 0x7, 0x8000, 0x1c, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x0, 0x44c}, 0xa70, 0x10001, 0x6, 0x8, 0x40, 0x9, 0x7fff, 0x0, 0x4, 0x0, 0x7f}, r11, 0xf, r12, 0x2) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002200)={&(0x7f0000001fc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11b, 0x11b, 0xc, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x2}, @datasec={0xd, 0x1, 0x0, 0xf, 0x3, [{0x5, 0x6, 0x8}], "5826b2"}, @datasec={0xd, 0x4, 0x0, 0xf, 0x3, [{0x5, 0x6, 0x7}, {0x1, 0x8, 0x9}, {0x4, 0x7, 0xd66}, {0x5, 0x7, 0x2}], "ab3637"}, @decl_tag={0xf, 0x0, 0x0, 0x11, 0x4, 0x9}, @typedef={0xf, 0x0, 0x0, 0x8, 0x5}, @union={0x5, 0x1, 0x0, 0x5, 0x1, 0xe, [{0x6, 0x2}]}, @var={0x7, 0x0, 0x0, 0xe, 0x1}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x3}, {0x4}]}, @datasec={0x7, 0x6, 0x0, 0xf, 0x1, [{0x2, 0x8001, 0x3e}, {0x2, 0x1, 0x9}, {0x3, 0x1, 0x1}, {0x2, 0x8c, 0x2}, {0x4, 0x34, 0x3e1}, {0x4, 0x4, 0x7f}], "ca"}]}, {0x0, [0x0, 0x30, 0x5f, 0xe, 0x0, 0x2e, 0x5f, 0x30, 0x30, 0x30]}}, &(0x7f0000002100)=""/209, 0x140, 0xd1, 0x0, 0x9, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000002240)=@base={0x15, 0xfffffffb, 0xa, 0x7, 0xa44, 0xffffffffffffffff, 0x1, '\x00', 0x0, r13, 0x8, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) 1.354656989s ago: executing program 3 (id=8575): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x80060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x101814}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0500000004000000032000000c"], 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000005dae2b27f872413f8735de6cdec8de25f82477730c66816a77189f1c12c9c8c48f177b73a050010b37a4033b9a32dfe62b1ae101424d93fd7a146fe3631fa913ba37cb18d21a8039aea92d000000000000000000007534c2cae0688e8c3837d828790358034ffb72a585e04d31997125f1101784329bcf721df5a05a4ed5f9a51f3bd4c1328d51750369779a9cb979e175232d85e04dcade9cf568dd9c53f307ab74a67222a18410b16cf8dc1763ec18c189e23ff8e7063254732466bdfb26071e35ef0f83da13f858efec822c7c251b030ddb2a92b5cf1b6cb9a2"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d00000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_bp={0x0, 0x8}, 0x101000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40001100, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000c80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 1.297945101s ago: executing program 2 (id=8576): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000c200"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32, @ANYBLOB="000000000000004e10ef34f4c9ea4300000000000000000000000000eb14f742eb05c1f4bf25e3e4d4bfa8e9c62e0d9b1f5a8c2a788b4261312b2866b7475f7590cc6636506afa903170785b194986387eba75c1014ba606d692633c6d755d51f896902bdd2f858280168b0cb58fe4383386e964242c6612b83a0568750518af6d049bf86214fb727db5ed2e4215e00a8aded8b778ed8eb24b2fa835cf216f18782c5a2dbe8cdfe910cb681e1e70fb2fa323d94ccd7c93ff688484"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r3, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079122800000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r6, &(0x7f00000005c0)=ANY=[], 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000ce00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00004417717f00000000000000000000000000e8ffffffffffffff00"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f0000000800)=""/163}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x10, 0x0, 0xa, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) 1.186856022s ago: executing program 0 (id=8578): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) 1.019127985s ago: executing program 0 (id=8579): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x5, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) close(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r7}, &(0x7f0000000800), &(0x7f0000000840)=r8}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00', r9}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) 1.018837045s ago: executing program 4 (id=8580): perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x7000002}, 0x2c) 943.295736ms ago: executing program 4 (id=8581): socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x56}]}, 0x0, 0x4, 0x99, &(0x7f00000002c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0xcfa4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100"/20, @ANYRES32, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1e00000001000000810000000200000000200000", @ANYRES32=r6, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="0200000004000000050000000b0000000000000000000000000009005d7a693cda4d06e2bc529a372434f59f5bd9a0e86193cba0d8363d34eea46840c4c2bf3dce49e31dfeb40ea366ef3c727901ad8c5e01acb1eb0b0bc2a182c48307fc8a041d98f7aefafda035534fd86ec0baf27cbc3c88c106c12aeb4c4621b907099a3166de1f453a52928ec6ed295de5d2eec4fe13e47c09978f5ef4643e70e6274a55f70b42d96b3a22444c20557cb60c79b31f54b3c46e5caf9f73c8e2"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000040)={r8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008700000000000000a6000000ffffff8595", @ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x3, 0x105, &(0x7f0000000580)=""/261, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={0x1}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x8, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) 682.34188ms ago: executing program 0 (id=8582): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800"/14, @ANYRES32, @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8003, 0xaea}, 0x110104, 0x32, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="180200008000000000000000000000008500009500000000000000"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18f80000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000000000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000fffdffffbfa400000000000007040000f0ffffffc40200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) (async) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000fc0)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}, 0x112048}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 531.100862ms ago: executing program 0 (id=8583): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r0}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 391.451804ms ago: executing program 3 (id=8585): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 361.803585ms ago: executing program 3 (id=8586): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x5, &(0x7f00000000c0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0xc}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0xa, 0xb4f, 0x8}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1], &(0x7f0000000200)=[{0x3, 0x3, 0x0, 0x5}, {0x5, 0x1, 0xd, 0x1}, {0x5, 0x1, 0xe, 0xf}, {0x4, 0x5, 0x8, 0x3}, {0x1, 0x5, 0x5, 0x5}, {0x1, 0x4, 0x3, 0x5}, {0x0, 0x3, 0x7, 0x3}], 0x10, 0x400, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000340)=r1}, 0x20) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000600)={&(0x7f00000003c0)="ed752895ebc010e948e986c2a7baa9bdf54d489401d1648cffd9ba8617f3bb467056b958b2d35bc3965d06acb203d7ac3945df1239ceddb348f726e73a6e7fc87a300c02bc3b0321062ab7fa9dfe4fa3274eb48e8aad36be4cece58ef3cc545be2e57d8c10ac4911d89d44573dc368", &(0x7f0000000440)=""/52, &(0x7f0000000480)="05aa989c740f46d70d9793fc160bee0b2986a5532f17b03ec2425144ab19de4881338bfc6d7e79e0bec987beac2be8316c51e1a725a65d80603566f318548e9086901d15ca528ff91cc9e55a75cb386c27c729e2869aca3028a3da4a1674821f72a37d92f67faac309aa0ad0cb1105cc2c5a5b8f721f32f6d7d4c04b555aed0a106b47e8dfcd7641ba9bf87745222d36993c25cedcbe8ee960fdf8b7194709f9886ec5b7caf91050ec45da", &(0x7f0000000540)="0d303baf6268595d2a1b10eb7a60f9772fbcbffeb3873dde573f3c2d7234841b956777192dea2f8d58b691f4d1c0414c7c11dfd558722017f556a4615cc3b36df9b047876c62f49ea8c1aae393354bfba8cf1d8eb10d624b5a2ebfcb02b5a82537788b61530aaa007e3a799f1d64f56210371b666b16fd3ea97bdbee2c9cd8a4ba7fd30541", 0x0, r2}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r1, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000780)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x86, &(0x7f0000000840)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x5c, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@enum64={0x6, 0x1, 0x0, 0x13, 0x0, 0x5, [{0xf, 0x1000, 0x10}]}]}, {0x0, [0x5f, 0x5f, 0x2e]}}, &(0x7f0000000ac0)=""/201, 0x35, 0xc9, 0x0, 0x19d, 0x10000, @value}, 0x28) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x6, &(0x7f0000000640)=@raw=[@exit, @ldst={0x3, 0x3, 0x3, 0x0, 0xb, 0x0, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x85, &(0x7f00000006c0)=""/133, 0x41100, 0x4, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000000c00)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0xa, 0x8, 0x6}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000c80)=[r2, r0], &(0x7f0000000cc0)=[{0x1, 0x4, 0x10, 0x3}, {0x2, 0x1, 0x9, 0xa}, {0x2, 0x2, 0xd, 0x6}, {0x5, 0x2, 0x10, 0x4}, {0x1, 0x1, 0x6, 0xb}, {0x2, 0x4, 0x5}, {0x5, 0x4, 0x7, 0x8}], 0x10, 0x4, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000e00), 0x404000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002180)={r5, 0x20, &(0x7f0000002140)={&(0x7f0000001fc0)=""/107, 0x6b, 0x0, &(0x7f0000002040)=""/211, 0xd3}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000002200)={0x18, 0x11, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa}, [@ldst={0x2, 0x2, 0x1, 0x0, 0x3, 0x100, 0x8}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x62}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x5}, @generic={0x9, 0x9, 0xd, 0x2, 0x3f90}, @jmp={0x5, 0x0, 0x1, 0x2, 0x0, 0x4, 0x1}]}, &(0x7f0000000f00)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000f40)=""/4096, 0x40f00, 0x8, '\x00', r3, @fallback=0x13, r5, 0x8, &(0x7f0000001f40)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001f80)={0x2, 0x3, 0xfffff810, 0x90000000}, 0x10, r7, r1, 0x1, 0x0, &(0x7f00000021c0)=[{0x0, 0x2, 0xb}], 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000022c0)=@base={0x18, 0xfffffffe, 0x4, 0x4, 0x10620, r0, 0x1000, '\x00', r3, 0xffffffffffffffff, 0x3, 0x4, 0x3, 0x0, @void, @value, @value}, 0x50) r10 = bpf$TOKEN_CREATE(0x24, &(0x7f0000002400)={0x0, r8}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000023c0)={&(0x7f0000002340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x3, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x2e, 0x61]}}, &(0x7f0000002380)=""/31, 0x2c, 0x1f, 0x0, 0x10000, 0x10000, @value=r10}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000028c0)={0xffffffffffffffff, 0xe0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000025c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000002600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002680)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f00000026c0)=[{}], 0x8, 0x10, &(0x7f0000002700), &(0x7f0000002740), 0x8, 0x31, 0x8, 0x8, &(0x7f0000002780)}}, 0x10) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003940)={&(0x7f0000002900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@fwd={0x1}, @decl_tag={0x6, 0x0, 0x0, 0x11, 0x5, 0x9}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000002940)=""/4096, 0x38, 0x1000, 0x1, 0x7ff, 0x10000, @value=r9}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000003a40)={0xf, 0xe, &(0x7f0000002440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe951, 0x0, 0x0, 0x0, 0x8001}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffff9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}]}, &(0x7f00000024c0)='GPL\x00', 0xffffffff, 0x99, &(0x7f0000002500)=""/153, 0x41100, 0xc, '\x00', r11, @cgroup_device, r13, 0x8, &(0x7f0000003980)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000039c0)={0x4, 0x7, 0xb052, 0xffff80e8}, 0x10, r4, r6, 0x3, 0x0, &(0x7f0000003a00)=[{0x5, 0x4, 0xe, 0x5}, {0x4, 0x3, 0xf, 0x9}, {0x5, 0x5, 0xf, 0x3}], 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003e00)=@bpf_lsm={0x1d, 0x13, &(0x7f0000003b00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000003bc0)='syzkaller\x00', 0x4, 0xf3, &(0x7f0000003c00)=""/243, 0x0, 0x43, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000003d00)={0x1032, 0x5}, 0x8, 0x10, &(0x7f0000003d40)={0x1, 0x9, 0xb395, 0x5}, 0x10, r12, 0x0, 0x7, 0x0, &(0x7f0000003d80)=[{0x2, 0x1, 0xe, 0xa}, {0x1, 0x2, 0xc, 0xc}, {0x5, 0x5, 0x10, 0x3}, {0x0, 0x2, 0x4, 0x3}, {0x1, 0x1, 0x9}, {0x5, 0x3, 0x7, 0x7}, {0x3, 0x4, 0xb, 0x2}], 0x10, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003ec0)) r14 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003f00)='./cgroup/syz0\x00', 0x200002, 0x0) close(r6) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003f40)) socketpair(0x29, 0x4, 0x5, &(0x7f0000003f80)={0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003fc0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r14, &(0x7f0000004000)='tasks\x00', 0x2, 0x0) write$cgroup_subtree(r15, &(0x7f0000004040)={[{0x2d, 'cpuset'}, {0x2d, 'devices'}, {0x2b, 'perf_event'}, {0x2b, 'net_prio'}, {0x2d, 'freezer'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x3d) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000004080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000042c0)={0x1, &(0x7f00000040c0)="fe3c44912e94788c9d0ff6c997bc77a245268258705d2035c26dcaf64b103c8e221af79bea1c59cb6461af70b2717bf2282b2325cc8cf12862e79edd26bf757bab0e3a3c2158eb6828ef586854832b483565e6ef52943310be8cd12cf5b5a58b36f147aeb20bcdc6564229e238d57f0bde61a196350c2a2b9d734d6d2b23fad1f1e854e000a64306cfd18e41c23046dcab694e7764c0800fdb8c64c2c13d3cfc5cf6c7f0a449c246ca397287682b7bea48af8d8ab49960f76121d9ede34fca9a6ec7b2ceee7cb6041a01f9768185ba93f19fea8eecfed5c6583394017e09a4eed0ad4287964edf8d5bcd8601", &(0x7f00000041c0)=""/244}, 0x20) r16 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000004300)={0x1b, 0x0, 0x0, 0x9, 0x0, r0, 0x2, '\x00', r3, r13, 0x5, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004540)={&(0x7f0000004400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0xb, [@float={0x8, 0x0, 0x0, 0x10, 0xc}, @enum={0x10, 0x4, 0x0, 0x6, 0x4, [{0x0, 0x5761}, {0xe, 0xcb}, {0x10, 0x1}, {0x3, 0x40}]}]}, {0x0, [0x30, 0x30, 0x2e, 0x6f, 0x5f, 0x5f, 0x2e, 0x61, 0x61]}}, &(0x7f0000004480)=""/168, 0x5b, 0xa8, 0x0, 0x80000000, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000004380)=@base={0x12, 0xf, 0x9, 0x5, 0xc4b8, r16, 0x2, '\x00', r11, r5, 0x2, 0x5, 0x5, 0x0, @value=r17, @void, @void, @value}, 0x50) 359.593475ms ago: executing program 2 (id=8587): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffc2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r3}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x79, 0xf, 0x5, 0x0, 0xbe, 0x80000, 0xa, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x5, 0x2}, 0x200, 0x5, 0x9, 0x6, 0x7, 0x2, 0x8001, 0x0, 0xb, 0x0, 0xfffffffffffffbfc}, r7, 0x5, r1, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xef, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6e", 0x0, 0x24, 0x60000000}, 0x50) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.throttle.io_service_bytes\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001100)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x2c, &(0x7f0000001140), 0x4) setsockopt$sock_attach_bpf(r9, 0x1, 0x1b, &(0x7f0000000040), 0x4) close(r8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000800000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00'}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNDETACHFILTER(r8, 0x401054d6, 0x0) 345.028715ms ago: executing program 1 (id=8588): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x509fc0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x306) socketpair(0x6, 0x4, 0x4, &(0x7f0000000080)) close(r0) (async) close(r0) 308.072955ms ago: executing program 3 (id=8589): socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0) 307.278555ms ago: executing program 4 (id=8590): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) 216.178527ms ago: executing program 1 (id=8591): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x11940, 0x2}, 0x0, 0x80, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r3) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000080)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001c00)="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", 0x2d5}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'vlan1\x00', @broadcast}) setsockopt$sock_attach_bpf(r6, 0x1, 0x21, &(0x7f0000000540), 0x4) r8 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) sendmsg$tipc(r7, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000640)={'dummy0\x00', @local}) sendmsg$tipc(r6, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) socketpair(0x10, 0x0, 0x2, &(0x7f0000000500)={0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f00000004c0)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESDEC=r10], &(0x7f0000001480)=""/167, 0x77, 0xa7, 0x0, 0x0, 0x10000, @value=r2}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x11, 0x11, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000008760000000000000300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018660000100000000000000092000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000680)='syzkaller\x00', 0x6, 0x85, &(0x7f0000001a80)=""/133, 0x40f00, 0x14, '\x00', r5, 0x0, r11, 0x8, &(0x7f0000000800)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x4, 0xd, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x1, 0xf}], 0x10, 0x75c, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000400)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="b9ff030f6044238cb89e14f088ca1bff430500001100630377fbac141414e000000162079f4b4d2f87e56dca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) 215.147167ms ago: executing program 4 (id=8592): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r2}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000280)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 103.157749ms ago: executing program 0 (id=8593): r0 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x102, 0x0, 0x2, 0x0, 0x0, 0x4f}, r0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) socketpair(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000400)='syz0\x00', 0x1ff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 89.073789ms ago: executing program 3 (id=8594): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000000f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000080), &(0x7f00000006c0)='%-010d \x00'}, 0x20) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032b00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) 21.44826ms ago: executing program 4 (id=8595): perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03076844268cb89e14f086dd47e0ffff00122c00631177fbac141416e000030a44079f034d2f87e589ca6aab845013f2325f1a3911050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x7000002}, 0x2c) 20.62928ms ago: executing program 1 (id=8596): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 11.7432ms ago: executing program 3 (id=8597): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000001c0)={0x2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x64fede9c, 0x0, 0x0, 0x40f00, 0x8e, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xd2, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0b000000ff000000020000000900000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x5f, &(0x7f0000000040)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rpcgss_createauth\x00', r4, 0x0, 0xffffffffffffffff}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000980)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa458, 0x5}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="9500"/24], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="61109a000000000061139a0000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a1f37302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a1a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4c6ea9604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a09d8be0fc5beecf153236c19740be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c7476"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 0s ago: executing program 4 (id=8598): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r3, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001440), &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x5b, &(0x7f00000014c0)=[{}], 0x8, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x75, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYRESHEX], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 32) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000040)=@generic={0x0, r6}, 0x18) (async) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f00000028c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000038c0)={0x30, 0x10, &(0x7f0000001100)=ANY=[@ANYBLOB="1800000003000000000000000500e35993f70020", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bd51c0ff00000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x8, 0x89, &(0x7f00000011c0)=""/137, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000013c0)={0x0, 0x4, 0x1ff, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000001780)=[r2, r2, r2, r7, r2], 0x0, 0x10, 0x6, @void, @value}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYRES8=r0], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x18, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='GPL\x00', 0xffff6be9, 0x0, 0x0, 0x41100, 0x4e, '\x00', r4, 0x17, r8, 0x8, &(0x7f0000000500)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0xc, 0x7, 0x5}, 0x10, 0x297f5, r0, 0x5, 0x0, &(0x7f0000000580)=[{0x0, 0x1, 0xb, 0xa}, {0x1, 0x4, 0x0, 0xc}, {0x0, 0x1, 0x1}, {0x5, 0x4, 0xf, 0x9}, {0x1, 0x3, 0x8, 0xe}], 0x10, 0x4, @void, @value}, 0x94) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, 0x0, 0x0}, 0x20) (async) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000180), &(0x7f00000002c0)='%+9llu \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) (async, rerun: 64) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async, rerun: 64) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r11, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1, 0x0, 0x0, @void, @value}, 0x20) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4030582a, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (rerun: 32) kernel console output (not intermixed with test programs): 56.140029][T13669] rtnetlink_event+0xd2/0x1a0 [ 456.145312][T13669] raw_notifier_call_chain+0x90/0x100 [ 456.151032][T13669] dev_change_tx_queue_len+0x1af/0x330 [ 456.156729][T13669] ? dev_set_mtu+0xc0/0xc0 [ 456.161157][T13669] dev_ifsioc+0x607/0xa50 [ 456.165664][T13669] ? dev_ioctl+0xb80/0xb80 [ 456.170371][T13669] dev_ioctl+0x550/0xb80 [ 456.174765][T13669] sock_do_ioctl+0x235/0x330 [ 456.179437][T13669] ? sock_show_fdinfo+0xa0/0xa0 [ 456.184667][T13669] ? selinux_file_ioctl+0x377/0x480 [ 456.189974][T13669] ? mutex_trylock+0xa0/0xa0 [ 456.194570][T13669] ? __fget_files+0x2c4/0x320 [ 456.199361][T13669] sock_ioctl+0x504/0x710 [ 456.203777][T13669] ? sock_poll+0x360/0x360 [ 456.208199][T13669] ? __fget_files+0x2c4/0x320 [ 456.212881][T13669] ? security_file_ioctl+0x84/0xa0 [ 456.217991][T13669] ? sock_poll+0x360/0x360 [ 456.222595][T13669] __se_sys_ioctl+0x121/0x1a0 [ 456.227279][T13669] __x64_sys_ioctl+0x7b/0x90 [ 456.232006][T13669] do_syscall_64+0x31/0x40 [ 456.236449][T13669] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 456.242360][T13669] RIP: 0033:0x7f99cbd34929 [ 456.246901][T13669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.266636][T13669] RSP: 002b:00007f99ca37c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 456.275284][T13669] RAX: ffffffffffffffda RBX: 00007f99cbf5c080 RCX: 00007f99cbd34929 [ 456.283285][T13669] RDX: 0000200000000100 RSI: 0000000000008943 RDI: 0000000000000004 [ 456.291400][T13669] RBP: 00007f99ca37c090 R08: 0000000000000000 R09: 0000000000000000 [ 456.299502][T13669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 456.307596][T13669] R13: 0000000000000000 R14: 00007f99cbf5c080 R15: 00007ffe407a5ff8 [ 456.723766][T13680] device veth0_vlan left promiscuous mode [ 456.748314][T13680] device veth0_vlan entered promiscuous mode [ 456.802650][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 456.822709][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 456.876318][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 458.296612][T13710] device veth0_vlan left promiscuous mode [ 458.443002][T13710] device veth0_vlan entered promiscuous mode [ 458.671770][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 458.684439][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 458.703381][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 460.045805][T13753] device syzkaller0 entered promiscuous mode [ 460.798338][T13778] device syzkaller0 entered promiscuous mode [ 461.502636][T13807] device syzkaller0 entered promiscuous mode [ 461.518673][T13816] device veth0_vlan left promiscuous mode [ 461.532410][T13816] device veth0_vlan entered promiscuous mode [ 461.794782][T13819] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 461.800640][T13819] pim6reg0: linktype set to 769 [ 461.805786][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.836738][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 461.879758][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 462.806022][T13849] device veth0_vlan left promiscuous mode [ 462.902202][T13849] device veth0_vlan entered promiscuous mode [ 463.095645][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 463.115640][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 463.181265][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 463.632193][T13866] device syzkaller0 entered promiscuous mode [ 464.665896][T13884] FAULT_INJECTION: forcing a failure. [ 464.665896][T13884] name failslab, interval 1, probability 0, space 0, times 0 [ 464.913095][T13884] CPU: 0 PID: 13884 Comm: syz.2.4607 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 464.924605][T13884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 464.934701][T13884] Call Trace: [ 464.938054][T13884] __dump_stack+0x21/0x24 [ 464.942429][T13884] dump_stack_lvl+0x169/0x1d8 [ 464.947148][T13884] ? thaw_kernel_threads+0x220/0x220 [ 464.952710][T13884] ? show_regs_print_info+0x18/0x18 [ 464.958292][T13884] dump_stack+0x15/0x1c [ 464.962841][T13884] should_fail+0x3c1/0x510 [ 464.967285][T13884] ? tun_device_event+0x4e7/0xf20 [ 464.972338][T13884] __should_failslab+0xa4/0xe0 [ 464.977221][T13884] should_failslab+0x9/0x20 [ 464.981758][T13884] __kmalloc+0x60/0x330 [ 464.986108][T13884] ? tun_device_event+0x15d/0xf20 [ 464.991161][T13884] tun_device_event+0x4e7/0xf20 [ 464.996039][T13884] ? __kasan_check_read+0x11/0x20 [ 465.001175][T13884] ? macsec_notify+0xff/0x490 [ 465.005876][T13884] ? macsec_common_dellink+0x430/0x430 [ 465.011471][T13884] raw_notifier_call_chain+0x90/0x100 [ 465.017196][T13884] dev_change_tx_queue_len+0x1af/0x330 [ 465.022888][T13884] ? dev_set_mtu+0xc0/0xc0 [ 465.027522][T13884] dev_ifsioc+0x607/0xa50 [ 465.032184][T13884] ? dev_ioctl+0xb80/0xb80 [ 465.036652][T13884] dev_ioctl+0x550/0xb80 [ 465.041215][T13884] sock_do_ioctl+0x235/0x330 [ 465.045849][T13884] ? sock_show_fdinfo+0xa0/0xa0 [ 465.050736][T13884] ? selinux_file_ioctl+0x377/0x480 [ 465.055965][T13884] ? mutex_trylock+0xa0/0xa0 [ 465.060655][T13884] ? __fget_files+0x2c4/0x320 [ 465.065381][T13884] sock_ioctl+0x504/0x710 [ 465.069741][T13884] ? sock_poll+0x360/0x360 [ 465.074495][T13884] ? __fget_files+0x2c4/0x320 [ 465.079202][T13884] ? security_file_ioctl+0x84/0xa0 [ 465.084415][T13884] ? sock_poll+0x360/0x360 [ 465.088843][T13884] __se_sys_ioctl+0x121/0x1a0 [ 465.093551][T13884] __x64_sys_ioctl+0x7b/0x90 [ 465.098171][T13884] do_syscall_64+0x31/0x40 [ 465.102611][T13884] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 465.108700][T13884] RIP: 0033:0x7f99cbd34929 [ 465.113234][T13884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.133393][T13884] RSP: 002b:00007f99ca37c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 465.141945][T13884] RAX: ffffffffffffffda RBX: 00007f99cbf5c080 RCX: 00007f99cbd34929 [ 465.150148][T13884] RDX: 0000200000000100 RSI: 0000000000008943 RDI: 0000000000000004 [ 465.158131][T13884] RBP: 00007f99ca37c090 R08: 0000000000000000 R09: 0000000000000000 [ 465.166126][T13884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.174288][T13884] R13: 0000000000000000 R14: 00007f99cbf5c080 R15: 00007ffe407a5ff8 [ 465.194346][T13884] syzkaller0: refused to change device tx_queue_len [ 465.501791][T13901] device veth0_vlan left promiscuous mode [ 465.620886][T13901] device veth0_vlan entered promiscuous mode [ 465.755526][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 465.768717][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 465.806307][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.340887][T13951] device sit0 left promiscuous mode [ 467.415406][T13950] device sit0 entered promiscuous mode [ 467.559035][T13955] device veth0_vlan left promiscuous mode [ 467.577585][T13955] device veth0_vlan entered promiscuous mode [ 467.627227][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.640366][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.657649][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.797404][T13962] device wg2 left promiscuous mode [ 470.248319][T14024] device sit0 left promiscuous mode [ 470.841052][T14039] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.848631][T14039] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.955877][T14041] device bridge_slave_1 left promiscuous mode [ 470.971162][T14041] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.989757][T14041] device bridge_slave_0 left promiscuous mode [ 471.005103][T14041] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.438434][T14058] device pim6reg1 entered promiscuous mode [ 473.164110][T14094] device syzkaller0 entered promiscuous mode [ 473.397231][T14115] device syzkaller0 entered promiscuous mode [ 474.035893][T14123] device wg2 left promiscuous mode [ 474.135015][T14123] device wg2 entered promiscuous mode [ 474.156800][T14136] device veth0_vlan left promiscuous mode [ 474.164794][T14136] device veth0_vlan entered promiscuous mode [ 474.186971][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 474.208576][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 474.217857][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 474.527284][T14181] device syzkaller0 entered promiscuous mode [ 475.150286][T14208] ±ÿ: renamed from team_slave_1 [ 475.614838][T14213] device syzkaller0 entered promiscuous mode [ 476.178912][T14230] device syzkaller0 entered promiscuous mode [ 476.359762][T14246] device veth0_vlan left promiscuous mode [ 476.408083][T14246] device veth0_vlan entered promiscuous mode [ 476.570587][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 476.587160][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 476.603840][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 477.560402][ T24] audit: type=1400 audit(1750204510.950:168): avc: denied { create } for pid=14304 comm="syz.3.4744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 477.768230][T14315] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.777660][T14315] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.882159][T14324] device bridge_slave_1 left promiscuous mode [ 477.898175][T14324] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.923620][T14324] device bridge_slave_0 left promiscuous mode [ 477.935772][T14324] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.397788][T14383] device syzkaller0 entered promiscuous mode [ 480.209760][T14406] syz.4.4778[14406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.209890][T14406] syz.4.4778[14406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.475395][T14404] device syzkaller0 entered promiscuous mode [ 481.041439][T14425] GPL: port 1(erspan0) entered blocking state [ 481.050336][T14425] GPL: port 1(erspan0) entered disabled state [ 481.057725][T14425] device erspan0 entered promiscuous mode [ 481.076376][T14417] GPL: port 1(erspan0) entered blocking state [ 481.082787][T14417] GPL: port 1(erspan0) entered forwarding state [ 481.467546][T14434] device syzkaller0 entered promiscuous mode [ 482.428894][T14483] device syzkaller0 entered promiscuous mode [ 485.764928][T14558] device sit0 entered promiscuous mode [ 485.911618][T14564] device sit0 entered promiscuous mode [ 487.519946][T14621] device syzkaller0 entered promiscuous mode [ 487.793337][T14628] GPL: port 1(erspan0) entered disabled state [ 490.170069][T14686] device syzkaller0 entered promiscuous mode [ 491.170097][T14706] device syzkaller0 entered promiscuous mode [ 491.812841][T14728] FAULT_INJECTION: forcing a failure. [ 491.812841][T14728] name failslab, interval 1, probability 0, space 0, times 0 [ 491.882084][T14728] CPU: 1 PID: 14728 Comm: syz.2.4886 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 491.893766][T14728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 491.903930][T14728] Call Trace: [ 491.907476][T14728] __dump_stack+0x21/0x24 [ 491.912024][T14728] dump_stack_lvl+0x169/0x1d8 [ 491.916817][T14728] ? thaw_kernel_threads+0x220/0x220 [ 491.922112][T14728] ? skb_put+0x10e/0x1f0 [ 491.926380][T14728] ? show_regs_print_info+0x18/0x18 [ 491.931594][T14728] ? nla_put+0x142/0x1f0 [ 491.936196][T14728] ? skb_trim+0x8d/0x1a0 [ 491.940601][T14728] dump_stack+0x15/0x1c [ 491.944757][T14728] should_fail+0x3c1/0x510 [ 491.949260][T14728] ? netlink_trim+0x193/0x230 [ 491.953938][T14728] __should_failslab+0xa4/0xe0 [ 491.958692][T14728] should_failslab+0x9/0x20 [ 491.963414][T14728] __kmalloc_track_caller+0x5f/0x320 [ 491.968701][T14728] ? netlink_trim+0x193/0x230 [ 491.973489][T14728] pskb_expand_head+0x123/0x1110 [ 491.978552][T14728] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 491.984018][T14728] netlink_trim+0x193/0x230 [ 491.988522][T14728] netlink_broadcast_filtered+0x75/0x1290 [ 491.994240][T14728] ? __kmalloc_track_caller+0x181/0x320 [ 491.999809][T14728] ? kasan_unpoison+0x67/0x90 [ 492.004756][T14728] ? rtmsg_ifinfo_build_skb+0xd8/0x180 [ 492.010452][T14728] nlmsg_notify+0xed/0x1b0 [ 492.014913][T14728] rtmsg_ifinfo+0xea/0x130 [ 492.019533][T14728] dev_close_many+0x27c/0x4d0 [ 492.024481][T14728] ? __dev_open+0x4c0/0x4c0 [ 492.029025][T14728] ? __kasan_check_read+0x11/0x20 [ 492.034081][T14728] unregister_netdevice_many+0x44c/0x1980 [ 492.039950][T14728] ? __mod_timer+0x7ae/0xb30 [ 492.044559][T14728] ? ____kasan_slab_free+0x130/0x160 [ 492.050185][T14728] ? alloc_netdev_mqs+0xc80/0xc80 [ 492.055231][T14728] ? add_timer+0x68/0x80 [ 492.059772][T14728] ? __queue_delayed_work+0x173/0x200 [ 492.065355][T14728] ? __kasan_check_read+0x11/0x20 [ 492.070412][T14728] unregister_netdevice_queue+0x31c/0x360 [ 492.076426][T14728] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 492.081989][T14728] ? list_netdevice+0x4c0/0x4c0 [ 492.086958][T14728] ? linkwatch_fire_event+0x2d3/0x330 [ 492.092450][T14728] __tun_detach+0xca6/0x1450 [ 492.097077][T14728] ? tun_chr_open+0x540/0x540 [ 492.101789][T14728] tun_chr_close+0x92/0x140 [ 492.106320][T14728] __fput+0x2fb/0x770 [ 492.110325][T14728] ____fput+0x15/0x20 [ 492.114337][T14728] task_work_run+0x127/0x190 [ 492.119034][T14728] exit_to_user_mode_loop+0xcb/0xe0 [ 492.124356][T14728] syscall_exit_to_user_mode+0x68/0x90 [ 492.129881][T14728] do_syscall_64+0x3d/0x40 [ 492.134459][T14728] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 492.140465][T14728] RIP: 0033:0x7f99cbd34929 [ 492.145173][T14728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 492.165005][T14728] RSP: 002b:00007f99ca39d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 492.173640][T14728] RAX: 0000000000000000 RBX: 00007f99cbf5bfa0 RCX: 00007f99cbd34929 [ 492.181801][T14728] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 492.189863][T14728] RBP: 00007f99ca39d090 R08: 0000000000000000 R09: 0000000000000000 [ 492.197852][T14728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 492.205910][T14728] R13: 0000000000000000 R14: 00007f99cbf5bfa0 R15: 00007ffe407a5ff8 [ 495.215254][T14836] device syzkaller0 entered promiscuous mode [ 497.584030][T14963] device syzkaller0 entered promiscuous mode [ 497.789161][T14965] device syzkaller0 entered promiscuous mode [ 497.906962][T14976] FAULT_INJECTION: forcing a failure. [ 497.906962][T14976] name failslab, interval 1, probability 0, space 0, times 0 [ 497.919776][T14976] CPU: 1 PID: 14976 Comm: syz.0.4959 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 497.931268][T14976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 497.941451][T14976] Call Trace: [ 497.944763][T14976] __dump_stack+0x21/0x24 [ 497.949104][T14976] dump_stack_lvl+0x169/0x1d8 [ 497.953921][T14976] ? thaw_kernel_threads+0x220/0x220 [ 497.959396][T14976] ? show_regs_print_info+0x18/0x18 [ 497.964622][T14976] ? __kasan_check_read+0x11/0x20 [ 497.969786][T14976] dump_stack+0x15/0x1c [ 497.974189][T14976] should_fail+0x3c1/0x510 [ 497.978628][T14976] ? __alloc_skb+0x9e/0x520 [ 497.983134][T14976] __should_failslab+0xa4/0xe0 [ 497.987897][T14976] should_failslab+0x9/0x20 [ 497.992431][T14976] kmem_cache_alloc+0x3d/0x2e0 [ 497.997288][T14976] ? find_next_bit+0xc9/0x100 [ 498.001959][T14976] ? cpumask_next+0x12/0x30 [ 498.006464][T14976] __alloc_skb+0x9e/0x520 [ 498.011047][T14976] inet6_rt_notify+0x287/0x470 [ 498.015817][T14976] ? rt6_nh_dump_exceptions+0x690/0x690 [ 498.021505][T14976] ? call_fib_notifiers+0xa0/0xc0 [ 498.026627][T14976] fib6_del+0xbf9/0xf60 [ 498.030883][T14976] ? fib6_locate+0x460/0x460 [ 498.035587][T14976] ? __kasan_check_write+0x14/0x20 [ 498.040720][T14976] ? finish_task_switch+0x1b7/0x5a0 [ 498.045936][T14976] ? fib6_ifdown+0x2eb/0x4e0 [ 498.050665][T14976] fib6_clean_node+0x296/0x520 [ 498.055729][T14976] ? node_free_rcu+0x30/0x30 [ 498.060338][T14976] ? __kasan_check_read+0x11/0x20 [ 498.065479][T14976] fib6_walk_continue+0x4fc/0x700 [ 498.070631][T14976] fib6_walk+0x153/0x290 [ 498.074878][T14976] fib6_clean_all+0x16a/0x230 [ 498.079560][T14976] ? tracing_record_taskinfo+0x7c/0x220 [ 498.085229][T14976] ? rt6_sync_down_dev+0x130/0x130 [ 498.090367][T14976] ? fib6_del+0xf60/0xf60 [ 498.094809][T14976] ? node_free_rcu+0x30/0x30 [ 498.099404][T14976] ? rt6_sync_down_dev+0x130/0x130 [ 498.104688][T14976] ? schedule_preempt_disabled+0x20/0x20 [ 498.110367][T14976] rt6_disable_ip+0x119/0x6a0 [ 498.115197][T14976] ? preempt_schedule_thunk+0x16/0x18 [ 498.120630][T14976] ? __queue_work+0x951/0xca0 [ 498.125552][T14976] ? fib6_ifdown+0x4e0/0x4e0 [ 498.130176][T14976] ? __kasan_check_read+0x11/0x20 [ 498.135425][T14976] addrconf_ifdown+0x144/0x1800 [ 498.140431][T14976] ? addrconf_cleanup+0x1c0/0x1c0 [ 498.145563][T14976] ? __kasan_check_write+0x14/0x20 [ 498.150683][T14976] ? mutex_lock+0x8c/0xe0 [ 498.155189][T14976] ? mutex_trylock+0xa0/0xa0 [ 498.159926][T14976] ? nf_nat_masq_schedule+0x490/0x490 [ 498.165558][T14976] ? __kasan_check_write+0x14/0x20 [ 498.171171][T14976] addrconf_notify+0x3bd/0xe90 [ 498.175966][T14976] raw_notifier_call_chain+0x90/0x100 [ 498.181460][T14976] dev_close_many+0x330/0x4d0 [ 498.186173][T14976] ? __dev_open+0x4c0/0x4c0 [ 498.190687][T14976] ? __kasan_check_read+0x11/0x20 [ 498.196195][T14976] unregister_netdevice_many+0x44c/0x1980 [ 498.202130][T14976] ? kmem_cache_free+0x100/0x2d0 [ 498.207283][T14976] ? ____kasan_slab_free+0x130/0x160 [ 498.212691][T14976] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 498.218254][T14976] ? _raw_spin_lock+0xe0/0xe0 [ 498.223202][T14976] ? alloc_netdev_mqs+0xc80/0xc80 [ 498.228503][T14976] ? kfree_skbmem+0x10c/0x180 [ 498.233184][T14976] ? __kasan_check_write+0x14/0x20 [ 498.238404][T14976] ? __kasan_check_read+0x11/0x20 [ 498.243545][T14976] unregister_netdevice_queue+0x31c/0x360 [ 498.249670][T14976] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 498.255310][T14976] ? list_netdevice+0x4c0/0x4c0 [ 498.260567][T14976] ? linkwatch_fire_event+0x2d3/0x330 [ 498.266493][T14976] __tun_detach+0xca6/0x1450 [ 498.271096][T14976] ? tun_chr_open+0x540/0x540 [ 498.275788][T14976] tun_chr_close+0x92/0x140 [ 498.280502][T14976] __fput+0x2fb/0x770 [ 498.284502][T14976] ____fput+0x15/0x20 [ 498.288583][T14976] task_work_run+0x127/0x190 [ 498.293315][T14976] exit_to_user_mode_loop+0xcb/0xe0 [ 498.298686][T14976] syscall_exit_to_user_mode+0x68/0x90 [ 498.304509][T14976] do_syscall_64+0x3d/0x40 [ 498.309122][T14976] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 498.315191][T14976] RIP: 0033:0x7f404d380929 [ 498.319837][T14976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 498.340118][T14976] RSP: 002b:00007f404b9e9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 498.348535][T14976] RAX: 0000000000000000 RBX: 00007f404d5a7fa0 RCX: 00007f404d380929 [ 498.356503][T14976] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 498.364468][T14976] RBP: 00007f404b9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 498.372808][T14976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 498.381517][T14976] R13: 0000000000000000 R14: 00007f404d5a7fa0 R15: 00007ffc83e16398 [ 499.622770][T15037] device pim6reg1 entered promiscuous mode [ 502.971321][T15139] device syzkaller0 entered promiscuous mode [ 505.021702][T15194] device syzkaller0 entered promiscuous mode [ 505.089935][T15200] device veth0_vlan left promiscuous mode [ 505.111183][T15200] device veth0_vlan entered promiscuous mode [ 505.176984][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 505.194599][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 505.247962][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 507.407291][T15279] device syzkaller0 entered promiscuous mode [ 507.463066][T15273] device syzkaller0 entered promiscuous mode [ 507.478448][T15287] device pim6reg1 entered promiscuous mode [ 507.755770][T15320] device veth0_vlan left promiscuous mode [ 507.779517][T15320] device veth0_vlan entered promiscuous mode [ 507.823323][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 507.832822][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 507.840838][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 508.980334][T15378] device sit0 left promiscuous mode [ 509.047497][T15387] device veth0_vlan left promiscuous mode [ 509.064648][T15387] device veth0_vlan entered promiscuous mode [ 509.082976][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 509.136375][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 509.212442][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 509.316176][T15378] device sit0 entered promiscuous mode [ 510.422062][T15404] device syzkaller0 entered promiscuous mode [ 510.948827][T15429] device syzkaller0 entered promiscuous mode [ 510.996343][T15445] syz.2.5108[15445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.048510][T15447] syz.2.5108[15447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.231342][T15445] device pim6reg1 entered promiscuous mode [ 511.298517][T15451] device sit0 left promiscuous mode [ 511.330239][T15451] device sit0 entered promiscuous mode [ 511.734108][T15464] device syzkaller0 entered promiscuous mode [ 512.231362][T15479] device syzkaller0 entered promiscuous mode [ 513.919972][T15536] device veth0_vlan left promiscuous mode [ 513.972832][T15536] device veth0_vlan entered promiscuous mode [ 514.084657][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 514.158226][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 514.210499][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 514.659380][T15561] device veth0_vlan left promiscuous mode [ 514.665590][T15561] device veth0_vlan entered promiscuous mode [ 514.687130][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 514.696185][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 514.704415][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 514.813777][T15565] device sit0 entered promiscuous mode [ 516.276684][T15600] device veth0_vlan left promiscuous mode [ 516.359100][T15600] device veth0_vlan entered promiscuous mode [ 516.490680][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 516.557142][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 516.597305][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 518.708867][T15642] device syzkaller0 entered promiscuous mode [ 522.012918][T15709] device syzkaller0 entered promiscuous mode [ 522.290726][T15727] device wg2 entered promiscuous mode [ 522.317195][T15727] device syzkaller0 entered promiscuous mode [ 523.047124][T15735] device syzkaller0 entered promiscuous mode [ 523.231645][T15745] device syzkaller0 entered promiscuous mode [ 523.832023][T15767] device syzkaller0 entered promiscuous mode [ 524.647182][T15801] device syzkaller0 entered promiscuous mode [ 528.122620][T15851] device veth0_vlan left promiscuous mode [ 528.141721][T15851] device veth0_vlan entered promiscuous mode [ 528.200364][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 528.227020][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 528.265558][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 528.644030][T15871] device veth0_vlan left promiscuous mode [ 528.671466][T15871] device veth0_vlan entered promiscuous mode [ 528.733294][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 528.758987][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 528.767655][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 530.458349][T15903] FAULT_INJECTION: forcing a failure. [ 530.458349][T15903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 530.471496][T15903] CPU: 1 PID: 15903 Comm: syz.4.5267 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 530.482995][T15903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 530.493152][T15903] Call Trace: [ 530.496456][T15903] __dump_stack+0x21/0x24 [ 530.500781][T15903] dump_stack_lvl+0x169/0x1d8 [ 530.505657][T15903] ? thaw_kernel_threads+0x220/0x220 [ 530.511256][T15903] ? show_regs_print_info+0x18/0x18 [ 530.516550][T15903] dump_stack+0x15/0x1c [ 530.520711][T15903] should_fail+0x3c1/0x510 [ 530.525119][T15903] should_fail_usercopy+0x1a/0x20 [ 530.530150][T15903] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 530.536317][T15903] generic_perform_write+0x326/0x510 [ 530.541704][T15903] ? atime_needs_update+0x5b0/0x5b0 [ 530.547093][T15903] ? grab_cache_page_write_begin+0xb0/0xb0 [ 530.552897][T15903] ? file_remove_privs+0x580/0x580 [ 530.558450][T15903] ? __fsnotify_parent+0x5f5/0x6c0 [ 530.563567][T15903] ? __kasan_check_write+0x14/0x20 [ 530.568687][T15903] ? down_write+0xac/0x110 [ 530.573119][T15903] __generic_file_write_iter+0x24b/0x480 [ 530.578902][T15903] ? generic_write_checks+0x3d4/0x480 [ 530.584298][T15903] generic_file_write_iter+0xa9/0x1d0 [ 530.590141][T15903] vfs_write+0x725/0xd60 [ 530.594391][T15903] ? __kasan_slab_free+0x11/0x20 [ 530.599376][T15903] ? kernel_write+0x3c0/0x3c0 [ 530.604143][T15903] ? mutex_trylock+0xa0/0xa0 [ 530.608826][T15903] ? __fget_files+0x2c4/0x320 [ 530.613674][T15903] ? __fdget_pos+0x2d2/0x380 [ 530.618288][T15903] ? ksys_write+0x71/0x240 [ 530.622795][T15903] ksys_write+0x140/0x240 [ 530.627135][T15903] ? __ia32_sys_read+0x90/0x90 [ 530.632089][T15903] ? fpu__clear_all+0x20/0x20 [ 530.636762][T15903] __x64_sys_write+0x7b/0x90 [ 530.641463][T15903] do_syscall_64+0x31/0x40 [ 530.645909][T15903] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 530.651795][T15903] RIP: 0033:0x7fe17a389929 [ 530.656227][T15903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 530.676106][T15903] RSP: 002b:00007fe1789f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 530.684523][T15903] RAX: ffffffffffffffda RBX: 00007fe17a5b0fa0 RCX: 00007fe17a389929 [ 530.692664][T15903] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 530.700655][T15903] RBP: 00007fe1789f2090 R08: 0000000000000000 R09: 0000000000000000 [ 530.708711][T15903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 530.716704][T15903] R13: 0000000000000000 R14: 00007fe17a5b0fa0 R15: 00007ffd2c3d2cd8 [ 531.409347][T15912] device veth0_vlan left promiscuous mode [ 531.604888][T15912] device veth0_vlan entered promiscuous mode [ 531.765786][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 531.777096][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 531.785091][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 532.562718][T15919] device syzkaller0 entered promiscuous mode [ 534.653173][T15966] device syzkaller0 entered promiscuous mode [ 535.207243][T15978] device syzkaller0 entered promiscuous mode [ 535.762699][ T24] audit: type=1400 audit(1750204569.160:169): avc: denied { setattr } for pid=15989 comm="syz.4.5295" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 535.987401][T15993] device syzkaller0 entered promiscuous mode [ 537.186046][T16005] device syzkaller0 entered promiscuous mode [ 537.225175][T16010] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.232642][T16010] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.419053][T16010] device bridge_slave_1 left promiscuous mode [ 537.437115][T16010] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.546793][T16010] device bridge_slave_0 left promiscuous mode [ 537.556594][T16010] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.925477][T16033] device veth0_vlan left promiscuous mode [ 537.953132][T16033] device veth0_vlan entered promiscuous mode [ 538.072116][T16032] device syzkaller0 entered promiscuous mode [ 538.634390][T16054] device syzkaller0 entered promiscuous mode [ 538.954922][T16066] device veth0_vlan left promiscuous mode [ 539.004277][T16066] device veth0_vlan entered promiscuous mode [ 539.296951][T16071] device syzkaller0 entered promiscuous mode [ 539.581940][T16084] device veth0_vlan left promiscuous mode [ 539.603933][T16084] device veth0_vlan entered promiscuous mode [ 539.644081][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 539.657812][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 539.671513][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 539.818893][T16092] FAULT_INJECTION: forcing a failure. [ 539.818893][T16092] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 539.832497][T16092] CPU: 1 PID: 16092 Comm: syz.3.5326 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 539.844092][T16092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 539.854449][T16092] Call Trace: [ 539.857862][T16092] __dump_stack+0x21/0x24 [ 539.862303][T16092] dump_stack_lvl+0x169/0x1d8 [ 539.866992][T16092] ? thaw_kernel_threads+0x220/0x220 [ 539.872405][T16092] ? show_regs_print_info+0x18/0x18 [ 539.877650][T16092] dump_stack+0x15/0x1c [ 539.881849][T16092] should_fail+0x3c1/0x510 [ 539.886389][T16092] should_fail_usercopy+0x1a/0x20 [ 539.891537][T16092] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 539.897671][T16092] generic_perform_write+0x326/0x510 [ 539.903094][T16092] ? atime_needs_update+0x5b0/0x5b0 [ 539.908498][T16092] ? grab_cache_page_write_begin+0xb0/0xb0 [ 539.914757][T16092] ? file_remove_privs+0x580/0x580 [ 539.919893][T16092] ? __fsnotify_parent+0x5f5/0x6c0 [ 539.925216][T16092] ? __kasan_check_write+0x14/0x20 [ 539.930475][T16092] ? down_write+0xac/0x110 [ 539.935169][T16092] __generic_file_write_iter+0x24b/0x480 [ 539.940827][T16092] ? generic_write_checks+0x3d4/0x480 [ 539.946228][T16092] generic_file_write_iter+0xa9/0x1d0 [ 539.951762][T16092] vfs_write+0x725/0xd60 [ 539.956042][T16092] ? kernel_write+0x3c0/0x3c0 [ 539.960895][T16092] ? mutex_trylock+0xa0/0xa0 [ 539.965521][T16092] ? __fget_files+0x2c4/0x320 [ 539.970248][T16092] ? __fdget_pos+0x2d2/0x380 [ 539.975130][T16092] ? ksys_write+0x71/0x240 [ 539.979579][T16092] ksys_write+0x140/0x240 [ 539.984145][T16092] ? __ia32_sys_read+0x90/0x90 [ 539.989201][T16092] ? fpu__clear_all+0x20/0x20 [ 539.993997][T16092] __x64_sys_write+0x7b/0x90 [ 539.998728][T16092] do_syscall_64+0x31/0x40 [ 540.003185][T16092] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 540.009201][T16092] RIP: 0033:0x7fd7eed68929 [ 540.013646][T16092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 540.033371][T16092] RSP: 002b:00007fd7ed3d1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 540.041823][T16092] RAX: ffffffffffffffda RBX: 00007fd7eef8ffa0 RCX: 00007fd7eed68929 [ 540.049824][T16092] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 540.057830][T16092] RBP: 00007fd7ed3d1090 R08: 0000000000000000 R09: 0000000000000000 [ 540.065824][T16092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 540.073987][T16092] R13: 0000000000000000 R14: 00007fd7eef8ffa0 R15: 00007ffd628a5f48 [ 540.814210][T16125] device veth0_vlan left promiscuous mode [ 540.833276][T16125] device veth0_vlan entered promiscuous mode [ 540.955910][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 540.969878][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 540.990947][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 542.199363][T16167] device syzkaller0 entered promiscuous mode [ 542.697957][T16179] device syzkaller0 entered promiscuous mode [ 542.980283][T16188] device veth0_vlan left promiscuous mode [ 543.024586][T16188] device veth0_vlan entered promiscuous mode [ 543.153837][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.169851][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 543.214593][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 543.728104][T16197] device syzkaller0 entered promiscuous mode [ 544.813964][T16216] device syzkaller0 entered promiscuous mode [ 545.016965][T16226] geneve1: tun_chr_ioctl cmd 35108 [ 545.028382][T16232] device veth0_vlan left promiscuous mode [ 545.090672][T16232] device veth0_vlan entered promiscuous mode [ 545.204681][T16232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 545.231825][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 545.241066][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 545.270376][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 545.621436][T16245] device sit0 left promiscuous mode [ 546.179310][T16253] device syzkaller0 entered promiscuous mode [ 546.826770][T16297] FAULT_INJECTION: forcing a failure. [ 546.826770][T16297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 546.839925][T16297] CPU: 1 PID: 16297 Comm: syz.2.5387 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 546.851573][T16297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 546.861764][T16297] Call Trace: [ 546.865084][T16297] __dump_stack+0x21/0x24 [ 546.869710][T16297] dump_stack_lvl+0x169/0x1d8 [ 546.874409][T16297] ? thaw_kernel_threads+0x220/0x220 [ 546.880045][T16297] ? show_regs_print_info+0x18/0x18 [ 546.885538][T16297] dump_stack+0x15/0x1c [ 546.889810][T16297] should_fail+0x3c1/0x510 [ 546.894343][T16297] should_fail_usercopy+0x1a/0x20 [ 546.899395][T16297] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 546.905689][T16297] generic_perform_write+0x326/0x510 [ 546.911263][T16297] ? grab_cache_page_write_begin+0xb0/0xb0 [ 546.917706][T16297] ? file_remove_privs+0x580/0x580 [ 546.923159][T16297] ? __fsnotify_parent+0x5f5/0x6c0 [ 546.928316][T16297] ? __kasan_check_write+0x14/0x20 [ 546.933464][T16297] ? down_write+0xac/0x110 [ 546.937911][T16297] __generic_file_write_iter+0x24b/0x480 [ 546.943657][T16297] ? generic_write_checks+0x3d4/0x480 [ 546.949064][T16297] generic_file_write_iter+0xa9/0x1d0 [ 546.954463][T16297] vfs_write+0x725/0xd60 [ 546.958724][T16297] ? __kasan_slab_free+0x11/0x20 [ 546.963768][T16297] ? kernel_write+0x3c0/0x3c0 [ 546.968477][T16297] ? mutex_trylock+0xa0/0xa0 [ 546.973352][T16297] ? __fget_files+0x2c4/0x320 [ 546.978184][T16297] ? __fdget_pos+0x2d2/0x380 [ 546.982802][T16297] ? ksys_write+0x71/0x240 [ 546.987251][T16297] ksys_write+0x140/0x240 [ 546.991636][T16297] ? __ia32_sys_read+0x90/0x90 [ 546.996523][T16297] ? fpu__clear_all+0x20/0x20 [ 547.001224][T16297] __x64_sys_write+0x7b/0x90 [ 547.006001][T16297] do_syscall_64+0x31/0x40 [ 547.010798][T16297] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 547.017096][T16297] RIP: 0033:0x7f99cbd34929 [ 547.021543][T16297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 547.041673][T16297] RSP: 002b:00007f99ca39d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 547.050110][T16297] RAX: ffffffffffffffda RBX: 00007f99cbf5bfa0 RCX: 00007f99cbd34929 [ 547.058276][T16297] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 547.066781][T16297] RBP: 00007f99ca39d090 R08: 0000000000000000 R09: 0000000000000000 [ 547.074758][T16297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 547.082745][T16297] R13: 0000000000000000 R14: 00007f99cbf5bfa0 R15: 00007ffe407a5ff8 [ 547.339647][T16325] device veth0_vlan left promiscuous mode [ 547.363628][T16325] device veth0_vlan entered promiscuous mode [ 547.460134][T16325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 547.534527][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 547.553367][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 547.585826][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 547.594208][T16323] device veth0_vlan left promiscuous mode [ 547.627755][T16323] device veth0_vlan entered promiscuous mode [ 547.818015][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 547.834728][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 547.843070][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 548.039623][T16348] FAULT_INJECTION: forcing a failure. [ 548.039623][T16348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 548.052875][T16348] CPU: 0 PID: 16348 Comm: syz.4.5401 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 548.064800][T16348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 548.075150][T16348] Call Trace: [ 548.078485][T16348] __dump_stack+0x21/0x24 [ 548.082843][T16348] dump_stack_lvl+0x169/0x1d8 [ 548.087539][T16348] ? thaw_kernel_threads+0x220/0x220 [ 548.092865][T16348] ? show_regs_print_info+0x18/0x18 [ 548.098721][T16348] dump_stack+0x15/0x1c [ 548.102923][T16348] should_fail+0x3c1/0x510 [ 548.107369][T16348] should_fail_usercopy+0x1a/0x20 [ 548.112519][T16348] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 548.118625][T16348] generic_perform_write+0x326/0x510 [ 548.123952][T16348] ? atime_needs_update+0x5b0/0x5b0 [ 548.129189][T16348] ? grab_cache_page_write_begin+0xb0/0xb0 [ 548.135162][T16348] ? file_remove_privs+0x580/0x580 [ 548.140303][T16348] ? __fsnotify_parent+0x5f5/0x6c0 [ 548.145456][T16348] ? __kasan_check_write+0x14/0x20 [ 548.150574][T16348] ? down_write+0xac/0x110 [ 548.155003][T16348] __generic_file_write_iter+0x24b/0x480 [ 548.160635][T16348] ? generic_write_checks+0x3d4/0x480 [ 548.166020][T16348] generic_file_write_iter+0xa9/0x1d0 [ 548.171490][T16348] vfs_write+0x725/0xd60 [ 548.175725][T16348] ? __kasan_slab_free+0x11/0x20 [ 548.180853][T16348] ? kernel_write+0x3c0/0x3c0 [ 548.185527][T16348] ? mutex_trylock+0xa0/0xa0 [ 548.190120][T16348] ? __fget_files+0x2c4/0x320 [ 548.194800][T16348] ? __fdget_pos+0x2d2/0x380 [ 548.199409][T16348] ? ksys_write+0x71/0x240 [ 548.203915][T16348] ksys_write+0x140/0x240 [ 548.208421][T16348] ? __ia32_sys_read+0x90/0x90 [ 548.213194][T16348] ? fpu__clear_all+0x20/0x20 [ 548.217875][T16348] __x64_sys_write+0x7b/0x90 [ 548.222730][T16348] do_syscall_64+0x31/0x40 [ 548.227149][T16348] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 548.233225][T16348] RIP: 0033:0x7fe17a389929 [ 548.237651][T16348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 548.257433][T16348] RSP: 002b:00007fe1789f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 548.266057][T16348] RAX: ffffffffffffffda RBX: 00007fe17a5b0fa0 RCX: 00007fe17a389929 [ 548.274572][T16348] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 548.283263][T16348] RBP: 00007fe1789f2090 R08: 0000000000000000 R09: 0000000000000000 [ 548.291359][T16348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 548.299426][T16348] R13: 0000000000000000 R14: 00007fe17a5b0fa0 R15: 00007ffd2c3d2cd8 [ 548.874381][T16362] device veth0_vlan left promiscuous mode [ 548.916637][T16362] device veth0_vlan entered promiscuous mode [ 549.005014][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 549.016380][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 549.030023][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 549.464973][T16382] FAULT_INJECTION: forcing a failure. [ 549.464973][T16382] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 549.478235][T16382] CPU: 0 PID: 16382 Comm: syz.2.5412 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 549.489738][T16382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 549.499806][T16382] Call Trace: [ 549.503126][T16382] __dump_stack+0x21/0x24 [ 549.507480][T16382] dump_stack_lvl+0x169/0x1d8 [ 549.512182][T16382] ? thaw_kernel_threads+0x220/0x220 [ 549.517578][T16382] ? show_regs_print_info+0x18/0x18 [ 549.523036][T16382] dump_stack+0x15/0x1c [ 549.527426][T16382] should_fail+0x3c1/0x510 [ 549.531998][T16382] should_fail_usercopy+0x1a/0x20 [ 549.537367][T16382] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 549.543480][T16382] generic_perform_write+0x326/0x510 [ 549.548829][T16382] ? atime_needs_update+0x5b0/0x5b0 [ 549.554247][T16382] ? grab_cache_page_write_begin+0xb0/0xb0 [ 549.560086][T16382] ? file_remove_privs+0x580/0x580 [ 549.565370][T16382] ? __fsnotify_parent+0x5f5/0x6c0 [ 549.570794][T16382] ? __kasan_check_write+0x14/0x20 [ 549.576126][T16382] ? down_write+0xac/0x110 [ 549.580574][T16382] __generic_file_write_iter+0x24b/0x480 [ 549.586321][T16382] ? generic_write_checks+0x3d4/0x480 [ 549.591780][T16382] generic_file_write_iter+0xa9/0x1d0 [ 549.597371][T16382] vfs_write+0x725/0xd60 [ 549.601643][T16382] ? __kasan_slab_free+0x11/0x20 [ 549.606719][T16382] ? kernel_write+0x3c0/0x3c0 [ 549.611564][T16382] ? mutex_trylock+0xa0/0xa0 [ 549.616183][T16382] ? __fget_files+0x2c4/0x320 [ 549.620885][T16382] ? __fdget_pos+0x2d2/0x380 [ 549.625512][T16382] ? ksys_write+0x71/0x240 [ 549.629940][T16382] ksys_write+0x140/0x240 [ 549.634282][T16382] ? __ia32_sys_read+0x90/0x90 [ 549.639065][T16382] ? fpu__clear_all+0x20/0x20 [ 549.643760][T16382] __x64_sys_write+0x7b/0x90 [ 549.648358][T16382] do_syscall_64+0x31/0x40 [ 549.652779][T16382] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 549.658672][T16382] RIP: 0033:0x7f99cbd34929 [ 549.663108][T16382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.682722][T16382] RSP: 002b:00007f99ca39d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 549.691221][T16382] RAX: ffffffffffffffda RBX: 00007f99cbf5bfa0 RCX: 00007f99cbd34929 [ 549.699364][T16382] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 549.707778][T16382] RBP: 00007f99ca39d090 R08: 0000000000000000 R09: 0000000000000000 [ 549.716012][T16382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 549.723980][T16382] R13: 0000000000000000 R14: 00007f99cbf5bfa0 R15: 00007ffe407a5ff8 [ 549.739689][T16386] syz.0.5413[16386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 549.739753][T16386] syz.0.5413[16386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.379711][T16397] device syzkaller0 entered promiscuous mode [ 550.765982][T16411] device veth0_vlan left promiscuous mode [ 550.794608][T16411] device veth0_vlan entered promiscuous mode [ 550.944295][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 550.977367][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 551.026165][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 552.029713][T16444] device syzkaller0 entered promiscuous mode [ 553.485720][ T24] audit: type=1400 audit(1750204586.880:170): avc: denied { create } for pid=16466 comm="syz.3.5441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 554.071422][T16486] device syzkaller0 entered promiscuous mode [ 554.262510][T16511] device veth0_vlan left promiscuous mode [ 554.331405][T16511] device veth0_vlan entered promiscuous mode [ 554.416673][T16511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 554.435013][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 554.443061][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 554.451040][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 554.688583][T16523] device veth0_to_team entered promiscuous mode [ 555.196260][T16533] device syzkaller0 entered promiscuous mode [ 555.343598][T16553] device syzkaller0 entered promiscuous mode [ 555.400215][T16555] device syzkaller0 entered promiscuous mode [ 555.632952][T16569] FAULT_INJECTION: forcing a failure. [ 555.632952][T16569] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.646411][T16569] CPU: 0 PID: 16569 Comm: syz.4.5471 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 555.658064][T16569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 555.668359][T16569] Call Trace: [ 555.671789][T16569] __dump_stack+0x21/0x24 [ 555.676161][T16569] dump_stack_lvl+0x169/0x1d8 [ 555.680879][T16569] ? thaw_kernel_threads+0x220/0x220 [ 555.686266][T16569] ? show_regs_print_info+0x18/0x18 [ 555.691519][T16569] dump_stack+0x15/0x1c [ 555.695878][T16569] should_fail+0x3c1/0x510 [ 555.700510][T16569] should_fail_usercopy+0x1a/0x20 [ 555.705675][T16569] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 555.711805][T16569] generic_perform_write+0x326/0x510 [ 555.717224][T16569] ? atime_needs_update+0x5b0/0x5b0 [ 555.722469][T16569] ? grab_cache_page_write_begin+0xb0/0xb0 [ 555.728537][T16569] ? file_remove_privs+0x580/0x580 [ 555.733690][T16569] ? __fsnotify_parent+0x5f5/0x6c0 [ 555.738857][T16569] ? __kasan_check_write+0x14/0x20 [ 555.744181][T16569] ? down_write+0xac/0x110 [ 555.748730][T16569] __generic_file_write_iter+0x24b/0x480 [ 555.754712][T16569] ? generic_write_checks+0x3d4/0x480 [ 555.760263][T16569] generic_file_write_iter+0xa9/0x1d0 [ 555.765809][T16569] vfs_write+0x725/0xd60 [ 555.770088][T16569] ? __kasan_slab_free+0x11/0x20 [ 555.775065][T16569] ? kernel_write+0x3c0/0x3c0 [ 555.779782][T16569] ? mutex_trylock+0xa0/0xa0 [ 555.784418][T16569] ? __fget_files+0x2c4/0x320 [ 555.789142][T16569] ? __fdget_pos+0x2d2/0x380 [ 555.793857][T16569] ? ksys_write+0x71/0x240 [ 555.798401][T16569] ksys_write+0x140/0x240 [ 555.802764][T16569] ? __ia32_sys_read+0x90/0x90 [ 555.807641][T16569] ? fpu__clear_all+0x20/0x20 [ 555.812356][T16569] __x64_sys_write+0x7b/0x90 [ 555.817055][T16569] do_syscall_64+0x31/0x40 [ 555.821788][T16569] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 555.828214][T16569] RIP: 0033:0x7fe17a389929 [ 555.832751][T16569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.853209][T16569] RSP: 002b:00007fe1789f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 555.861772][T16569] RAX: ffffffffffffffda RBX: 00007fe17a5b0fa0 RCX: 00007fe17a389929 [ 555.870818][T16569] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 555.880260][T16569] RBP: 00007fe1789f2090 R08: 0000000000000000 R09: 0000000000000000 [ 555.889051][T16569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 555.897161][T16569] R13: 0000000000000000 R14: 00007fe17a5b0fa0 R15: 00007ffd2c3d2cd8 [ 555.940776][T16567] device syzkaller0 entered promiscuous mode [ 556.316891][T16586] device syzkaller0 entered promiscuous mode [ 556.591728][T16607] FAULT_INJECTION: forcing a failure. [ 556.591728][T16607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 556.605037][T16607] CPU: 0 PID: 16607 Comm: syz.1.5483 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 556.616591][T16607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 556.626864][T16607] Call Trace: [ 556.630381][T16607] __dump_stack+0x21/0x24 [ 556.634814][T16607] dump_stack_lvl+0x169/0x1d8 [ 556.639954][T16607] ? thaw_kernel_threads+0x220/0x220 [ 556.645333][T16607] ? show_regs_print_info+0x18/0x18 [ 556.650675][T16607] dump_stack+0x15/0x1c [ 556.654840][T16607] should_fail+0x3c1/0x510 [ 556.659496][T16607] should_fail_usercopy+0x1a/0x20 [ 556.664806][T16607] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 556.671017][T16607] generic_perform_write+0x326/0x510 [ 556.676333][T16607] ? atime_needs_update+0x5b0/0x5b0 [ 556.681653][T16607] ? grab_cache_page_write_begin+0xb0/0xb0 [ 556.687469][T16607] ? file_remove_privs+0x580/0x580 [ 556.692618][T16607] ? __fsnotify_parent+0x5f5/0x6c0 [ 556.697825][T16607] ? __kasan_check_write+0x14/0x20 [ 556.702968][T16607] ? down_write+0xac/0x110 [ 556.707910][T16607] __generic_file_write_iter+0x24b/0x480 [ 556.713959][T16607] ? generic_write_checks+0x3d4/0x480 [ 556.719359][T16607] generic_file_write_iter+0xa9/0x1d0 [ 556.724955][T16607] vfs_write+0x725/0xd60 [ 556.729510][T16607] ? __kasan_slab_free+0x11/0x20 [ 556.735147][T16607] ? kernel_write+0x3c0/0x3c0 [ 556.739838][T16607] ? mutex_trylock+0xa0/0xa0 [ 556.744440][T16607] ? __fget_files+0x2c4/0x320 [ 556.749161][T16607] ? __fdget_pos+0x2d2/0x380 [ 556.753887][T16607] ? ksys_write+0x71/0x240 [ 556.758537][T16607] ksys_write+0x140/0x240 [ 556.762908][T16607] ? __ia32_sys_read+0x90/0x90 [ 556.767974][T16607] ? fpu__clear_all+0x20/0x20 [ 556.772675][T16607] __x64_sys_write+0x7b/0x90 [ 556.777283][T16607] do_syscall_64+0x31/0x40 [ 556.781814][T16607] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 556.787704][T16607] RIP: 0033:0x7feb3023f929 [ 556.792125][T16607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 556.811750][T16607] RSP: 002b:00007feb2e8a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 556.820318][T16607] RAX: ffffffffffffffda RBX: 00007feb30466fa0 RCX: 00007feb3023f929 [ 556.828642][T16607] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 556.836735][T16607] RBP: 00007feb2e8a8090 R08: 0000000000000000 R09: 0000000000000000 [ 556.844804][T16607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 556.852796][T16607] R13: 0000000000000000 R14: 00007feb30466fa0 R15: 00007ffdf2003088 [ 557.698264][T16640] device syzkaller0 entered promiscuous mode [ 557.965164][T16639] device syzkaller0 entered promiscuous mode [ 558.422638][T16651] device pim6reg1 entered promiscuous mode [ 559.714066][T16696] device syzkaller0 entered promiscuous mode [ 560.061227][T16702] device sit0 entered promiscuous mode [ 560.316351][T16710] FAULT_INJECTION: forcing a failure. [ 560.316351][T16710] name failslab, interval 1, probability 0, space 0, times 0 [ 560.328998][T16710] CPU: 0 PID: 16710 Comm: syz.3.5514 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 560.340471][T16710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 560.350563][T16710] Call Trace: [ 560.354051][T16710] __dump_stack+0x21/0x24 [ 560.358401][T16710] dump_stack_lvl+0x169/0x1d8 [ 560.363091][T16710] ? show_regs_print_info+0x18/0x18 [ 560.368307][T16710] dump_stack+0x15/0x1c [ 560.372479][T16710] should_fail+0x3c1/0x510 [ 560.376924][T16710] ? __sigqueue_alloc+0x185/0x2d0 [ 560.381975][T16710] __should_failslab+0xa4/0xe0 [ 560.386772][T16710] should_failslab+0x9/0x20 [ 560.391290][T16710] kmem_cache_alloc+0x3d/0x2e0 [ 560.396088][T16710] ? prepare_signal+0x796/0x970 [ 560.400988][T16710] __sigqueue_alloc+0x185/0x2d0 [ 560.405883][T16710] __send_signal+0x1f2/0xb80 [ 560.410599][T16710] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 560.416084][T16710] send_signal+0x479/0x5b0 [ 560.420519][T16710] force_sig_info_to_task+0x24b/0x2e0 [ 560.425912][T16710] force_sig+0xb5/0x100 [ 560.430101][T16710] ? send_sig+0x70/0x70 [ 560.434294][T16710] ? fput+0x1a/0x20 [ 560.438126][T16710] ? ksys_write+0x1eb/0x240 [ 560.442769][T16710] exc_general_protection+0xd4/0x250 [ 560.448188][T16710] ? syscall_exit_to_user_mode+0x4c/0x90 [ 560.453847][T16710] ? asm_exc_general_protection+0x8/0x30 [ 560.459592][T16710] asm_exc_general_protection+0x1e/0x30 [ 560.465161][T16710] RIP: 0033:0x7fd7eed41479 [ 560.469696][T16710] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 560.489455][T16710] RSP: 002b:00007fd7ed3d07c8 EFLAGS: 00010283 [ 560.495637][T16710] RAX: 0000000000000999 RBX: 00007fd7ed3d0d30 RCX: 00007fd7eef4f120 [ 560.503868][T16710] RDX: 9999999999999999 RSI: 00007fd7eedea83c RDI: 9999999999999999 [ 560.512417][T16710] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 560.520419][T16710] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 560.528530][T16710] R13: 00007fd7ed3d0eb0 R14: 9999999999999999 R15: 0000000000000000 [ 560.645123][T16717] FAULT_INJECTION: forcing a failure. [ 560.645123][T16717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 560.658569][T16717] CPU: 0 PID: 16717 Comm: syz.1.5517 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 560.669951][T16717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 560.680113][T16717] Call Trace: [ 560.683521][T16717] __dump_stack+0x21/0x24 [ 560.687877][T16717] dump_stack_lvl+0x169/0x1d8 [ 560.692570][T16717] ? thaw_kernel_threads+0x220/0x220 [ 560.698052][T16717] ? show_regs_print_info+0x18/0x18 [ 560.703398][T16717] dump_stack+0x15/0x1c [ 560.707590][T16717] should_fail+0x3c1/0x510 [ 560.712037][T16717] should_fail_usercopy+0x1a/0x20 [ 560.717352][T16717] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 560.723483][T16717] generic_perform_write+0x326/0x510 [ 560.728803][T16717] ? atime_needs_update+0x5b0/0x5b0 [ 560.734234][T16717] ? grab_cache_page_write_begin+0xb0/0xb0 [ 560.740138][T16717] ? file_remove_privs+0x580/0x580 [ 560.745285][T16717] ? __fsnotify_parent+0x5f5/0x6c0 [ 560.750429][T16717] ? __kasan_check_write+0x14/0x20 [ 560.755567][T16717] ? down_write+0xac/0x110 [ 560.760028][T16717] __generic_file_write_iter+0x24b/0x480 [ 560.765691][T16717] ? generic_write_checks+0x3d4/0x480 [ 560.771216][T16717] generic_file_write_iter+0xa9/0x1d0 [ 560.776714][T16717] vfs_write+0x725/0xd60 [ 560.781004][T16717] ? kernel_write+0x3c0/0x3c0 [ 560.785756][T16717] ? mutex_trylock+0xa0/0xa0 [ 560.790399][T16717] ? __fget_files+0x2c4/0x320 [ 560.795224][T16717] ? __fdget_pos+0x2d2/0x380 [ 560.799944][T16717] ? ksys_write+0x71/0x240 [ 560.804492][T16717] ksys_write+0x140/0x240 [ 560.808852][T16717] ? __ia32_sys_read+0x90/0x90 [ 560.813748][T16717] ? fpu__clear_all+0x20/0x20 [ 560.818473][T16717] __x64_sys_write+0x7b/0x90 [ 560.823098][T16717] do_syscall_64+0x31/0x40 [ 560.827644][T16717] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 560.833570][T16717] RIP: 0033:0x7feb3023f929 [ 560.838018][T16717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 560.857754][T16717] RSP: 002b:00007feb2e8a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 560.866188][T16717] RAX: ffffffffffffffda RBX: 00007feb30466fa0 RCX: 00007feb3023f929 [ 560.874441][T16717] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 560.882514][T16717] RBP: 00007feb2e8a8090 R08: 0000000000000000 R09: 0000000000000000 [ 560.890502][T16717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 560.898495][T16717] R13: 0000000000000000 R14: 00007feb30466fa0 R15: 00007ffdf2003088 [ 561.305978][T16733] device syzkaller0 entered promiscuous mode [ 561.626219][T16754] FAULT_INJECTION: forcing a failure. [ 561.626219][T16754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 561.639619][T16754] CPU: 0 PID: 16754 Comm: syz.1.5531 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 561.651004][T16754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 561.661257][T16754] Call Trace: [ 561.664590][T16754] __dump_stack+0x21/0x24 [ 561.668940][T16754] dump_stack_lvl+0x169/0x1d8 [ 561.673803][T16754] ? thaw_kernel_threads+0x220/0x220 [ 561.679109][T16754] ? show_regs_print_info+0x18/0x18 [ 561.684329][T16754] dump_stack+0x15/0x1c [ 561.688511][T16754] should_fail+0x3c1/0x510 [ 561.693038][T16754] should_fail_usercopy+0x1a/0x20 [ 561.698200][T16754] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 561.704302][T16754] generic_perform_write+0x326/0x510 [ 561.709636][T16754] ? grab_cache_page_write_begin+0xb0/0xb0 [ 561.715684][T16754] ? file_remove_privs+0x580/0x580 [ 561.720834][T16754] ? __fsnotify_parent+0x5f5/0x6c0 [ 561.725950][T16754] ? __kasan_check_write+0x14/0x20 [ 561.731085][T16754] ? down_write+0xac/0x110 [ 561.735527][T16754] __generic_file_write_iter+0x24b/0x480 [ 561.741320][T16754] ? generic_write_checks+0x3d4/0x480 [ 561.746705][T16754] generic_file_write_iter+0xa9/0x1d0 [ 561.752095][T16754] vfs_write+0x725/0xd60 [ 561.756829][T16754] ? __kasan_slab_free+0x11/0x20 [ 561.761794][T16754] ? kernel_write+0x3c0/0x3c0 [ 561.766501][T16754] ? mutex_trylock+0xa0/0xa0 [ 561.771117][T16754] ? __fget_files+0x2c4/0x320 [ 561.775814][T16754] ? __fdget_pos+0x2d2/0x380 [ 561.780410][T16754] ? ksys_write+0x71/0x240 [ 561.784917][T16754] ksys_write+0x140/0x240 [ 561.789251][T16754] ? __ia32_sys_read+0x90/0x90 [ 561.794020][T16754] ? fpu__clear_all+0x20/0x20 [ 561.798999][T16754] __x64_sys_write+0x7b/0x90 [ 561.803702][T16754] do_syscall_64+0x31/0x40 [ 561.808118][T16754] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 561.814012][T16754] RIP: 0033:0x7feb3023f929 [ 561.818432][T16754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 561.838677][T16754] RSP: 002b:00007feb2e8a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 561.847141][T16754] RAX: ffffffffffffffda RBX: 00007feb30466fa0 RCX: 00007feb3023f929 [ 561.855116][T16754] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 561.863092][T16754] RBP: 00007feb2e8a8090 R08: 0000000000000000 R09: 0000000000000000 [ 561.871157][T16754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 561.879237][T16754] R13: 0000000000000000 R14: 00007feb30466fa0 R15: 00007ffdf2003088 [ 562.433260][T16769] device syzkaller0 entered promiscuous mode [ 563.147895][T16789] device wg2 left promiscuous mode [ 563.171340][T16790] device wg2 entered promiscuous mode [ 563.216842][T16789] device wg2 left promiscuous mode [ 564.563156][T16875] device syzkaller0 entered promiscuous mode [ 565.180210][T16900] device syzkaller0 entered promiscuous mode [ 565.316494][T16927] device veth0_vlan left promiscuous mode [ 565.328766][T16927] device veth0_vlan entered promiscuous mode [ 565.463068][T16937] device syzkaller0 entered promiscuous mode [ 566.303946][T16947] device syzkaller0 entered promiscuous mode [ 566.311242][T16944] device pim6reg1 entered promiscuous mode [ 566.627098][T16958] device veth0_vlan left promiscuous mode [ 566.645019][T16958] device veth0_vlan entered promiscuous mode [ 566.667647][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 566.702173][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 566.736984][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 566.762108][T16968] device veth0_vlan left promiscuous mode [ 566.784691][T16968] device veth0_vlan entered promiscuous mode [ 566.862104][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 566.888899][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 566.913180][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 567.201184][T16990] device veth0_vlan left promiscuous mode [ 567.222868][T16990] device veth0_vlan entered promiscuous mode [ 567.456857][T17001] FAULT_INJECTION: forcing a failure. [ 567.456857][T17001] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 567.542008][T17001] CPU: 0 PID: 17001 Comm: syz.0.5606 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 567.553543][T17001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 567.563793][T17001] Call Trace: [ 567.567302][T17001] __dump_stack+0x21/0x24 [ 567.571651][T17001] dump_stack_lvl+0x169/0x1d8 [ 567.576570][T17001] ? show_regs_print_info+0x18/0x18 [ 567.581804][T17001] dump_stack+0x15/0x1c [ 567.585987][T17001] should_fail+0x3c1/0x510 [ 567.590552][T17001] should_fail_usercopy+0x1a/0x20 [ 567.595605][T17001] _copy_from_user+0x20/0xd0 [ 567.600229][T17001] iovec_from_user+0x1bc/0x2f0 [ 567.605008][T17001] ? kstrtouint_from_user+0x1a0/0x200 [ 567.610428][T17001] __import_iovec+0x71/0x390 [ 567.615053][T17001] ? memset+0x35/0x40 [ 567.619148][T17001] import_iovec+0x7c/0xb0 [ 567.623501][T17001] ___sys_recvmsg+0x420/0x4f0 [ 567.628251][T17001] ? __sys_recvmsg+0x250/0x250 [ 567.633045][T17001] ? __fdget+0x1a1/0x230 [ 567.637325][T17001] __x64_sys_recvmsg+0x1dd/0x2a0 [ 567.642289][T17001] ? fput+0x1a/0x20 [ 567.646121][T17001] ? ___sys_recvmsg+0x4f0/0x4f0 [ 567.651000][T17001] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 567.657177][T17001] do_syscall_64+0x31/0x40 [ 567.661615][T17001] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 567.667524][T17001] RIP: 0033:0x7f404d380929 [ 567.671984][T17001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 567.691846][T17001] RSP: 002b:00007f404b9e9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 567.700457][T17001] RAX: ffffffffffffffda RBX: 00007f404d5a7fa0 RCX: 00007f404d380929 [ 567.708669][T17001] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000003 [ 567.716666][T17001] RBP: 00007f404b9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 567.724782][T17001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 567.732880][T17001] R13: 0000000000000000 R14: 00007f404d5a7fa0 R15: 00007ffc83e16398 [ 567.742589][T17000] device syzkaller0 entered promiscuous mode [ 568.196838][T17029] FAULT_INJECTION: forcing a failure. [ 568.196838][T17029] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 568.210131][T17029] CPU: 0 PID: 17029 Comm: syz.3.5613 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 568.221787][T17029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 568.231863][T17029] Call Trace: [ 568.235279][T17029] __dump_stack+0x21/0x24 [ 568.239699][T17029] dump_stack_lvl+0x169/0x1d8 [ 568.244384][T17029] ? thaw_kernel_threads+0x220/0x220 [ 568.250014][T17029] ? show_regs_print_info+0x18/0x18 [ 568.255505][T17029] dump_stack+0x15/0x1c [ 568.260122][T17029] should_fail+0x3c1/0x510 [ 568.265407][T17029] should_fail_usercopy+0x1a/0x20 [ 568.271773][T17029] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 568.278066][T17029] generic_perform_write+0x326/0x510 [ 568.283445][T17029] ? grab_cache_page_write_begin+0xb0/0xb0 [ 568.289261][T17029] ? file_remove_privs+0x580/0x580 [ 568.294915][T17029] ? __fsnotify_parent+0x5f5/0x6c0 [ 568.300138][T17029] ? __kasan_check_write+0x14/0x20 [ 568.305273][T17029] ? down_write+0xac/0x110 [ 568.309704][T17029] __generic_file_write_iter+0x24b/0x480 [ 568.315342][T17029] ? generic_write_checks+0x3d4/0x480 [ 568.320725][T17029] generic_file_write_iter+0xa9/0x1d0 [ 568.326221][T17029] vfs_write+0x725/0xd60 [ 568.331159][T17029] ? __kasan_slab_free+0x11/0x20 [ 568.336194][T17029] ? kernel_write+0x3c0/0x3c0 [ 568.340971][T17029] ? mutex_trylock+0xa0/0xa0 [ 568.345652][T17029] ? __fget_files+0x2c4/0x320 [ 568.350438][T17029] ? __fdget_pos+0x2d2/0x380 [ 568.355076][T17029] ? ksys_write+0x71/0x240 [ 568.359585][T17029] ksys_write+0x140/0x240 [ 568.364012][T17029] ? __ia32_sys_read+0x90/0x90 [ 568.368873][T17029] ? fpu__clear_all+0x20/0x20 [ 568.373724][T17029] __x64_sys_write+0x7b/0x90 [ 568.378394][T17029] do_syscall_64+0x31/0x40 [ 568.382911][T17029] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 568.388883][T17029] RIP: 0033:0x7fd7eed68929 [ 568.393394][T17029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 568.413485][T17029] RSP: 002b:00007fd7ed3d1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 568.421954][T17029] RAX: ffffffffffffffda RBX: 00007fd7eef8ffa0 RCX: 00007fd7eed68929 [ 568.430082][T17029] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000008 [ 568.438061][T17029] RBP: 00007fd7ed3d1090 R08: 0000000000000000 R09: 0000000000000000 [ 568.446032][T17029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 568.454511][T17029] R13: 0000000000000000 R14: 00007fd7eef8ffa0 R15: 00007ffd628a5f48 [ 568.584514][T17033] device veth0_vlan left promiscuous mode [ 568.613552][T17033] device veth0_vlan entered promiscuous mode [ 568.659737][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 568.690653][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 568.757029][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 569.192468][T17043] device syzkaller0 entered promiscuous mode [ 569.540208][T17060] FAULT_INJECTION: forcing a failure. [ 569.540208][T17060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 569.549029][T17064] device syzkaller0 entered promiscuous mode [ 569.586674][T17060] CPU: 1 PID: 17060 Comm: syz.2.5623 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 569.598316][T17060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 569.608495][T17060] Call Trace: [ 569.611822][T17060] __dump_stack+0x21/0x24 [ 569.616172][T17060] dump_stack_lvl+0x169/0x1d8 [ 569.620878][T17060] ? show_regs_print_info+0x18/0x18 [ 569.626108][T17060] ? _raw_spin_lock_bh+0x8e/0xe0 [ 569.631277][T17060] ? _raw_spin_lock_irq+0xe0/0xe0 [ 569.636345][T17060] dump_stack+0x15/0x1c [ 569.640512][T17060] should_fail+0x3c1/0x510 [ 569.644957][T17060] should_fail_usercopy+0x1a/0x20 [ 569.650029][T17060] _copy_to_user+0x20/0x90 [ 569.654638][T17060] put_cmsg+0x23e/0x4c0 [ 569.659131][T17060] ? __scm_send+0x1250/0x1250 [ 569.663922][T17060] ? tipc_wait_for_rcvmsg+0x49c/0x5e0 [ 569.669422][T17060] tipc_sk_anc_data_recv+0x3cc/0x680 [ 569.674733][T17060] ? tipc_wait_for_rcvmsg+0x5e0/0x5e0 [ 569.680124][T17060] ? stack_trace_save+0xe0/0xe0 [ 569.685017][T17060] tipc_recvmsg+0x6e0/0x13a0 [ 569.689655][T17060] ? tipc_send_packet+0xa0/0xa0 [ 569.694535][T17060] ? security_socket_recvmsg+0x87/0xb0 [ 569.700017][T17060] ? tipc_send_packet+0xa0/0xa0 [ 569.704883][T17060] ____sys_recvmsg+0x291/0x580 [ 569.709679][T17060] ? __sys_recvmsg_sock+0x50/0x50 [ 569.714919][T17060] ? import_iovec+0x7c/0xb0 [ 569.719464][T17060] ___sys_recvmsg+0x1af/0x4f0 [ 569.724164][T17060] ? __sys_recvmsg+0x250/0x250 [ 569.729170][T17060] ? __fdget+0x1a1/0x230 [ 569.733454][T17060] __x64_sys_recvmsg+0x1dd/0x2a0 [ 569.738417][T17060] ? fput+0x1a/0x20 [ 569.742279][T17060] ? ___sys_recvmsg+0x4f0/0x4f0 [ 569.747520][T17060] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 569.754243][T17060] do_syscall_64+0x31/0x40 [ 569.758904][T17060] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 569.764947][T17060] RIP: 0033:0x7f99cbd34929 [ 569.769413][T17060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 569.789356][T17060] RSP: 002b:00007f99ca39d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 569.797804][T17060] RAX: ffffffffffffffda RBX: 00007f99cbf5bfa0 RCX: 00007f99cbd34929 [ 569.806179][T17060] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000003 [ 569.814258][T17060] RBP: 00007f99ca39d090 R08: 0000000000000000 R09: 0000000000000000 [ 569.822258][T17060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 569.830335][T17060] R13: 0000000000000000 R14: 00007f99cbf5bfa0 R15: 00007ffe407a5ff8 [ 570.285722][T17082] tap0: tun_chr_ioctl cmd 1074025677 [ 570.292217][T17082] tap0: linktype set to 774 [ 570.383573][T17077] device syzkaller0 entered promiscuous mode [ 570.663481][T17090] device veth0_vlan left promiscuous mode [ 570.714638][T17090] device veth0_vlan entered promiscuous mode [ 572.450900][T17149] device veth0_vlan left promiscuous mode [ 572.484998][T17149] device veth0_vlan entered promiscuous mode [ 572.573110][T17158] device pim6reg1 entered promiscuous mode [ 573.052608][T17174] device syzkaller0 entered promiscuous mode [ 573.714858][T17197] FAULT_INJECTION: forcing a failure. [ 573.714858][T17197] name failslab, interval 1, probability 0, space 0, times 0 [ 573.765955][T17197] CPU: 1 PID: 17197 Comm: syz.2.5665 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 573.777377][T17197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 573.787442][T17197] Call Trace: [ 573.791033][T17197] __dump_stack+0x21/0x24 [ 573.795583][T17197] dump_stack_lvl+0x169/0x1d8 [ 573.800360][T17197] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 573.806605][T17197] ? show_regs_print_info+0x18/0x18 [ 573.811807][T17197] dump_stack+0x15/0x1c [ 573.815974][T17197] should_fail+0x3c1/0x510 [ 573.821161][T17197] ? tracepoint_add_func+0x332/0x9f0 [ 573.827220][T17197] __should_failslab+0xa4/0xe0 [ 573.832203][T17197] should_failslab+0x9/0x20 [ 573.836890][T17197] __kmalloc+0x60/0x330 [ 573.841438][T17197] ? find_next_bit+0xc9/0x100 [ 573.846418][T17197] ? cpumask_next+0x12/0x30 [ 573.851213][T17197] tracepoint_add_func+0x332/0x9f0 [ 573.856794][T17197] ? mutex_trylock+0xa0/0xa0 [ 573.861543][T17197] ? trace_event_raw_event_msr_trace_class+0x280/0x280 [ 573.869024][T17197] ? trace_event_raw_event_msr_trace_class+0x280/0x280 [ 573.876360][T17197] tracepoint_probe_register+0x5a/0x90 [ 573.882032][T17197] ? trace_event_raw_event_msr_trace_class+0x280/0x280 [ 573.888892][T17197] trace_event_reg+0x150/0x260 [ 573.893675][T17197] perf_trace_event_init+0x52d/0xa30 [ 573.899054][T17197] perf_trace_init+0x1bc/0x200 [ 573.903915][T17197] perf_tp_event_init+0x8e/0x120 [ 573.908894][T17197] perf_try_init_event+0x14a/0x430 [ 573.914122][T17197] perf_event_alloc+0xcda/0x1990 [ 573.919235][T17197] __se_sys_perf_event_open+0x6f7/0x1b10 [ 573.924887][T17197] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 573.930536][T17197] ? debug_smp_processor_id+0x17/0x20 [ 573.935913][T17197] __x64_sys_perf_event_open+0xbf/0xd0 [ 573.941390][T17197] do_syscall_64+0x31/0x40 [ 573.945992][T17197] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 573.951894][T17197] RIP: 0033:0x7f99cbd34929 [ 573.956314][T17197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 573.975942][T17197] RSP: 002b:00007f99ca39d038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 573.985271][T17197] RAX: ffffffffffffffda RBX: 00007f99cbf5bfa0 RCX: 00007f99cbd34929 [ 573.993272][T17197] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 574.001364][T17197] RBP: 00007f99ca39d090 R08: 0000000000000008 R09: 0000000000000000 [ 574.009357][T17197] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 574.017332][T17197] R13: 0000000000000000 R14: 00007f99cbf5bfa0 R15: 00007ffe407a5ff8 [ 574.694978][T17215] device syzkaller0 entered promiscuous mode [ 575.356815][T17253] device syzkaller0 entered promiscuous mode [ 576.152198][T17266] device syzkaller0 entered promiscuous mode [ 576.400629][T17276] device syzkaller0 entered promiscuous mode [ 576.450962][T17282] device syzkaller0 entered promiscuous mode [ 577.124313][T17289] device syzkaller0 entered promiscuous mode [ 577.214390][T17296] device syzkaller0 entered promiscuous mode [ 578.051243][T17311] device syzkaller0 entered promiscuous mode [ 578.376182][T17340] device syzkaller0 entered promiscuous mode [ 578.940214][T17349] device syzkaller0 entered promiscuous mode [ 579.266443][T17383] device veth0_vlan left promiscuous mode [ 579.287825][T17383] device veth0_vlan entered promiscuous mode [ 579.359646][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 579.394315][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 579.464946][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 579.617727][T17405] device veth0_vlan left promiscuous mode [ 579.645177][T17405] device veth0_vlan entered promiscuous mode [ 579.756310][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 579.774598][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 579.823272][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 580.250079][T17433] device pim6reg1 entered promiscuous mode [ 582.522523][T17480] device wg2 left promiscuous mode [ 582.958217][T17488] device syzkaller0 entered promiscuous mode [ 583.431714][T17492] device wg2 left promiscuous mode [ 583.525560][T17492] device wg2 entered promiscuous mode [ 583.605850][ T24] audit: type=1400 audit(1750204617.000:171): avc: denied { create } for pid=17495 comm="syz.3.5764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 584.058048][T17514] device syzkaller0 entered promiscuous mode [ 584.080407][T17515] device syzkaller0 entered promiscuous mode [ 584.682028][T17519] device veth0_vlan left promiscuous mode [ 584.705202][T17519] device veth0_vlan entered promiscuous mode [ 584.747372][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 584.756895][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 584.765215][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 585.603217][T17523] device syzkaller0 entered promiscuous mode [ 585.858153][T17551] syz.4.5782[17551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.858251][T17551] syz.4.5782[17551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.982643][T17556] device syzkaller0 entered promiscuous mode [ 586.398185][T17559] tap0: tun_chr_ioctl cmd 1074025677 [ 586.403801][T17559] tap0: linktype set to 773 [ 586.668776][T17571] device veth0_vlan left promiscuous mode [ 586.751721][T17571] device veth0_vlan entered promiscuous mode [ 586.973230][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 586.996228][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 587.003562][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 587.108777][T17584] device syzkaller0 entered promiscuous mode [ 587.486797][T17593] device dummy0 entered promiscuous mode [ 587.636238][T17601] syz.3.5797[17601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.636351][T17601] syz.3.5797[17601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.804841][T17596] device syzkaller0 entered promiscuous mode [ 588.534145][T17616] device syzkaller0 entered promiscuous mode [ 588.689697][T17618] device syzkaller0 entered promiscuous mode [ 589.173895][T17635] device syzkaller0 entered promiscuous mode [ 589.814052][T17652] device syzkaller0 entered promiscuous mode [ 589.851989][T17656] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 589.858174][T17656] pim6reg0: linktype set to 769 [ 590.312309][T17665] device syzkaller0 entered promiscuous mode [ 590.559964][T17668] device sit0 left promiscuous mode [ 590.676572][T17671] device sit0 entered promiscuous mode [ 591.141944][T17698] device veth0_vlan left promiscuous mode [ 591.160231][T17698] device veth0_vlan entered promiscuous mode [ 591.180556][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 591.194500][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 591.246299][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 591.505193][T17699] bridge0: port 1(bridge_slave_0) entered blocking state [ 591.524395][T17699] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.532419][T17699] device bridge_slave_0 entered promiscuous mode [ 591.592692][T17710] device sit0 left promiscuous mode [ 591.856891][T17718] device sit0 entered promiscuous mode [ 591.868830][T17699] bridge0: port 2(bridge_slave_1) entered blocking state [ 591.876026][T17699] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.883602][T17699] device bridge_slave_1 entered promiscuous mode [ 591.931427][T17726] device pim6reg1 entered promiscuous mode [ 592.376600][T17742] device syzkaller0 entered promiscuous mode [ 592.694727][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 592.703443][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 592.727272][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 592.742408][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 592.774932][T10304] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.782266][T10304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 592.850169][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 592.869770][T17762] device syzkaller0 entered promiscuous mode [ 592.881754][T17763] device wg2 entered promiscuous mode [ 592.936582][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 592.945394][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 592.960111][T10304] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.967336][T10304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 592.975680][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 592.984592][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 593.074277][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 593.116154][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 593.205178][T17775] device sit0 left promiscuous mode [ 593.217414][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 593.241598][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 593.304592][T17775] device sit0 entered promiscuous mode [ 593.869606][T17699] device veth0_vlan entered promiscuous mode [ 593.878553][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 593.890031][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 593.910570][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 593.919721][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 593.928012][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 593.937292][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 593.957426][T17699] device veth1_macvtap entered promiscuous mode [ 594.026802][ T49] device erspan0 left promiscuous mode [ 594.077255][ T49] GPL: port 1(erspan0) entered disabled state [ 594.126996][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 594.144206][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 594.204387][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 594.251096][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 594.260243][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 594.464474][T17791] device syzkaller0 entered promiscuous mode [ 595.182762][ T49] device veth0_vlan left promiscuous mode [ 595.922273][T17824] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.929880][T17824] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.938282][T17824] device bridge_slave_0 entered promiscuous mode [ 595.966394][T17824] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.973485][T17824] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.982539][T17824] device bridge_slave_1 entered promiscuous mode [ 596.305434][T17841] device pim6reg1 entered promiscuous mode [ 596.362048][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 596.370203][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 596.388441][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 596.398467][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 596.407445][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.414507][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 596.422454][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 596.431273][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 596.440025][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.447105][ T349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 596.454688][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 596.477442][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 596.486019][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 596.500748][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 596.517089][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 596.526332][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 596.534056][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 596.545379][T17824] device veth0_vlan entered promiscuous mode [ 596.561122][T17824] device veth1_macvtap entered promiscuous mode [ 596.575450][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 596.591849][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 596.602795][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 596.886898][T17860] device syzkaller0 entered promiscuous mode [ 597.077029][ T49] device veth1_macvtap left promiscuous mode [ 597.086370][ T49] device veth0_vlan left promiscuous mode [ 597.450141][T17889] device wg2 entered promiscuous mode [ 597.471064][T17890] device syzkaller0 entered promiscuous mode [ 597.860949][T17901] device syzkaller0 entered promiscuous mode [ 598.248057][T17918] device veth0_vlan left promiscuous mode [ 598.264670][T17918] device veth0_vlan entered promiscuous mode [ 598.404672][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 598.418598][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 598.426401][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 599.331174][T17943] device syzkaller0 entered promiscuous mode [ 599.376313][T17940] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 599.925119][T17960] device veth0_vlan left promiscuous mode [ 599.949396][T17960] device veth0_vlan entered promiscuous mode [ 600.008922][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 600.018847][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 600.027168][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 600.041665][T17968] device pim6reg1 entered promiscuous mode [ 600.124568][T17972] device veth0_vlan left promiscuous mode [ 600.172788][T17972] device veth0_vlan entered promiscuous mode [ 600.315678][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 600.337044][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 600.381296][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 600.587703][T17992] device syzkaller0 entered promiscuous mode [ 601.162901][T18003] device syzkaller0 entered promiscuous mode [ 601.375948][T18014] device sit0 entered promiscuous mode [ 601.927995][T18031] device veth0_vlan left promiscuous mode [ 602.017900][T18031] device veth0_vlan entered promiscuous mode [ 602.413125][T18032] device syzkaller0 entered promiscuous mode [ 604.198466][T18080] device syzkaller0 entered promiscuous mode [ 604.549024][T18087] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 604.574839][T18087] device syzkaller0 entered promiscuous mode [ 604.657227][T18100] device syzkaller0 entered promiscuous mode [ 604.716428][T18106] device syzkaller0 entered promiscuous mode [ 605.864994][T18149] device veth0_vlan left promiscuous mode [ 605.982530][T18149] device veth0_vlan entered promiscuous mode [ 606.252253][T18158] device syzkaller0 entered promiscuous mode [ 607.137167][T18170] device syzkaller0 entered promiscuous mode [ 607.356721][T18181] device syzkaller0 entered promiscuous mode [ 608.399689][T18207] device pim6reg1 entered promiscuous mode [ 609.007302][T18228] device sit0 left promiscuous mode [ 609.192179][T18255] device sit0 entered promiscuous mode [ 609.542847][T18284] tap0: tun_chr_ioctl cmd 2147767511 [ 609.633009][T18298] device veth0_vlan left promiscuous mode [ 609.661185][T18298] device veth0_vlan entered promiscuous mode [ 609.716889][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.726916][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 609.735182][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 609.829421][T18299] device syzkaller0 entered promiscuous mode [ 610.316281][T18317] tap0: tun_chr_ioctl cmd 1074025677 [ 610.322271][T18317] tap0: linktype set to 773 [ 610.905359][T18335] device syzkaller0 entered promiscuous mode [ 611.423466][T18340] device syzkaller0 entered promiscuous mode [ 611.808669][T18345] device syzkaller0 entered promiscuous mode [ 612.162163][T18350] device sit0 left promiscuous mode [ 612.397147][T18359] device syzkaller0 entered promiscuous mode [ 613.239488][T18385] device syzkaller0 entered promiscuous mode [ 613.297989][T18382] device sit0 left promiscuous mode [ 613.556186][T18388] device sit0 entered promiscuous mode [ 613.973332][T18400] device pim6reg1 entered promiscuous mode [ 614.131892][T18409] device syzkaller0 entered promiscuous mode [ 615.637497][T18451] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.644612][T18451] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.786930][T18451] device bridge_slave_0 entered promiscuous mode [ 615.868392][T18451] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.906360][T18451] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.010869][T18451] device bridge_slave_1 entered promiscuous mode [ 616.442125][T18487] device syzkaller0 entered promiscuous mode [ 616.625722][T18494] device pim6reg1 entered promiscuous mode [ 616.738091][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 616.746589][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 616.768317][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 616.778482][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 616.788928][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.796315][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 616.813140][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 616.823091][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 616.836207][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 616.847375][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.854475][ T349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 616.903366][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 616.923430][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 616.950767][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 616.960949][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 617.024840][T18451] device veth0_vlan entered promiscuous mode [ 617.050586][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 617.106121][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 617.176250][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 617.186468][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 617.269488][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 617.277931][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 617.786463][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 617.795346][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 617.805800][T18451] device veth1_macvtap entered promiscuous mode [ 617.819725][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 617.828744][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 617.837472][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 617.861164][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 617.870409][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 618.154148][T18530] device syzkaller0 entered promiscuous mode [ 618.566360][ T49] device veth1 left promiscuous mode [ 618.571827][ T49] kfree: port 1(veth1) entered disabled state [ 618.643667][ T49] device bridge_slave_1 left promiscuous mode [ 618.655743][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.673890][ T49] device bridge_slave_0 left promiscuous mode [ 618.683584][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.407031][T18541] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.414219][T18541] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.423888][T18541] device bridge_slave_0 entered promiscuous mode [ 619.461723][T18541] bridge0: port 2(bridge_slave_1) entered blocking state [ 619.476670][T18541] bridge0: port 2(bridge_slave_1) entered disabled state [ 619.484852][T18541] device bridge_slave_1 entered promiscuous mode [ 620.095107][T18556] tun0: tun_chr_ioctl cmd 1074812118 [ 620.617037][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 620.625219][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 620.749208][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 620.806596][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 620.824512][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 620.831653][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 620.925759][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 620.935428][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 620.945463][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 620.953080][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 620.965965][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 620.989097][T18574] device veth0_vlan left promiscuous mode [ 621.024554][T18574] device veth0_vlan entered promiscuous mode [ 621.075014][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 621.096064][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 621.113102][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 621.121924][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 621.135936][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 621.156156][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 621.164543][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 621.266283][T18580] device syzkaller0 entered promiscuous mode [ 621.331276][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 621.346433][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 621.407096][T18541] device veth0_vlan entered promiscuous mode [ 621.416468][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 621.424954][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 621.446495][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 621.466117][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 621.501830][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 621.516015][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 621.540452][ T49] device veth0_vlan left promiscuous mode [ 621.652371][T18541] device veth1_macvtap entered promiscuous mode [ 621.667467][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 621.770381][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 621.795423][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 621.826170][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 621.835909][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 622.219914][T18609] device veth0_vlan left promiscuous mode [ 622.241466][T18609] device veth0_vlan entered promiscuous mode [ 622.465351][T18617] device veth1_macvtap left promiscuous mode [ 622.681392][T18619] device veth1_macvtap entered promiscuous mode [ 622.737348][T18619] device macsec0 entered promiscuous mode [ 623.365324][ T24] audit: type=1400 audit(1750204656.760:172): avc: denied { create } for pid=18636 comm="syz.4.6092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 624.379164][T18667] device veth0_vlan left promiscuous mode [ 624.413014][T18667] device veth0_vlan entered promiscuous mode [ 624.584400][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 624.637000][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 624.659095][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 624.931884][T18676] device veth0_vlan left promiscuous mode [ 624.958964][T18676] device veth0_vlan entered promiscuous mode [ 625.036418][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 625.065130][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 625.087302][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 626.555961][T18760] device pim6reg1 entered promiscuous mode [ 627.349030][T18774] device syzkaller0 entered promiscuous mode [ 627.751791][T18784] syz.4.6139[18784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 627.751859][T18784] syz.4.6139[18784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 627.774194][T18782] device syzkaller0 entered promiscuous mode [ 628.050177][T18786] device veth0_vlan left promiscuous mode [ 628.069077][T18786] device veth0_vlan entered promiscuous mode [ 628.129557][T18790] €Â0: renamed from pim6reg1 [ 628.142693][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 628.161277][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 628.173745][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 628.831820][T18807] device veth0_vlan left promiscuous mode [ 628.896711][T18807] device veth0_vlan entered promiscuous mode [ 628.944556][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 628.960269][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 628.969434][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 629.923876][T18825] device syzkaller0 entered promiscuous mode [ 630.626145][T18856] device syzkaller0 entered promiscuous mode [ 632.983773][T18890] device syzkaller0 entered promiscuous mode [ 633.687939][T18929] device veth1_macvtap left promiscuous mode [ 633.694355][T18929] device macsec0 entered promiscuous mode [ 633.716495][T18929] device veth1_macvtap entered promiscuous mode [ 633.769072][T18929] device veth1_macvtap left promiscuous mode [ 634.203220][T18935] device syzkaller0 entered promiscuous mode [ 634.441559][T18948] device pim6reg1 entered promiscuous mode [ 634.764703][T18958] device syzkaller0 entered promiscuous mode [ 634.965426][T18962] device sit0 entered promiscuous mode [ 634.996541][T18974] FAULT_INJECTION: forcing a failure. [ 634.996541][T18974] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 635.011077][T18974] CPU: 1 PID: 18974 Comm: syz.4.6201 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 635.022481][T18974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 635.033021][T18974] Call Trace: [ 635.036342][T18974] __dump_stack+0x21/0x24 [ 635.040826][T18974] dump_stack_lvl+0x169/0x1d8 [ 635.045552][T18974] ? thaw_kernel_threads+0x220/0x220 [ 635.050861][T18974] ? vsnprintf+0x1871/0x1960 [ 635.055568][T18974] ? show_regs_print_info+0x18/0x18 [ 635.060800][T18974] dump_stack+0x15/0x1c [ 635.064977][T18974] should_fail+0x3c1/0x510 [ 635.069519][T18974] should_fail_usercopy+0x1a/0x20 [ 635.074759][T18974] _copy_to_user+0x20/0x90 [ 635.079281][T18974] simple_read_from_buffer+0xe9/0x160 [ 635.084661][T18974] proc_fail_nth_read+0x19a/0x210 [ 635.089712][T18974] ? proc_fault_inject_write+0x2f0/0x2f0 [ 635.095464][T18974] ? rw_verify_area+0x1c0/0x360 [ 635.100849][T18974] ? proc_fault_inject_write+0x2f0/0x2f0 [ 635.106692][T18974] vfs_read+0x1fe/0xa10 [ 635.111320][T18974] ? __sanitizer_cov_trace_switch+0x36/0xe0 [ 635.117222][T18974] ? kernel_read+0x70/0x70 [ 635.121679][T18974] ? __kasan_check_write+0x14/0x20 [ 635.126905][T18974] ? mutex_lock+0x8c/0xe0 [ 635.131241][T18974] ? mutex_trylock+0xa0/0xa0 [ 635.135831][T18974] ? __fget_files+0x2c4/0x320 [ 635.140511][T18974] ? __fdget_pos+0x2d2/0x380 [ 635.145101][T18974] ? ksys_read+0x71/0x240 [ 635.149428][T18974] ksys_read+0x140/0x240 [ 635.153756][T18974] ? vfs_write+0xd60/0xd60 [ 635.158175][T18974] ? __bpf_trace_sys_enter+0x62/0x70 [ 635.163458][T18974] __x64_sys_read+0x7b/0x90 [ 635.167965][T18974] do_syscall_64+0x31/0x40 [ 635.172384][T18974] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 635.178574][T18974] RIP: 0033:0x7f253983133c [ 635.183029][T18974] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 635.203084][T18974] RSP: 002b:00007f2537e59030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 635.211590][T18974] RAX: ffffffffffffffda RBX: 00007f2539a5a160 RCX: 00007f253983133c [ 635.219611][T18974] RDX: 000000000000000f RSI: 00007f2537e590a0 RDI: 000000000000000a [ 635.227586][T18974] RBP: 00007f2537e59090 R08: 0000000000000000 R09: 0000000000000000 [ 635.235564][T18974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 635.243547][T18974] R13: 0000000000000000 R14: 00007f2539a5a160 R15: 00007fff5231f5f8 [ 635.405573][T18977] device sit0 left promiscuous mode [ 635.602544][T18994] device sit0 entered promiscuous mode [ 635.891675][T19013] device veth0_vlan left promiscuous mode [ 635.982594][T19013] device veth0_vlan entered promiscuous mode [ 636.212554][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 636.250645][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 636.347947][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 636.532217][T19022] device syzkaller0 entered promiscuous mode [ 636.924249][T19054] device veth0_vlan left promiscuous mode [ 636.939634][T19054] device veth0_vlan entered promiscuous mode [ 637.042252][T19037] device wg2 entered promiscuous mode [ 637.354301][T19064] device pim6reg1 entered promiscuous mode [ 637.447556][T19067] device syzkaller0 entered promiscuous mode [ 637.455635][T19072] device wg2 left promiscuous mode [ 637.520659][T19074] device syzkaller0 entered promiscuous mode [ 638.864792][T19116] device syzkaller0 entered promiscuous mode [ 639.238975][T19129] device veth0_vlan left promiscuous mode [ 639.245342][T19129] device veth0_vlan entered promiscuous mode [ 639.308363][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 639.327511][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 639.364069][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 640.195240][T19172] device syzkaller0 entered promiscuous mode [ 640.443970][T19180] device syzkaller0 entered promiscuous mode [ 641.128372][T19221] bridge0: port 1(bridge_slave_0) entered disabled state [ 641.154115][T19221] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.162292][T19221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 641.219958][T19243] device syzkaller0 entered promiscuous mode [ 641.313753][T19247] device pim6reg1 entered promiscuous mode [ 641.672798][T19267] device veth0_vlan left promiscuous mode [ 641.726320][T19267] device veth0_vlan entered promiscuous mode [ 641.811565][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 641.829984][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 641.849988][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 641.926883][T19282] device veth1_macvtap entered promiscuous mode [ 641.988268][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 643.494427][T19372] device syzkaller0 entered promiscuous mode [ 648.114830][T19488] device sit0 left promiscuous mode [ 648.207609][T19491] device syzkaller0 entered promiscuous mode [ 648.222443][T19490] device sit0 entered promiscuous mode [ 648.585182][T19496] device syzkaller0 entered promiscuous mode [ 648.656550][T19498] device syzkaller0 entered promiscuous mode [ 649.143680][T19505] device veth0_vlan left promiscuous mode [ 649.163148][T19505] device veth0_vlan entered promiscuous mode [ 649.246860][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 649.255533][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 649.296684][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 650.711741][T19546] device syzkaller0 entered promiscuous mode [ 651.095340][T19557] device vxcan1 entered promiscuous mode [ 651.659809][T19580] device veth0_vlan left promiscuous mode [ 651.684763][T19580] device veth0_vlan entered promiscuous mode [ 651.822502][T19578] device syzkaller0 entered promiscuous mode [ 651.834470][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 651.852861][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 651.861898][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 653.102709][T19617] device syzkaller0 entered promiscuous mode [ 654.044167][T19623] bridge0: port 1(bridge_slave_0) entered blocking state [ 654.051379][T19623] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.080737][T19623] device bridge_slave_0 entered promiscuous mode [ 654.182335][T19623] bridge0: port 2(bridge_slave_1) entered blocking state [ 654.190487][T19623] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.198307][T19623] device bridge_slave_1 entered promiscuous mode [ 654.628308][T19636] device veth1_macvtap left promiscuous mode [ 654.815841][T19623] bridge0: port 2(bridge_slave_1) entered blocking state [ 654.823237][T19623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 654.831656][T19623] bridge0: port 1(bridge_slave_0) entered blocking state [ 654.838733][T19623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 655.099888][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.145842][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.473847][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 655.492326][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 655.590316][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 655.626449][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 655.648234][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.655446][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 655.725705][T19655] device sit0 left promiscuous mode [ 655.888322][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 655.943410][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 655.980684][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.988455][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 656.071209][T19661] device sit0 entered promiscuous mode [ 656.244368][T19666] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.251964][T19666] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.261107][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 656.269497][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 656.279594][ T49] device veth1_macvtap left promiscuous mode [ 656.449608][T19672] device veth0_vlan left promiscuous mode [ 656.605608][T19672] device veth0_vlan entered promiscuous mode [ 656.702931][T19677] device veth0_vlan left promiscuous mode [ 656.736585][T19677] device veth0_vlan entered promiscuous mode [ 656.839755][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 656.866102][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 656.925299][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 656.944280][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 657.005899][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 657.044822][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 657.052712][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 657.072318][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 657.086001][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 657.119316][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 657.146913][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 657.166309][T19623] device veth0_vlan entered promiscuous mode [ 657.222485][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 657.236292][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 657.268213][T19623] device veth1_macvtap entered promiscuous mode [ 657.305276][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 657.346619][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 657.421553][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 657.448538][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 657.924298][T19713] device syzkaller0 entered promiscuous mode [ 658.174962][T19717] device sit0 entered promiscuous mode [ 659.321408][T19783] device pim6reg1 entered promiscuous mode [ 659.379671][T19781] device veth0_vlan left promiscuous mode [ 659.401348][T19781] device veth0_vlan entered promiscuous mode [ 659.465056][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 659.482440][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 659.511290][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 660.244713][T19830] device syzkaller0 entered promiscuous mode [ 661.690671][T19895] device veth0_vlan left promiscuous mode [ 661.729520][T19895] device veth0_vlan entered promiscuous mode [ 661.759351][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 661.769287][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 661.777581][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 663.632163][T19977] syz.4.6506[19977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.632267][T19977] syz.4.6506[19977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.694154][T19979] device veth0_vlan left promiscuous mode [ 663.831067][T19979] device veth0_vlan entered promiscuous mode [ 663.921822][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 663.942881][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 663.963010][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 664.248394][T19999] device syzkaller0 entered promiscuous mode [ 664.791695][T20040] device sit0 left promiscuous mode [ 665.099504][T20051] device syzkaller0 entered promiscuous mode [ 666.615137][T20084] device syzkaller0 entered promiscuous mode [ 667.354294][T20104] device syzkaller0 entered promiscuous mode [ 668.957726][T20129] device veth0_vlan left promiscuous mode [ 669.065220][T20129] device veth0_vlan entered promiscuous mode [ 669.193611][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 669.203800][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 669.212018][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 669.571338][T20151] device syzkaller0 entered promiscuous mode [ 670.148040][T20171] device syzkaller0 entered promiscuous mode [ 670.243710][T20175] device syzkaller0 entered promiscuous mode [ 670.875022][T20185] device syzkaller0 entered promiscuous mode [ 671.949916][T20215] device wg2 entered promiscuous mode [ 674.568442][T20236] device syzkaller0 entered promiscuous mode [ 676.254345][T20275] device syzkaller0 entered promiscuous mode [ 677.250209][T20313] device syzkaller0 entered promiscuous mode [ 677.363224][T20322] device sit0 entered promiscuous mode [ 677.482429][T20323] device syzkaller0 entered promiscuous mode [ 677.634646][T20326] device syzkaller0 entered promiscuous mode [ 677.920602][T20328] device wg2 entered promiscuous mode [ 679.940671][T20418] device syzkaller0 entered promiscuous mode [ 680.023781][T20422] device syzkaller0 entered promiscuous mode [ 680.371723][T20430] device syzkaller0 entered promiscuous mode [ 682.167365][T20485] device syzkaller0 entered promiscuous mode [ 682.476011][T20489] device syzkaller0 entered promiscuous mode [ 682.904210][T20509] device veth0_vlan left promiscuous mode [ 682.923355][T20509] device veth0_vlan entered promiscuous mode [ 682.983077][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 682.997687][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 683.057566][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 685.306309][T20592] device syzkaller0 entered promiscuous mode [ 689.205535][T20666] device syzkaller0 entered promiscuous mode [ 689.550939][T20677] device pim6reg1 entered promiscuous mode [ 690.067801][T20685] device syzkaller0 entered promiscuous mode [ 691.141310][T20710] device syzkaller0 entered promiscuous mode [ 691.525402][T20736] device sit0 left promiscuous mode [ 691.573828][T20738] device pim6reg1 entered promiscuous mode [ 691.687454][T20730] device sit0 entered promiscuous mode [ 692.259326][T20752] device veth0_vlan left promiscuous mode [ 692.276249][T20752] device veth0_vlan entered promiscuous mode [ 692.389334][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 692.410362][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 692.461969][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 694.212264][T20799] device veth0_vlan left promiscuous mode [ 694.317453][T20799] device veth0_vlan entered promiscuous mode [ 695.196502][T20834] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.203772][T20834] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.359407][T20833] device bridge_slave_1 left promiscuous mode [ 695.405771][T20833] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.466992][T20833] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.828777][T20848] device syzkaller0 entered promiscuous mode [ 696.449663][T20860] device wg2 entered promiscuous mode [ 697.241001][T20869] device syzkaller0 entered promiscuous mode [ 697.953570][T20889] device veth0_vlan left promiscuous mode [ 697.984659][T20889] device veth0_vlan entered promiscuous mode [ 698.149744][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 698.170505][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 698.213942][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 698.454001][T20911] device veth0_vlan left promiscuous mode [ 698.476521][T20911] device veth0_vlan entered promiscuous mode [ 698.578464][T20915] device syzkaller0 entered promiscuous mode [ 699.389725][T20922] device veth1_macvtap left promiscuous mode [ 699.417373][T20922] device macsec0 left promiscuous mode [ 699.791725][T20932] Â: renamed from pim6reg1 [ 700.460617][T20949] device syzkaller0 entered promiscuous mode [ 701.367948][T20965] device syzkaller0 entered promiscuous mode [ 701.689276][T20971] device syzkaller0 entered promiscuous mode [ 702.698421][T20989] device veth0_vlan left promiscuous mode [ 702.810780][T20989] device veth0_vlan entered promiscuous mode [ 702.989411][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 703.026604][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 703.045887][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 704.399477][T20997] ÿÿÿÿÿÿ: renamed from vlan1 [ 706.026493][T21020] device syzkaller0 entered promiscuous mode [ 706.469415][T21031] device syzkaller0 entered promiscuous mode [ 707.131176][T21058] device syzkaller0 entered promiscuous mode [ 707.853231][T21076] device veth0_vlan left promiscuous mode [ 707.887847][T21076] device veth0_vlan entered promiscuous mode [ 707.935525][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.954263][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 707.966189][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 708.846592][T21092] device syzkaller0 entered promiscuous mode [ 709.773812][T21114] device pim6reg1 entered promiscuous mode [ 709.891723][T21117] device syzkaller0 entered promiscuous mode [ 710.049403][T21122] device syzkaller0 entered promiscuous mode [ 710.474192][T21132] device syzkaller0 entered promiscuous mode [ 712.525369][T21181] device syzkaller0 entered promiscuous mode [ 713.163511][T21195] device syzkaller0 entered promiscuous mode [ 713.496375][T21209] FAULT_INJECTION: forcing a failure. [ 713.496375][T21209] name failslab, interval 1, probability 0, space 0, times 0 [ 713.550133][T21209] CPU: 1 PID: 21209 Comm: syz.1.6898 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 713.561729][T21209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 713.571809][T21209] Call Trace: [ 713.575131][T21209] __dump_stack+0x21/0x24 [ 713.579572][T21209] dump_stack_lvl+0x169/0x1d8 [ 713.584509][T21209] ? thaw_kernel_threads+0x220/0x220 [ 713.589920][T21209] ? show_regs_print_info+0x18/0x18 [ 713.595245][T21209] dump_stack+0x15/0x1c [ 713.599481][T21209] should_fail+0x3c1/0x510 [ 713.604102][T21209] ? call_usermodehelper_setup+0x71/0x1d0 [ 713.609968][T21209] __should_failslab+0xa4/0xe0 [ 713.614921][T21209] should_failslab+0x9/0x20 [ 713.619631][T21209] kmem_cache_alloc_trace+0x3a/0x2e0 [ 713.625492][T21209] call_usermodehelper_setup+0x71/0x1d0 [ 713.631211][T21209] ? __request_module+0x890/0x890 [ 713.636488][T21209] __request_module+0x35d/0x890 [ 713.641371][T21209] ? selinux_capable+0x29c/0x380 [ 713.646351][T21209] ? copy_regset_to_user+0x200/0x200 [ 713.651839][T21209] ? cap_capable+0x19c/0x220 [ 713.656438][T21209] ? cap_capable+0x19c/0x220 [ 713.661044][T21209] ? security_capable+0x87/0xb0 [ 713.666118][T21209] dev_load+0x5b/0xb0 [ 713.670190][T21209] dev_ioctl+0x53d/0xb80 [ 713.674481][T21209] sock_do_ioctl+0x235/0x330 [ 713.679307][T21209] ? __kasan_slab_free+0x11/0x20 [ 713.684281][T21209] ? sock_show_fdinfo+0xa0/0xa0 [ 713.689257][T21209] ? selinux_file_ioctl+0x377/0x480 [ 713.694482][T21209] ? mutex_trylock+0xa0/0xa0 [ 713.699251][T21209] ? __fget_files+0x2c4/0x320 [ 713.704238][T21209] sock_ioctl+0x504/0x710 [ 713.708805][T21209] ? sock_poll+0x360/0x360 [ 713.713270][T21209] ? __fget_files+0x2c4/0x320 [ 713.717687][T21215] FAULT_INJECTION: forcing a failure. [ 713.717687][T21215] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 713.717984][T21209] ? security_file_ioctl+0x84/0xa0 [ 713.737029][T21209] ? sock_poll+0x360/0x360 [ 713.741584][T21209] __se_sys_ioctl+0x121/0x1a0 [ 713.746673][T21209] __x64_sys_ioctl+0x7b/0x90 [ 713.751579][T21209] do_syscall_64+0x31/0x40 [ 713.756042][T21209] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 713.762156][T21209] RIP: 0033:0x7f34a4c30929 [ 713.766660][T21209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 713.786471][T21209] RSP: 002b:00007f34a3299038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 713.795531][T21209] RAX: ffffffffffffffda RBX: 00007f34a4e57fa0 RCX: 00007f34a4c30929 [ 713.803624][T21209] RDX: 0000200000000000 RSI: 0000000000008914 RDI: 0000000000000004 [ 713.812563][T21209] RBP: 00007f34a3299090 R08: 0000000000000000 R09: 0000000000000000 [ 713.820696][T21209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 713.828705][T21209] R13: 0000000000000000 R14: 00007f34a4e57fa0 R15: 00007ffe744ee4d8 [ 713.837920][T21215] CPU: 0 PID: 21215 Comm: syz.2.6900 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 713.849326][T21215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 713.859495][T21215] Call Trace: [ 713.862816][T21215] __dump_stack+0x21/0x24 [ 713.867144][T21215] dump_stack_lvl+0x169/0x1d8 [ 713.871854][T21215] ? thaw_kernel_threads+0x220/0x220 [ 713.877177][T21215] ? show_regs_print_info+0x18/0x18 [ 713.882650][T21215] dump_stack+0x15/0x1c [ 713.886824][T21215] should_fail+0x3c1/0x510 [ 713.891744][T21215] should_fail_usercopy+0x1a/0x20 [ 713.896771][T21215] _copy_to_user+0x20/0x90 [ 713.901187][T21215] simple_read_from_buffer+0xe9/0x160 [ 713.906551][T21215] proc_fail_nth_read+0x19a/0x210 [ 713.911574][T21215] ? proc_fault_inject_write+0x2f0/0x2f0 [ 713.917205][T21215] ? rw_verify_area+0x1c0/0x360 [ 713.922077][T21215] ? proc_fault_inject_write+0x2f0/0x2f0 [ 713.927702][T21215] vfs_read+0x1fe/0xa10 [ 713.932042][T21215] ? kernel_read+0x70/0x70 [ 713.936488][T21215] ? __kasan_check_write+0x14/0x20 [ 713.941597][T21215] ? mutex_lock+0x8c/0xe0 [ 713.945927][T21215] ? mutex_trylock+0xa0/0xa0 [ 713.950519][T21215] ? __fget_files+0x2c4/0x320 [ 713.955198][T21215] ? __fdget_pos+0x2d2/0x380 [ 713.959955][T21215] ? ksys_read+0x71/0x240 [ 713.964281][T21215] ksys_read+0x140/0x240 [ 713.968537][T21215] ? vfs_write+0xd60/0xd60 [ 713.973155][T21215] __x64_sys_read+0x7b/0x90 [ 713.977658][T21215] do_syscall_64+0x31/0x40 [ 713.982071][T21215] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 713.987959][T21215] RIP: 0033:0x7f2be72a433c [ 713.992385][T21215] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 714.012179][T21215] RSP: 002b:00007f2be58ed030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 714.021042][T21215] RAX: ffffffffffffffda RBX: 00007f2be74cd080 RCX: 00007f2be72a433c [ 714.029453][T21215] RDX: 000000000000000f RSI: 00007f2be58ed0a0 RDI: 0000000000000003 [ 714.037525][T21215] RBP: 00007f2be58ed090 R08: 0000000000000000 R09: 0000000000000000 [ 714.045679][T21215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 714.053644][T21215] R13: 0000000000000000 R14: 00007f2be74cd080 R15: 00007ffc640177b8 [ 714.062740][ T24] audit: type=1400 audit(1750204747.460:173): avc: denied { sys_module } for pid=21207 comm="syz.1.6898" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 714.677349][T21236] device pim6reg1 entered promiscuous mode [ 714.765381][T21238] device sit0 entered promiscuous mode [ 715.332755][T21249] device syzkaller0 entered promiscuous mode [ 716.240952][T21261] device syzkaller0 entered promiscuous mode [ 716.554174][T21286] device veth0_vlan left promiscuous mode [ 716.582560][T21286] device veth0_vlan entered promiscuous mode [ 716.659024][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 716.690673][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 716.725396][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 717.050360][T21300] device syzkaller0 entered promiscuous mode [ 717.284214][T21309] device pim6reg1 entered promiscuous mode [ 718.186284][T21325] device syzkaller0 entered promiscuous mode [ 719.848501][T21340] device veth0_vlan left promiscuous mode [ 719.886255][T21340] device veth0_vlan entered promiscuous mode [ 720.422402][T21355] device veth0_vlan left promiscuous mode [ 720.484776][T21355] device veth0_vlan entered promiscuous mode [ 720.731598][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 720.752691][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 720.812614][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 721.109110][T21367] device wg2 entered promiscuous mode [ 721.169774][T21363] device sit0 entered promiscuous mode [ 721.520457][T21368] device sit0 left promiscuous mode [ 721.755102][T21383] device syzkaller0 entered promiscuous mode [ 723.732341][T21411] device syzkaller0 entered promiscuous mode [ 724.671216][T21434] device veth0_vlan left promiscuous mode [ 724.734245][T21434] device veth0_vlan entered promiscuous mode [ 724.905120][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 724.914457][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 724.922849][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 725.081687][T21440] device syzkaller0 entered promiscuous mode [ 725.457666][T21452] device syzkaller0 entered promiscuous mode [ 728.554020][T21481] device syzkaller0 entered promiscuous mode [ 729.290944][T21486] device veth0_vlan left promiscuous mode [ 729.325383][T21486] device veth0_vlan entered promiscuous mode [ 729.403062][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 729.434556][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 729.506732][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 729.889070][T21500] device syzkaller0 entered promiscuous mode [ 729.995846][T21507] device vlan1 entered promiscuous mode [ 730.189774][T21520] device syzkaller0 entered promiscuous mode [ 730.392229][T21511] device syzkaller0 entered promiscuous mode [ 731.000915][T21546] device syzkaller0 entered promiscuous mode [ 731.993664][T21587] Â: renamed from pim6reg1 [ 732.962257][T21620] device syzkaller0 entered promiscuous mode [ 732.988666][T21624] device veth0_vlan left promiscuous mode [ 733.024395][T21624] device veth0_vlan entered promiscuous mode [ 733.116108][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 733.146268][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 733.225753][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 734.693244][T21665] device syzkaller0 entered promiscuous mode [ 735.892274][T21699] device syzkaller0 entered promiscuous mode [ 736.675611][T21731] device syzkaller0 entered promiscuous mode [ 737.643625][T21770] device syzkaller0 entered promiscuous mode [ 737.995580][T21774] device team_slave_1 entered promiscuous mode [ 738.071506][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 738.080890][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 738.145678][T21783] device vlan1 entered promiscuous mode [ 738.519729][T21792] device syzkaller0 entered promiscuous mode [ 740.545243][T21832] device syzkaller0 entered promiscuous mode [ 740.865756][T21846] device syzkaller0 entered promiscuous mode [ 741.160649][T21859] device syzkaller0 entered promiscuous mode [ 741.417552][T21878] device syzkaller0 entered promiscuous mode [ 741.700523][T21893] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.240754][T21910] syz.4.7128[21910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 742.240865][T21910] syz.4.7128[21910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 742.553845][T21917] device syzkaller0 entered promiscuous mode [ 743.857375][T21929] syz.1.7134[21929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 743.857566][T21929] syz.1.7134[21929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.245379][T21937] device veth0_vlan left promiscuous mode [ 744.386224][T21937] device veth0_vlan entered promiscuous mode [ 744.446719][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 744.457240][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 744.465195][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 744.825885][T21953] syz.2.7141[21953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.825997][T21953] syz.2.7141[21953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 745.222888][T21964] device veth0_vlan left promiscuous mode [ 745.279635][T21964] device veth0_vlan entered promiscuous mode [ 745.391516][T21970] device syzkaller0 entered promiscuous mode [ 745.422590][T21977] device veth0_vlan left promiscuous mode [ 745.452391][T21977] device veth0_vlan entered promiscuous mode [ 745.570008][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 745.595001][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 745.636255][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 745.929274][T21988] device syzkaller0 entered promiscuous mode [ 746.806669][T22031] device syzkaller0 entered promiscuous mode [ 746.892056][T22028] device syzkaller0 entered promiscuous mode [ 748.118644][T22065] device pim6reg1 entered promiscuous mode [ 749.023267][T22094] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.171754][T22094] device bridge_slave_1 left promiscuous mode [ 749.232891][T22094] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.290797][T22094] device bridge_slave_0 left promiscuous mode [ 749.300218][T22094] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.602552][T22136] device veth0_vlan left promiscuous mode [ 750.654071][T22136] device veth0_vlan entered promiscuous mode [ 751.322383][T22144] device syzkaller0 entered promiscuous mode [ 751.981226][T22167] device syzkaller0 entered promiscuous mode [ 752.613360][T22203] device syzkaller0 entered promiscuous mode [ 752.820917][T22199] device syzkaller0 entered promiscuous mode [ 753.279077][T22228] device wg2 left promiscuous mode [ 753.345316][T22232] device wg2 entered promiscuous mode [ 753.716861][T22258] device sit0 left promiscuous mode [ 754.029705][T22267] device sit0 entered promiscuous mode [ 754.334976][T22264] device syzkaller0 entered promiscuous mode [ 754.363407][T22269] device veth0_to_team entered promiscuous mode [ 754.836426][T22320] device veth0_vlan left promiscuous mode [ 754.958898][T22320] device veth0_vlan entered promiscuous mode [ 755.728515][T22343] device veth0_vlan left promiscuous mode [ 755.747891][T22343] device veth0_vlan entered promiscuous mode [ 755.836945][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 755.848057][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 755.856933][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 756.092019][T22352] device wg2 left promiscuous mode [ 756.606760][T22373] device veth1_to_bond entered promiscuous mode [ 757.011580][T22384] device veth0_vlan left promiscuous mode [ 757.108433][T22384] device veth0_vlan entered promiscuous mode [ 758.530769][T22410] device syzkaller0 entered promiscuous mode [ 758.900442][T22435] device syzkaller0 entered promiscuous mode [ 759.137256][T22449] device syzkaller0 entered promiscuous mode [ 759.794348][T22455] device syzkaller0 entered promiscuous mode [ 760.383910][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 760.407584][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 760.455725][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 760.712161][T22479] device syzkaller0 entered promiscuous mode [ 761.516879][T22510] device syzkaller0 entered promiscuous mode [ 761.577978][T22513] device syzkaller0 entered promiscuous mode [ 761.931182][T22519] device sit0 left promiscuous mode [ 762.136687][T22526] device sit0 entered promiscuous mode [ 762.966190][T22549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 762.980113][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 763.003183][T22554] syz.3.7330[22554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 763.003294][T22554] syz.3.7330[22554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 763.014121][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 763.044126][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 763.236029][T22559] device sit0 left promiscuous mode [ 766.203483][T22615] device syzkaller0 entered promiscuous mode [ 766.355077][T22623] device syzkaller0 entered promiscuous mode [ 766.893335][T22640] device syzkaller0 entered promiscuous mode [ 767.228484][T22654] device veth0_vlan left promiscuous mode [ 767.355573][T22654] device veth0_vlan entered promiscuous mode [ 767.597827][T22665] device sit0 entered promiscuous mode [ 769.257576][T22720] device wg2 left promiscuous mode [ 769.328396][T22722] device sit0 left promiscuous mode [ 769.444368][T22720] device sit0 entered promiscuous mode [ 769.640834][T22728] device syzkaller0 entered promiscuous mode [ 769.916191][T22730] device syzkaller0 entered promiscuous mode [ 770.777396][T22738] device syzkaller0 entered promiscuous mode [ 770.838331][T22765] device veth0_vlan left promiscuous mode [ 770.845103][T22765] device veth0_vlan entered promiscuous mode [ 770.875230][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 770.887660][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 770.906550][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 771.326136][T22776] device syzkaller0 entered promiscuous mode [ 771.670475][T22790] syz.2.7403[22790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 771.670585][T22790] syz.2.7403[22790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 771.730768][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 771.761122][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 771.769998][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 773.154052][T22835] device veth0_vlan left promiscuous mode [ 773.189830][T22835] device veth0_vlan entered promiscuous mode [ 773.560523][T22840] device syzkaller0 entered promiscuous mode [ 774.856551][T22872] device veth0_vlan left promiscuous mode [ 774.968151][T22872] device veth0_vlan entered promiscuous mode [ 775.205291][T22879] cgroup: fork rejected by pids controller in /syz3 [ 776.020399][T22900] device veth0_vlan left promiscuous mode [ 776.049341][T22900] device veth0_vlan entered promiscuous mode [ 776.961750][T22904] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.975683][T22904] bridge0: port 1(bridge_slave_0) entered disabled state [ 776.993722][T22904] device bridge_slave_0 entered promiscuous mode [ 777.129645][T22904] bridge0: port 2(bridge_slave_1) entered blocking state [ 777.145629][T22904] bridge0: port 2(bridge_slave_1) entered disabled state [ 777.156082][T22904] device bridge_slave_1 entered promiscuous mode [ 777.162768][T22920] device sit0 left promiscuous mode [ 777.209304][T22921] device sit0 entered promiscuous mode [ 778.007005][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 778.035242][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 778.157251][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 778.186162][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 778.204963][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 778.212124][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 778.224926][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 778.241050][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 778.255986][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 778.264028][ T349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 778.278730][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 778.409856][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 778.438394][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 778.557489][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 778.637187][ T296] device veth1_macvtap left promiscuous mode [ 778.821345][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 778.856910][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 778.906774][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 778.917678][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 778.934468][T22904] device veth0_vlan entered promiscuous mode [ 779.161409][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 779.177048][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 779.205016][T22904] device veth1_macvtap entered promiscuous mode [ 779.338462][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 779.359992][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 779.376599][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 779.543351][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 779.591306][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 784.793657][T23114] device sit0 left promiscuous mode [ 784.858868][T23122] device sit0 entered promiscuous mode [ 785.319776][T23136] device sit0 entered promiscuous mode [ 785.518492][T23140] device wg2 entered promiscuous mode [ 785.769501][T23152] device syzkaller0 entered promiscuous mode [ 787.440384][T23207] device sit0 entered promiscuous mode [ 787.893696][T23211] device syzkaller0 entered promiscuous mode [ 788.588877][T23218] ÿ: renamed from bond_slave_0 [ 789.923652][T23263] device syzkaller0 entered promiscuous mode [ 790.012544][T23266] device pim6reg1 entered promiscuous mode [ 790.206228][T23273] device syzkaller0 entered promiscuous mode [ 790.613445][T23287] device sit0 left promiscuous mode [ 790.750247][T23292] device sit0 entered promiscuous mode [ 791.284752][T23318] device syzkaller0 entered promiscuous mode [ 791.388385][T23320] FAULT_INJECTION: forcing a failure. [ 791.388385][T23320] name failslab, interval 1, probability 0, space 0, times 0 [ 791.401615][T23320] CPU: 0 PID: 23320 Comm: syz.0.7578 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 791.413021][T23320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 791.423365][T23320] Call Trace: [ 791.426847][T23320] __dump_stack+0x21/0x24 [ 791.431205][T23320] dump_stack_lvl+0x169/0x1d8 [ 791.436118][T23320] ? thaw_kernel_threads+0x220/0x220 [ 791.441439][T23320] ? show_regs_print_info+0x18/0x18 [ 791.446663][T23320] ? __irq_exit_rcu+0x40/0x150 [ 791.451454][T23320] ? irq_exit_rcu+0x9/0x10 [ 791.455915][T23320] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 791.461754][T23320] dump_stack+0x15/0x1c [ 791.466070][T23320] should_fail+0x3c1/0x510 [ 791.470546][T23320] ? __alloc_skb+0x9e/0x520 [ 791.475079][T23320] __should_failslab+0xa4/0xe0 [ 791.479967][T23320] should_failslab+0x9/0x20 [ 791.484645][T23320] kmem_cache_alloc+0x3d/0x2e0 [ 791.489452][T23320] __alloc_skb+0x9e/0x520 [ 791.494024][T23320] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 791.499336][T23320] rtmsg_ifinfo+0x7a/0x130 [ 791.503772][T23320] dev_close_many+0x27c/0x4d0 [ 791.508631][T23320] ? __dev_open+0x4c0/0x4c0 [ 791.513231][T23320] ? unregister_netdevice_many+0x429/0x1980 [ 791.519327][T23320] unregister_netdevice_many+0x44c/0x1980 [ 791.525169][T23320] ? sched_clock_cpu+0x1b/0x3d0 [ 791.530159][T23320] ? sched_clock+0x3a/0x40 [ 791.534667][T23320] ? sched_clock_cpu+0x1b/0x3d0 [ 791.539621][T23320] ? sched_clock+0x3a/0x40 [ 791.544068][T23320] ? alloc_netdev_mqs+0xc80/0xc80 [ 791.549271][T23320] ? __kasan_check_read+0x11/0x20 [ 791.554324][T23320] unregister_netdevice_queue+0x31c/0x360 [ 791.560426][T23320] ? list_netdevice+0x4c0/0x4c0 [ 791.565297][T23320] ? unregister_netdevice_queue+0x1/0x360 [ 791.571017][T23320] __tun_detach+0xca6/0x1450 [ 791.575782][T23320] ? tun_chr_open+0x540/0x540 [ 791.580672][T23320] tun_chr_close+0x92/0x140 [ 791.585295][T23320] __fput+0x2fb/0x770 [ 791.589297][T23320] ____fput+0x15/0x20 [ 791.593301][T23320] task_work_run+0x127/0x190 [ 791.598006][T23320] exit_to_user_mode_loop+0xcb/0xe0 [ 791.603215][T23320] syscall_exit_to_user_mode+0x68/0x90 [ 791.608682][T23320] do_syscall_64+0x3d/0x40 [ 791.613118][T23320] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 791.619015][T23320] RIP: 0033:0x7f644f21a929 [ 791.623478][T23320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 791.643621][T23320] RSP: 002b:00007f644d862038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 791.652134][T23320] RAX: 0000000000000000 RBX: 00007f644f442080 RCX: 00007f644f21a929 [ 791.660109][T23320] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 791.668091][T23320] RBP: 00007f644d862090 R08: 0000000000000000 R09: 0000000000000000 [ 791.676072][T23320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 791.684046][T23320] R13: 0000000000000000 R14: 00007f644f442080 R15: 00007ffe1bfb2828 [ 793.453840][T23373] device syzkaller0 entered promiscuous mode [ 793.527248][T23374] device sit0 left promiscuous mode [ 794.414443][T23390] device syzkaller0 entered promiscuous mode [ 796.046438][T23433] device veth0_vlan left promiscuous mode [ 796.121460][T23433] device veth0_vlan entered promiscuous mode [ 796.289288][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 796.298416][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 796.306320][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 796.604280][T23438] device veth1_to_bond entered promiscuous mode [ 797.647988][T23466] device veth0_vlan left promiscuous mode [ 797.764077][T23466] device veth0_vlan entered promiscuous mode [ 799.262014][T23475] device pim6reg1 entered promiscuous mode [ 799.986012][T23484] device syzkaller0 entered promiscuous mode [ 800.717674][T23491] device syzkaller0 entered promiscuous mode [ 802.303462][T23535] device syzkaller0 entered promiscuous mode [ 803.013023][T23546] device syzkaller0 entered promiscuous mode [ 806.342350][T23609] device syzkaller0 entered promiscuous mode [ 806.933056][T23631] device syzkaller0 entered promiscuous mode [ 806.968033][T23629] device veth1_macvtap left promiscuous mode [ 806.977257][T23629] device macsec0 left promiscuous mode [ 807.066773][T23632] device veth1_macvtap entered promiscuous mode [ 807.073366][T23632] device macsec0 entered promiscuous mode [ 808.591181][T23657] device syzkaller0 entered promiscuous mode [ 809.034041][T23681] device syzkaller0 entered promiscuous mode [ 810.570697][T23710] device syzkaller0 entered promiscuous mode [ 812.181087][T23730] device veth1_to_hsr entered promiscuous mode [ 815.160910][T23793] device syzkaller0 entered promiscuous mode [ 815.373077][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 815.382313][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 815.390838][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 815.751010][T23802] device syzkaller0 entered promiscuous mode [ 818.017958][T23836] device syzkaller0 entered promiscuous mode [ 818.470037][T23843] device syzkaller0 entered promiscuous mode [ 819.171252][T23876] device syzkaller0 entered promiscuous mode [ 821.398186][T23896] device syzkaller0 entered promiscuous mode [ 822.515734][T23910] device syzkaller0 entered promiscuous mode [ 823.893634][T23949] device syzkaller0 entered promiscuous mode [ 828.734904][T24035] device syzkaller0 entered promiscuous mode [ 828.849990][T24051] device sit0 left promiscuous mode [ 831.759595][T24118] device syzkaller0 entered promiscuous mode [ 832.054643][T24128] device syzkaller0 entered promiscuous mode [ 833.463490][T24169] device wg2 left promiscuous mode [ 837.101789][T24212] device syzkaller0 entered promiscuous mode [ 838.956385][T24263] device syzkaller0 entered promiscuous mode [ 840.319715][T24314] FAULT_INJECTION: forcing a failure. [ 840.319715][T24314] name failslab, interval 1, probability 0, space 0, times 0 [ 840.355759][T24314] CPU: 1 PID: 24314 Comm: syz.1.7926 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 840.367270][T24314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 840.377638][T24314] Call Trace: [ 840.380956][T24314] __dump_stack+0x21/0x24 [ 840.385317][T24314] dump_stack_lvl+0x169/0x1d8 [ 840.390156][T24314] ? show_regs_print_info+0x18/0x18 [ 840.395385][T24314] dump_stack+0x15/0x1c [ 840.399573][T24314] should_fail+0x3c1/0x510 [ 840.404010][T24314] ? alloc_vmap_area+0x16b/0x1870 [ 840.409272][T24314] __should_failslab+0xa4/0xe0 [ 840.414068][T24314] should_failslab+0x9/0x20 [ 840.418603][T24314] kmem_cache_alloc+0x3d/0x2e0 [ 840.423406][T24314] alloc_vmap_area+0x16b/0x1870 [ 840.428383][T24314] ? vm_map_ram+0x9c0/0x9c0 [ 840.432890][T24314] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 840.438467][T24314] ? selinux_capable+0x29c/0x380 [ 840.443458][T24314] ? __get_vm_area_node+0x113/0x450 [ 840.448668][T24314] __get_vm_area_node+0x147/0x450 [ 840.453695][T24314] __vmalloc_node_range+0xe0/0x780 [ 840.458798][T24314] ? array_map_alloc+0x330/0x7c0 [ 840.463730][T24314] ? cap_capable+0x19c/0x220 [ 840.468313][T24314] bpf_map_area_alloc+0xd5/0xe0 [ 840.473158][T24314] ? array_map_alloc+0x330/0x7c0 [ 840.478087][T24314] array_map_alloc+0x330/0x7c0 [ 840.482849][T24314] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 840.488496][T24314] ? fput+0x1a/0x20 [ 840.492326][T24314] ? bpf_map_meta_alloc+0x16d/0x760 [ 840.497638][T24314] array_of_map_alloc+0x55/0xc0 [ 840.502525][T24314] map_create+0x441/0x2190 [ 840.506953][T24314] __se_sys_bpf+0x203/0x680 [ 840.511479][T24314] ? __x64_sys_bpf+0x90/0x90 [ 840.516112][T24314] ? fpu__clear_all+0x20/0x20 [ 840.520823][T24314] __x64_sys_bpf+0x7b/0x90 [ 840.525367][T24314] do_syscall_64+0x31/0x40 [ 840.529890][T24314] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 840.535829][T24314] RIP: 0033:0x7f34a4c30929 [ 840.540464][T24314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 840.560455][T24314] RSP: 002b:00007f34a3299038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 840.568880][T24314] RAX: ffffffffffffffda RBX: 00007f34a4e57fa0 RCX: 00007f34a4c30929 [ 840.576951][T24314] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 840.584926][T24314] RBP: 00007f34a3299090 R08: 0000000000000000 R09: 0000000000000000 [ 840.592983][T24314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 840.601059][T24314] R13: 0000000000000000 R14: 00007f34a4e57fa0 R15: 00007ffe744ee4d8 [ 842.356290][T24377] device syzkaller0 entered promiscuous mode [ 843.059350][T24395] device syzkaller0 entered promiscuous mode [ 843.535341][T24402] device syzkaller0 entered promiscuous mode [ 844.319480][T24432] device syzkaller0 entered promiscuous mode [ 844.330901][T24432] ÿÿÿÿÿÿ: renamed from vlan1 [ 847.525077][T24483] device veth0_vlan left promiscuous mode [ 847.533183][T24483] device veth0_vlan entered promiscuous mode [ 847.614900][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 847.654209][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 847.666016][T24495] FAULT_INJECTION: forcing a failure. [ 847.666016][T24495] name failslab, interval 1, probability 0, space 0, times 0 [ 847.688563][T24495] CPU: 1 PID: 24495 Comm: syz.4.7986 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 847.700082][T24495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 847.710282][T24495] Call Trace: [ 847.713782][T24495] __dump_stack+0x21/0x24 [ 847.718223][T24495] dump_stack_lvl+0x169/0x1d8 [ 847.722940][T24495] ? thaw_kernel_threads+0x220/0x220 [ 847.728241][T24495] ? show_regs_print_info+0x18/0x18 [ 847.733547][T24495] dump_stack+0x15/0x1c [ 847.737714][T24495] should_fail+0x3c1/0x510 [ 847.742154][T24495] ? __alloc_skb+0x9e/0x520 [ 847.746672][T24495] __should_failslab+0xa4/0xe0 [ 847.751445][T24495] should_failslab+0x9/0x20 [ 847.755960][T24495] kmem_cache_alloc+0x3d/0x2e0 [ 847.760755][T24495] __alloc_skb+0x9e/0x520 [ 847.765108][T24495] alloc_skb_with_frags+0xa2/0x560 [ 847.770436][T24495] sock_alloc_send_pskb+0x853/0x980 [ 847.775768][T24495] ? is_bpf_text_address+0x177/0x190 [ 847.781077][T24495] ? __kernel_text_address+0xa0/0x100 [ 847.786548][T24495] ? sock_kzfree_s+0x60/0x60 [ 847.791236][T24495] ? stack_trace_save+0x98/0xe0 [ 847.796649][T24495] tun_get_user+0x4bd/0x3090 [ 847.801334][T24495] ? __x64_sys_openat+0x136/0x160 [ 847.806386][T24495] ? tun_do_read+0x1c00/0x1c00 [ 847.811390][T24495] ? kstrtouint_from_user+0x1a0/0x200 [ 847.817118][T24495] ? __fsnotify_parent+0x5f5/0x6c0 [ 847.822281][T24495] ? avc_policy_seqno+0x1b/0x70 [ 847.827343][T24495] ? selinux_file_permission+0x2a5/0x510 [ 847.833019][T24495] ? fsnotify_perm+0x66/0x4b0 [ 847.837737][T24495] tun_chr_write_iter+0x1bf/0x270 [ 847.843675][T24495] vfs_write+0x725/0xd60 [ 847.848060][T24495] ? kernel_write+0x3c0/0x3c0 [ 847.853022][T24495] ? __fget_files+0x2c4/0x320 [ 847.857732][T24495] ? __fdget_pos+0x1f7/0x380 [ 847.862338][T24495] ? ksys_write+0x71/0x240 [ 847.866899][T24495] ksys_write+0x140/0x240 [ 847.871434][T24495] ? __ia32_sys_read+0x90/0x90 [ 847.876332][T24495] ? fpu__clear_all+0x20/0x20 [ 847.881273][T24495] __x64_sys_write+0x7b/0x90 [ 847.885907][T24495] do_syscall_64+0x31/0x40 [ 847.890344][T24495] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 847.896376][T24495] RIP: 0033:0x7f2539832929 [ 847.900808][T24495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 847.920527][T24495] RSP: 002b:00007f2537e9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 847.928959][T24495] RAX: ffffffffffffffda RBX: 00007f2539a59fa0 RCX: 00007f2539832929 [ 847.936940][T24495] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 847.945195][T24495] RBP: 00007f2537e9b090 R08: 0000000000000000 R09: 0000000000000000 [ 847.953612][T24495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 847.961935][T24495] R13: 0000000000000000 R14: 00007f2539a59fa0 R15: 00007fff5231f5f8 [ 848.017691][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 848.077393][T24503] device syzkaller0 left promiscuous mode [ 848.227736][T24517] device pim6reg1 entered promiscuous mode [ 848.417292][T24513] device veth0_vlan left promiscuous mode [ 848.435717][T24513] device veth0_vlan entered promiscuous mode [ 848.502609][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 848.547969][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 848.586418][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 849.453046][T24605] device syzkaller0 entered promiscuous mode [ 850.647047][T24657] device pim6reg1 entered promiscuous mode [ 850.942303][T24672] device syzkaller0 entered promiscuous mode [ 854.585184][T24780] FAULT_INJECTION: forcing a failure. [ 854.585184][T24780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 854.646429][T24780] CPU: 0 PID: 24780 Comm: syz.1.8080 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 854.657844][T24780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 854.667916][T24780] Call Trace: [ 854.671209][T24780] __dump_stack+0x21/0x24 [ 854.675541][T24780] dump_stack_lvl+0x169/0x1d8 [ 854.680265][T24780] ? show_regs_print_info+0x18/0x18 [ 854.685776][T24780] dump_stack+0x15/0x1c [ 854.689959][T24780] should_fail+0x3c1/0x510 [ 854.694426][T24780] should_fail_alloc_page+0x4f/0x60 [ 854.699725][T24780] __alloc_pages_nodemask+0x109/0x5f0 [ 854.705117][T24780] ? do_syscall_64+0x31/0x40 [ 854.709729][T24780] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 854.715820][T24780] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 854.721649][T24780] ? _raw_spin_trylock_bh+0x130/0x130 [ 854.727034][T24780] __get_free_pages+0xe/0x30 [ 854.731987][T24780] kasan_populate_vmalloc_pte+0x29/0x120 [ 854.737663][T24780] __apply_to_page_range+0x74e/0x9e0 [ 854.742970][T24780] ? kasan_populate_vmalloc+0x70/0x70 [ 854.748454][T24780] ? kasan_populate_vmalloc+0x70/0x70 [ 854.753841][T24780] apply_to_page_range+0x3b/0x50 [ 854.759383][T24780] kasan_populate_vmalloc+0x60/0x70 [ 854.764592][T24780] alloc_vmap_area+0x1734/0x1870 [ 854.769571][T24780] ? vm_map_ram+0x9c0/0x9c0 [ 854.774180][T24780] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 854.779917][T24780] ? selinux_capable+0x29c/0x380 [ 854.784976][T24780] ? __get_vm_area_node+0x113/0x450 [ 854.790312][T24780] __get_vm_area_node+0x147/0x450 [ 854.795789][T24780] __vmalloc_node_range+0xe0/0x780 [ 854.800917][T24780] ? array_map_alloc+0x330/0x7c0 [ 854.805881][T24780] ? cap_capable+0x19c/0x220 [ 854.810485][T24780] bpf_map_area_alloc+0xd5/0xe0 [ 854.815346][T24780] ? array_map_alloc+0x330/0x7c0 [ 854.820692][T24780] array_map_alloc+0x330/0x7c0 [ 854.825568][T24780] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 854.831216][T24780] ? fput+0x1a/0x20 [ 854.835055][T24780] ? bpf_map_meta_alloc+0x16d/0x760 [ 854.840268][T24780] array_of_map_alloc+0x55/0xc0 [ 854.845123][T24780] map_create+0x441/0x2190 [ 854.849556][T24780] __se_sys_bpf+0x203/0x680 [ 854.854072][T24780] ? __x64_sys_bpf+0x90/0x90 [ 854.858774][T24780] ? fpu__clear_all+0x20/0x20 [ 854.863472][T24780] __x64_sys_bpf+0x7b/0x90 [ 854.867905][T24780] do_syscall_64+0x31/0x40 [ 854.872506][T24780] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 854.878841][T24780] RIP: 0033:0x7f34a4c30929 [ 854.883367][T24780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 854.903068][T24780] RSP: 002b:00007f34a3299038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 854.911499][T24780] RAX: ffffffffffffffda RBX: 00007f34a4e57fa0 RCX: 00007f34a4c30929 [ 854.919481][T24780] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 854.927472][T24780] RBP: 00007f34a3299090 R08: 0000000000000000 R09: 0000000000000000 [ 854.935729][T24780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 854.943716][T24780] R13: 0000000000000000 R14: 00007f34a4e57fa0 R15: 00007ffe744ee4d8 [ 856.036492][T24812] device syzkaller0 entered promiscuous mode [ 857.077462][T24848] device pim6reg1 entered promiscuous mode [ 857.234933][T24853] device pim6reg1 entered promiscuous mode [ 858.381340][T24886] device syzkaller0 entered promiscuous mode [ 858.436260][T24891] device pim6reg1 entered promiscuous mode [ 858.636166][T24923] device veth1_macvtap entered promiscuous mode [ 858.700754][T24923] device macsec0 entered promiscuous mode [ 858.766360][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 860.265032][T24990] device syzkaller0 entered promiscuous mode [ 861.411133][T25023] syz.3.8154[25023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 861.411234][T25023] syz.3.8154[25023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 862.294918][T25052] device pim6reg1 entered promiscuous mode [ 862.736090][T25069] FAULT_INJECTION: forcing a failure. [ 862.736090][T25069] name failslab, interval 1, probability 0, space 0, times 0 [ 862.856198][T25069] CPU: 1 PID: 25069 Comm: syz.3.8169 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 862.867744][T25069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 862.878321][T25069] Call Trace: [ 862.881997][T25069] __dump_stack+0x21/0x24 [ 862.886452][T25069] dump_stack_lvl+0x169/0x1d8 [ 862.891153][T25069] ? thaw_kernel_threads+0x220/0x220 [ 862.896457][T25069] ? show_regs_print_info+0x18/0x18 [ 862.901835][T25069] dump_stack+0x15/0x1c [ 862.906201][T25069] should_fail+0x3c1/0x510 [ 862.910641][T25069] ? __vmalloc_node_range+0x29f/0x780 [ 862.916025][T25069] __should_failslab+0xa4/0xe0 [ 862.920903][T25069] should_failslab+0x9/0x20 [ 862.925563][T25069] __kmalloc+0x60/0x330 [ 862.929766][T25069] __vmalloc_node_range+0x29f/0x780 [ 862.935009][T25069] bpf_map_area_alloc+0xd5/0xe0 [ 862.939975][T25069] ? array_map_alloc+0x330/0x7c0 [ 862.945015][T25069] array_map_alloc+0x330/0x7c0 [ 862.949790][T25069] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 862.955513][T25069] ? fput+0x1a/0x20 [ 862.959329][T25069] ? bpf_map_meta_alloc+0x16d/0x760 [ 862.964531][T25069] array_of_map_alloc+0x55/0xc0 [ 862.969406][T25069] map_create+0x441/0x2190 [ 862.973959][T25069] __se_sys_bpf+0x203/0x680 [ 862.978478][T25069] ? __x64_sys_bpf+0x90/0x90 [ 862.983078][T25069] ? fpu__clear_all+0x20/0x20 [ 862.987985][T25069] __x64_sys_bpf+0x7b/0x90 [ 862.992418][T25069] do_syscall_64+0x31/0x40 [ 862.996866][T25069] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 863.002856][T25069] RIP: 0033:0x7f057eb3b929 [ 863.007280][T25069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 863.027097][T25069] RSP: 002b:00007f057d1a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 863.035617][T25069] RAX: ffffffffffffffda RBX: 00007f057ed62fa0 RCX: 00007f057eb3b929 [ 863.043617][T25069] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 863.051714][T25069] RBP: 00007f057d1a4090 R08: 0000000000000000 R09: 0000000000000000 [ 863.059792][T25069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 863.067761][T25069] R13: 0000000000000000 R14: 00007f057ed62fa0 R15: 00007ffc250c2f58 [ 863.115306][T25082] syz.1.8174[25082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 863.115405][T25082] syz.1.8174[25082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 863.932907][T25123] device syzkaller0 entered promiscuous mode [ 864.165821][T25126] device veth1_macvtap left promiscuous mode [ 864.946775][T25189] device pim6reg1 entered promiscuous mode [ 865.926860][T25233] device syzkaller0 left promiscuous mode [ 867.903430][T25321] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.726032][T25379] device veth0_vlan left promiscuous mode [ 870.739156][T25379] device veth0_vlan entered promiscuous mode [ 870.749536][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 870.761886][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 870.769939][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 871.301992][T25388] device pim6reg1 entered promiscuous mode [ 871.548409][T17824] cgroup: fork rejected by pids controller in /syz2 [ 872.394867][T25423] bridge0: port 1(bridge_slave_0) entered blocking state [ 872.402351][T25423] bridge0: port 1(bridge_slave_0) entered disabled state [ 872.416170][T25423] device bridge_slave_0 entered promiscuous mode [ 872.476231][T25423] bridge0: port 2(bridge_slave_1) entered blocking state [ 872.484457][T25423] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.502138][T25423] device bridge_slave_1 entered promiscuous mode [ 873.510925][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 873.521499][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 873.604693][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 873.613589][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 873.622578][T10304] bridge0: port 1(bridge_slave_0) entered blocking state [ 873.629808][T10304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 873.638465][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 873.669433][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 873.678283][T10304] bridge0: port 2(bridge_slave_1) entered blocking state [ 873.685676][T10304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 873.766364][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 873.836340][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 873.897758][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 873.939910][T25423] device veth0_vlan entered promiscuous mode [ 873.997633][ T24] audit: type=1400 audit(1750204907.400:174): avc: denied { create } for pid=25447 comm="syz.0.8278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 874.052976][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 874.062115][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 874.070858][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 874.079004][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 874.088573][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 874.097367][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 874.208871][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 874.218202][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 874.379720][T25423] device veth1_macvtap entered promiscuous mode [ 874.416149][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 874.434570][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 874.455143][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 874.618513][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 874.686063][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 874.697874][ T296] device bridge_slave_1 left promiscuous mode [ 874.704252][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 874.712704][ T296] device bridge_slave_0 left promiscuous mode [ 874.757022][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.103237][ T24] audit: type=1400 audit(1750204908.490:175): avc: denied { unmount } for pid=25423 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 875.999680][T25482] device syzkaller0 entered promiscuous mode [ 877.117632][T25528] device syzkaller0 entered promiscuous mode [ 880.606550][T25601] device syzkaller0 left promiscuous mode [ 881.725960][T25655] syz.2.8351[25655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 881.726066][T25655] syz.2.8351[25655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 881.763023][T25655] device pim6reg1 entered promiscuous mode [ 882.682030][T25675] device syzkaller0 entered promiscuous mode [ 883.096725][T25678] device syzkaller0 entered promiscuous mode [ 883.539223][T25702] device syzkaller0 entered promiscuous mode [ 884.549870][T25742] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.660064][T25742] device bridge_slave_1 left promiscuous mode [ 884.668619][T25742] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.696035][T25742] device bridge_slave_0 left promiscuous mode [ 884.712795][T25742] bridge0: port 1(bridge_slave_0) entered disabled state [ 885.637252][T25772] syz.3.8391[25772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 885.637320][T25772] syz.3.8391[25772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 885.670425][T25772] syz.3.8391[25772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 885.682423][T25772] syz.3.8391[25772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 885.947949][T25782] device syzkaller0 entered promiscuous mode [ 885.985955][T25772] device wg2 entered promiscuous mode [ 887.571684][T25840] device syzkaller0 entered promiscuous mode [ 888.646851][T25892] device syzkaller0 left promiscuous mode [ 894.928662][T26064] device syzkaller0 entered promiscuous mode [ 895.966647][T26127] syz.2.8505[26127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 895.966746][T26127] syz.2.8505[26127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 896.428695][T26133] device syzkaller0 entered promiscuous mode [ 896.526200][T26137] device sit0 entered promiscuous mode [ 900.247365][T26291] device macsec0 entered promiscuous mode [ 900.614539][T26297] device syzkaller0 entered promiscuous mode [ 901.339288][T26329] device sit0 left promiscuous mode