last executing test programs: 4.100755207s ago: executing program 4 (id=2998): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095", @ANYRES8=0x0, @ANYRES32=0x0], 0x0, 0x101, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x1189, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_type(r0, &(0x7f00000002c0), 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b0000970a000000002698086f0000000100000014d5b043aa267ce0c713627e6ab0b4fa6d104dd58848fc6e39a5c80a9376429297486d40c13d1aef089cb62872a8b4265e91ed8acd4508bccc5b2a4986b7249c1f097eb7212296d4f063933d80c5f3a3feb7366b4deaa7f864be0c850500000000000000cfbf4769059ef49b344d6b1cac", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xffffffffffffff7a) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f00000001c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000240)=ANY=[@ANYBLOB='1-1,'], 0x31) close(0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e"], 0x88}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRESOCT=r5, @ANYRES32, @ANYBLOB='\x00'/17, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 3.705605333s ago: executing program 4 (id=3001): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r1, &(0x7f0000000000), 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/79, 0xce80}], 0x300}, 0x0) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000001a00000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffe7d) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008e17fa7d71cf8e18e1e7624ae4f7bc1b47"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4}, 0x0, &(0x7f0000000300)}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xa261, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, r8, 0x1) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000440)='erofs_destroy_inode\x00', r9}, 0xfffffffffffffdb3) (async) r10 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_tracing={0x1a, 0x15, &(0x7f0000000780)=ANY=[@ANYBLOB="d39ba795", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000085100000fdffffff81a31800fcffffff186200000a000000000000008b0800008500000066000000085301001000000018320000040000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000eaf5ffff850000000600000065918000f0ffffff"], &(0x7f00000003c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0xe, 0xc4, 0x3}, 0x10, 0x17edd, r10, 0x7, &(0x7f0000001140)=[r6], &(0x7f0000001180)=[{0x3, 0x1, 0x1, 0x5}, {0x5, 0x5, 0x3, 0x6}, {0x0, 0x1, 0x0, 0x3}, {0x5, 0x5, 0x8, 0x9}, {0x2, 0x4, 0x7, 0x3}, {0x0, 0x1, 0xe, 0xa}, {0x0, 0x3, 0xd, 0xb}], 0x10, 0x7, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) mkdirat$cgroup(r11, &(0x7f0000000180)='syz0\x00', 0x1ff) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 3.702691363s ago: executing program 4 (id=3003): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0xf, 0x80000, 0xcc000, &(0x7f0000000000)) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000380)='kfree\x00', r1}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0xfffffffffffffcbd, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5, 0x0, &(0x7f0000000100)="b9ff033168", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8912, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r5}, 0x18) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x129800, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000280)={'bond_slave_0\x00', 0x400}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000090000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='mm_page_alloc\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) 3.508787075s ago: executing program 4 (id=3006): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x4, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000000)="6c26147007da5d311c5814f479ac4ebdc1b440972ba5ba700314ed2addb8ec9062d931bdf167cda4d84753080b3d16a1b925cd2c", &(0x7f0000000080)=""/33}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7d}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r4}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='freezer.parent_freezing\x00', 0x790197c97da9, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000c1473f9101fb32000000000000"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{r0, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%ps \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r6, &(0x7f0000000540)="2110330dff4326838f3556c285c851ded8ee0b2908977c7ec6f125e340c39ef6093628783e95af7e11da24be0c8b2f07d782b69e3ab84a1a1437", &(0x7f0000000680)=""/116}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="007b629cbf00000000bfa20000d6b05b2a8c75a9f50000000007020000f8ffffffb703000008000000b704000000001ffb889f143eb8e84f78b0c68df8fa00850000000300000043b6b49500000000000000c2edf9ebb9e195d92d39da4fafbf2485d6e55cc1cb40182ee1c99180d56d72ef6f1f510500000000000000b2f69a507aad39c7796c2ef48775e692f4dd"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) gettid() syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 3.203776789s ago: executing program 4 (id=3011): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600001785000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x1000000, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3a66505}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x2, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="00000006000000000c0000000000000000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 2.986630642s ago: executing program 4 (id=3016): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r3) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000200)='svc_unregister\x00', r5}, 0x18) socketpair(0x11, 0x6, 0x300, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="1c0500000000000000000000010000006e44000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r7}, 0x10) r8 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(r8) 2.163874543s ago: executing program 1 (id=3029): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x3, 0xc, 0x1400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ifs_status\x00', r3, 0x0, 0x803c}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 2.092378283s ago: executing program 1 (id=3030): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) socketpair(0xd, 0x3, 0x401, &(0x7f0000000380)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x105, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3ff, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) close(0x4) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r3}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) syz_clone(0x2000080, &(0x7f0000000cc0)="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", 0x1000, &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000280)="fd30ee1947ed43fc288ff9c6b4b81cfce1f5f724b7482f83d018a0c0673e85efe6a0ab65e2794e20d6d1e0a686cd38ebacd4ba13c574f3a4d17f59c3b266956b7033f75d1234ead3ff8b558124db4dbe635bda9f60a66c8e7022a2397bbf068739585b0de864125f6c04e4522251925f97f899d403c91bb19bb62051f3d3daf12c1335c4348ddeec8b1aa2ee3ad555a5485488f3f7e6e18f819937e313be155db99bd93c263a770a1bcd69b6085e9c2c89a3f1fc10dfa30cfaf91232a18ec9ff6b1a1668e604fe11a1ff609af27943989612028da6768b574f7e") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r9, 0x0, 0x6}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r8}, 0x10) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x1ff) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') 2.054032414s ago: executing program 1 (id=3031): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61123000000000006113340000000000bf1000000000000015000200091b00003d030100000000008701000000000000bc26000000000000bf67000000000000560300000ee600f06702000014000000160300000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586e3f640f9f7e9a73b761ad4f0952a70046270d2b6436fdeecd791614ed46de741eb8cf91c046ef9beca574b350021c7ec6ef130f53748068ca432dae4e248b22b9ad8b2811f67916a1764578cba4b069037bfb3362d5691ac397f7e207145d970f0d97867552629b146645c785fb77dbeca38e49a9d5221f1f45f0a25890d04d91a15a05ae7e7ed6252c3d6c1973fb858de1da70d67317e7872b0603ce47ed2c1520e71b527bb42aa2e20e1e85df73736ed0a782ab7e7278dd54358cfdf6313d40f926332623625b49626481054787ab2dff85a9bebd6b317f26c691a65aa97bb3d1506a3a565e9c7ea5ad4611d2d77ee8a5c1b23814a26b6a20061fbb65bdd03770fa849f2a29ba69f90625f42592a70ba890f7a92878ae73574c3a233ee5954119931a1905210715fa77a8795f2fbec3797cb90f59fe8a4abec25f40c87bf25b750bbaa"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x8, 0x2, 0x8, 0x2, 0x0, 0x2, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5816, 0x0, @perf_config_ext={0x2, 0xfffffffffffffbff}, 0x11a411, 0x7fff, 0x4, 0x1, 0x8, 0x9, 0x4, 0x0, 0x200, 0x0, 0x1}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 1.923954685s ago: executing program 3 (id=3033): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000000)='/pr\x04c\vS\x80Z\xca\x01\xc3\xff\xb2\xde'}, 0x30) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r4, 0x0, &(0x7f0000001780)=""/4096}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000400)={&(0x7f0000000240)=@ieee802154, 0x80, &(0x7f00000002c0)=[{&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000004780)=""/4096, 0x1000}], 0x3, &(0x7f0000000300)=""/231, 0xe7}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 1.912605735s ago: executing program 2 (id=3034): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xffb, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 1.787787327s ago: executing program 3 (id=3035): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000002e000100240000002400000004000000000000000000000300000000030000000200000000000000020000000000000c0000000000002e"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1ff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xb000000000000001, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="100000000400000008000000080000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000081005e570000000000000000000000000000000071e41aeaac16888a6d88e399b02efdf0375f89ec818d53348d84d95d736e524e5d20ecdb6c5db2a957ea56a63fa723547cda4cb2d37bb736db6d0a72b2626ff532c90a3e01237657"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000004080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYRESDEC=r7], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.777084237s ago: executing program 3 (id=3036): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070250000000000202d437b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) (async, rerun: 64) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (rerun: 64) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="7bedcb5d07081196f37538e486dd63"], 0x66) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={0x0, 0x8c, 0x8}, 0x18) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x2, 0xa, 0x80, 0x6454}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000, @void, @value}, 0x90) 1.691691598s ago: executing program 3 (id=3038): bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0e0a0000040000000400005309000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, 0x0, &(0x7f00000000c0)=""/89}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, 0x0, &(0x7f00000000c0)=""/89}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="2100000004000000040000000900000008200000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="09000000020000e6d8e42600000000000000000000c50c9cc3000000"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000680)=0x6, 0x12) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) (async) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r5, @ANYRESHEX=r3, @ANYRES64=r4, @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair(0x5, 0x800, 0x4, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f00000003c0)='./file0\x00') (async) unlink(&(0x7f00000003c0)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0xfffffffe, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0xfffffffe, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000050000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000400)='ext4_ext_handle_unwritten_extents\x00', 0xffffffffffffffff, 0x0, 0x2000000}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000400)='ext4_ext_handle_unwritten_extents\x00', 0xffffffffffffffff, 0x0, 0x2000000}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611004000000000063012100000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8946, &(0x7f0000000900)={'veth0_macvtap\x00', @random='\x00\x00\x00 \x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'lo\x00', 0x100}) socketpair(0x2a, 0x6, 0x6, &(0x7f0000000000)) 1.690439078s ago: executing program 0 (id=3039): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) 1.505751141s ago: executing program 2 (id=3040): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffa}, [@call={0x85, 0x0, 0x0, 0x2c}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f00000100000012"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r1, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000001c0)=r2}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x1400, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000880), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r4, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x2, 0x40, 0x8, 0x80, 0x1, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0x8, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%pK \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0x1, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xcc, 0xcc, 0x5, [@enum64={0x2, 0x6, 0x0, 0x13, 0x1, 0x2, [{0x4, 0x80, 0xe}, {0x8, 0x9cc, 0xffff8000}, {0xb, 0xb, 0x4}, {0xa, 0x5, 0xfffffffb}, {0xd, 0x5, 0x8}, {0xc, 0xf0000, 0x5}]}, @enum64={0x10, 0x6, 0x0, 0x13, 0x1, 0x5, [{0x1, 0x3, 0x4}, {0xf, 0xfffffff7, 0xac}, {0x8, 0x9, 0x4}, {0x6, 0xe798, 0x6}, {0x9, 0x3ff, 0x8}, {0xd, 0x5, 0x1}]}, @volatile={0x5, 0x0, 0x0, 0x9, 0x4}, @restrict={0x10}, @type_tag={0xe, 0x0, 0x0, 0x12, 0x5}]}, {0x0, [0x30, 0x5f, 0x5f]}}, &(0x7f0000000380)=""/189, 0xe9, 0xbd, 0x1, 0x0, 0x10000, @value}, 0x28) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x7, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x1, 0x1, 0x0, r5}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0xab}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xd8}], &(0x7f0000000200)='syzkaller\x00', 0x2, 0x1a, &(0x7f0000000240)=""/26, 0x41000, 0x5, '\x00', r7, 0x25, r8, 0x8, &(0x7f00000006c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x5, 0x5, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000740)=[r9], &(0x7f0000000780)=[{0x5, 0x2, 0x3, 0x1}], 0x10, 0x2, @void, @value}, 0x94) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r11, &(0x7f0000000340)={0x0, 0xffffff81, 0x0}, 0x102) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0x10, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, [@map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x52b}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x278c36dd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @call={0x85, 0x0, 0x0, 0xb4}, @generic={0x1, 0x6, 0xf, 0xffff, 0xe}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xf}, @func={0x85, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000980)='syzkaller\x00', 0x7, 0x9b, &(0x7f0000000a40)=""/155, 0x41100, 0x40, '\x00', r7, @lsm=0x1b, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x3, 0x6, 0xdb, 0x7}, 0x10, 0x0, r10, 0x3, &(0x7f0000000b40)=[r1, 0xffffffffffffffff, r3, r9, r3, r3, r12], &(0x7f0000000b80)=[{0x1, 0x2, 0x1, 0x4}, {0x4, 0x4, 0x8, 0xade8bd07cc0286ad}, {0x4, 0x2, 0xa, 0x1}], 0x10, 0x80000000, @void, @value}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0xa, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r14}, 0x10) r15 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) close(r15) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r17, &(0x7f0000000500)={0x0, 0x4000000, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) close(r16) 1.424968562s ago: executing program 3 (id=3041): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18300000034f0e61000000000000000004000000bb7f1a007600feff000020009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x22) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0206000004000000020000000c00000000140000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000008"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000000, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000b00)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000fdb0ffe0fd38e63897d592b378b02edf6fc73026e34565fad5394bb0e0d7a91f9898fc7e035a425066cc0feb611459490c5f997596fe837e143bf5deca7388fb11dfba00aea85f17e1b49a9c52d60901c288b5b4d463f45972f3e10bc88399f9245e112579c527158a3f91fcff2aaa6b2123119878c20606018326fefdbaaeb799cee785da393c171e6b4807aa833220793adcfa15cebd36c9d34e64039593d4da"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r10}, &(0x7f0000000200), &(0x7f0000000280)=r11}, 0x16) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='svcrdma_wc_read\x00', r1, 0x0, 0x9}, 0x18) 1.152346645s ago: executing program 0 (id=3042): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x1000000, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='(pu&00\t&&') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3a66505}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x2, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="00000006000000000c0000000000000000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 1.011829567s ago: executing program 2 (id=3043): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0xffffffffffffffa6) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000fcffffff0000000000181100000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x21780, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYRES32, @ANYRESDEC=r3, @ANYRES32=r0, @ANYBLOB, @ANYRES32=r4], 0x20) (async) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000580), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)=ANY=[@ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB, @ANYRES64=0x0], 0x20) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async, rerun: 32) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) (rerun: 32) write$cgroup_int(r2, &(0x7f0000000240)=0x4bbb5b35, 0x12) (async) r8 = openat$cgroup_type(r7, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r8, &(0x7f0000000280), 0x9) r9 = openat$cgroup_procs(r7, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f00000005c0), 0x12) (async, rerun: 64) mkdir(&(0x7f0000000180)='./file0\x00', 0x8) (async, rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000080)) 1.009305817s ago: executing program 2 (id=3045): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xffc0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8982, &(0x7f0000000080)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRES32=r2], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0xff, '\x00', 0x0, r4, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r3, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', r7, 0x2, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040), 0x2}, 0x20) r10 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, r10, 0x2) r11 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r11, 0x0, 0x275a, 0x0) r12 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(r12, 0x0, 0x2, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) 986.863357ms ago: executing program 1 (id=3046): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x8, 0xdd, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xf122, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xdeb9065d, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x9c}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 892.724108ms ago: executing program 0 (id=3047): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETTXFILTER(r1, 0x400454d1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x10) getpid() r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000005900000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000009500000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)) 703.43948ms ago: executing program 0 (id=3048): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xe) write$cgroup_int(r2, &(0x7f00000000c0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r3) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5452, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0900000004000000060000000a"], 0x48) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x2, 0x70, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='workqueue_queue_work\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x99}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x70ea, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xf, 0x3}, 0x842a, 0x200000000000000, 0x400007, 0x5, 0x0, 0x1ffffd, 0xfffc}, 0x0, 0x0, r5, 0x3) close(0x4) 394.375225ms ago: executing program 1 (id=3049): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000540)=r0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001000), 0xc}, 0xa01}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"/3002], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffdbb, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r7}, 0x10) close(r3) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000380)=r2) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) recvmsg$unix(r8, &(0x7f0000000300)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/166, 0xa6}, {&(0x7f0000000180)=""/196, 0xc4}, {&(0x7f0000000280)=""/42, 0x2a}], 0x3, &(0x7f0000000440)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x40002100) 169.614988ms ago: executing program 0 (id=3050): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xffb, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 142.417468ms ago: executing program 0 (id=3051): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r4}, &(0x7f0000000200), &(0x7f00000003c0)=r6}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r4}, &(0x7f0000000200), &(0x7f00000003c0)=r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r4}, &(0x7f0000000080), &(0x7f00000000c0)=r6}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r4}, &(0x7f0000000080), &(0x7f00000000c0)=r6}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000f0ffffff0000000000000000000800000000", @ANYRES8=r3, @ANYRES32=r5, @ANYBLOB="000000000100"], 0x48) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000001000)={0x3, 0x80, 0x21, 0x4, 0x9a, 0xf7, 0x0, 0x2, 0x400, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x2, @perf_config_ext={0x4, 0x19d49d0c}, 0x2, 0x9, 0x0, 0x4, 0x517, 0x7fff, 0x7, 0x0, 0x6, 0x0, 0xe}, 0x0, 0x2, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000001000)={0x3, 0x80, 0x21, 0x4, 0x9a, 0xf7, 0x0, 0x2, 0x400, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x2, @perf_config_ext={0x4, 0x19d49d0c}, 0x2, 0x9, 0x0, 0x4, 0x517, 0x7fff, 0x7, 0x0, 0x6, 0x0, 0xe}, 0x0, 0x2, 0xffffffffffffffff, 0x2) openat$cgroup_subtree(r7, &(0x7f0000003000), 0x201, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@typedef={0x2, 0x0, 0x0, 0x8, 0x2}, @struct={0x5, 0x0, 0x0, 0xc}]}, {0x0, [0x0, 0x61, 0x0, 0x0, 0x2e]}}, &(0x7f0000001300)=""/181, 0x37, 0xb5, 0x1, 0x0, 0x0, @void, @value}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@typedef={0x2, 0x0, 0x0, 0x8, 0x2}, @struct={0x5, 0x0, 0x0, 0xc}]}, {0x0, [0x0, 0x61, 0x0, 0x0, 0x2e]}}, &(0x7f0000001300)=""/181, 0x37, 0xb5, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 141.951628ms ago: executing program 2 (id=3052): r0 = gettid() (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) (async) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x18) (async) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x8, '\x00', 0x0, r3, 0x2, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x12040, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'ip6gre0\x00', 0x100}) r6 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x7, 0x81, 0x9a, 0x0, 0x7fffffffffffffff, 0x10, 0x7, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x7, 0xfffffffffffffffd}, 0x8046, 0x4, 0x40, 0x9, 0x81, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000002c0)=':\'\x00') (async) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x6, 0x0, r2, 0x2, '\x00', 0x0, r3, 0x3, 0x3, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0xf, &(0x7f0000000300)=@raw=[@alu={0x4, 0x1, 0x4, 0xa, 0xa, 0xffffffffffffffe0, 0xfffffffffffffff0}, @map_fd={0x18, 0x3, 0x1, 0x0, r4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], &(0x7f0000000380)='syzkaller\x00', 0xce, 0xb9, &(0x7f00000003c0)=""/185, 0x40f00, 0x28, '\x00', 0x0, @fallback=0x22, r3, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x0, 0x3, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[r4, r7], 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000680), 0x480, 0x0) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@float={0xc, 0x0, 0x0, 0x10, 0xc}, @decl_tag={0x2, 0x0, 0x0, 0x11, 0x3, 0x6}, @float={0x2, 0x0, 0x0, 0x10, 0xc}]}, {0x0, [0x30, 0x5f, 0x0, 0x2e, 0x61]}}, &(0x7f0000000740)=""/128, 0x47, 0x80, 0x0, 0x0, 0x0, @void, @value}, 0x28) close(r7) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000800)={0xc3e}, 0x8) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000940)={r10, 0x20, &(0x7f0000000900)={&(0x7f0000000840)=""/104, 0x68, 0x0, &(0x7f00000008c0)=""/43, 0x2b}}, 0x10) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000980)=r11, 0x4) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x1, 0x4, 0x3, 0xc, 0x0, 0x6, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={&(0x7f00000009c0), 0xd}, 0x8026, 0x4, 0x796f, 0x1, 0x0, 0xff, 0x9, 0x0, 0x1, 0x0, 0x1}, r0, 0x7, r7, 0x1) (async) ioctl$TUNGETVNETLE(r9, 0x800454dd, &(0x7f0000000a80)) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) r13 = openat$cgroup_ro(r1, &(0x7f0000000ac0)='memory.events.local\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)=r8}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001080)={r8, 0xe0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000dc0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000e00)=[0x0, 0x0], &(0x7f0000000e40)=[0x0, 0x0, 0x0], 0x0, 0x78, &(0x7f0000000e80)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000ec0), &(0x7f0000000f00), 0x8, 0x53, 0x8, 0x8, &(0x7f0000000f40)}}, 0x10) (async) r16 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001100)='./file0\x00', 0x0, 0x8008, r8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x13, 0x11, &(0x7f0000000bc0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r13}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x4, 0x1, 0xb, 0x0, 0x2, 0xa, 0x8}], &(0x7f0000000c80)='syzkaller\x00', 0xf3, 0xdd, &(0x7f0000000cc0)=""/221, 0x41100, 0x41, '\x00', r15, @fallback=0x3, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f00000010c0)={0x1, 0x1, 0x9479, 0xb5a}, 0x10, 0x0, r8, 0x9, &(0x7f0000001180)=[r4, r2, r16, r2], &(0x7f00000011c0)=[{0x0, 0x4, 0x3, 0xc}, {0x0, 0x5, 0x3, 0x2}, {0x3, 0x1, 0xc, 0xb}, {0x3, 0x5, 0x0, 0x6}, {0x4, 0x5, 0x8, 0xc}, {0x2, 0x1, 0xa, 0xc}, {0x4, 0x5, 0x7, 0x2}, {0x4, 0x2, 0xb, 0x1}, {0x3, 0x2, 0xf, 0x3}], 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001340)={r13, 0xffffffffffffffff}, 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{r16, 0xffffffffffffffff}, &(0x7f0000001380), &(0x7f00000013c0)=r13}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001700)={0x11, 0x18, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4ea7, 0x0, 0x0, 0x0, 0x1}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r18}}, @exit, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10000}}, @map_val={0x18, 0xd, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x700000}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xb}]}, &(0x7f0000001500)='GPL\x00', 0x4, 0xc0, &(0x7f0000001540)=""/192, 0x1e00, 0x42, '\x00', r15, 0x0, r13, 0x8, &(0x7f0000001600)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001640)={0x5, 0x2, 0x9, 0x8f7d}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001680)=[r16, r9, r17, r2], &(0x7f00000016c0)=[{0x4, 0x2, 0x5, 0x2}], 0x10, 0x7f, @void, @value}, 0x94) ioctl$TUNSETDEBUG(r5, 0x400454c9, &(0x7f00000017c0)=0x2c) 122.243588ms ago: executing program 1 (id=3053): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="b702000024000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d83b23dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e1a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c11160fb20b1c581e7b0915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab3aa32f948c06b59b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cae1bd4f4390af9a9ceafd07ed00b0000002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e26d0a5752813bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a7237841cef384b22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72c7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9624d37c10223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b9557aeb62ecd1446a470dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c74f0e2a9bf62ffec6459db40000000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced84680900000000000000d16d7d9158ffffffff00000000ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d2782a70cf44ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894edff8249dc1e3428d2129369ee1b85af1eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038deb359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd20785f653b621491dc6aaee0d40973109644fb94c06006e3c1be2f633c1d987591ec3db58a7bb3042ec3f77abb21338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e155f455010b0cb578af7dc7d5e87d4cd376444e2de02f47c61e8e84ff828de453f3489460fd83210e95307e676e1fb4d5865c0ca177a4c7fbb4e62b4450900576b2b5cc7f819abd0f885cc4806f47ffb966fcf1e54f5a2d3875e46000000000000e734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d3676329a18cda690d192a070886df42b2708398773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169cdfaa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c30930804fdc3690d10ecb65dc5b47481ed51a6359cade91fd645c6d924f36a86bf1eee2e8893e903054d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf817becd9e5a225d67521d1128eac7d80a6225c3e2f0932223bfbf69ff861f4394836ddf128d6d19079e64336e09000000c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f324661fdcfa68f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b98a8bf6c747d9a1cc500bb892c3a16ff10feea20bdac89afb758cf350000000000000000000000000200000000000000ed713df0c59e38928511a64845f1b21ed03369719fa905909d8ce35b42761c46d040e53a0a227e9cecd4d414231baa4894a13763ea5de7a52e61a588babaf5da9a28f477e032400938116cb294447898039724881de3ba3dd5e5e115b58d438b17ad11bf1b1f1ed057d89ec46b2b9bb434e9187a728d1136333958469b22d2126664b5299cc3167ac9a4d501638b978e1c692da5261dae5c9d13065b8ed8b358e7273dfa1e9a8dc1d16aa1edd0c274dedb7cd7e4753c152b4e0e3d124e561420587b9b00ab68c32d6b397c5e7cc4e803e6b6e8ed547e2875372023d111e64cd9ee3635888ecbc7352fd60f348456d74e9e7c09ee202dd09524ecfd3d8c836c0a13a9a45a7e2cec88fa2710ee35cded1b824fe4fe68849eee41b5e335aeec0f27053b3a07a001ffe29c5cc3a0ccdcc74330c2a995378d225495c5a543519d952c96da9257f47acc29c48d48b22b1f502b9d743d352de56efbb1b15158c4f0107ba5b3394d4cad4f0a1d31f694d0f559e7f82682775ec7569eeb7ef643dbcbafc4c1c5cbb0ad02dd2a69c5f2b5350049a817b546cf734a746a1cc147a6050b6dc2d16598e8e3a5c3515d0edc23e66bbdc6c117559357f49c59208af1162ba1d6667e3ab6bb1696c32dc3bcb2c8ab30d28265ff55c8a80c8e3ce29b2f576ea686d351a8cdb808739ed1a7022fb6e4e834593279c791085e49d1b8124adaf0010790e72ef2035e3da7ebb117c1a032a7378d5c62bb1a4e212618113bbd688091273028a44abfe09067e22fda361d6769d1f44bb06ca0cb9a14a54a8ba0dcb5445c4b368bd1dcce7500"/2367], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x1c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r9}, &(0x7f0000000180), &(0x7f00000001c0)=r8}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r11}, 0x10) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) 21.995599ms ago: executing program 2 (id=3054): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x5, 0x16, 0xb4, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0x13, &(0x7f0000000680)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xf}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa794}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff}], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x40f00, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000001da, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r4}, &(0x7f0000000740), &(0x7f0000000840)='%-5lx \x00'}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r7}, 0x10) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, 0x0, &(0x7f00000002c0)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r9}, 0x3d) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x12, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x5, 0x0, 0x0, 0x16, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r11}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x20000000000001dd, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x4) 0s ago: executing program 3 (id=3044): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x27, 0x0, 0x0, 0x9, 0x0, 0xfb8f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0}, 0x1e204, 0xcc, 0x9800, 0x4, 0x80, 0xfefffffc, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1e, 0x3, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[], 0x48) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x22, 0x0, 0x6, &(0x7f0000000040)={0x0, 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="0f00000004000000080000000800000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000000000feffffff00"/20, @ANYRES32=0x0, @ANYBLOB="057c96c36a53b05e5784d9a3e11e7099db730cbc82f9d59c1754685fca8bab9bf36c6b63333b98bff2cba5b8a344d0fc1550bf4c00ee7005ed734b6aba6395ff3eefa6e2bcf4ee6a98f41b7c384bcf7cb2d5609a25cf1867dbcb50fc1102b60ad99a00b87690662903fb5e0c0769fc43970b9ef75207ca6de837f9c23a6a288fa31ad3bb1ef89e3a6770e7298ec61eeb32efcae9f3111c6462d7", @ANYBLOB="00000000000000a602000000357100000000000000000000000000008aedbf671bcec8410715304fb965995f50eb877cb672eee6e7c44824126c1819a4cf01a6d682020d0feab85fe6892f1e64ee3ec2c92f8234ff81"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000010000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="180800000000000000000000000000008500000023000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) sendmsg$unix(r5, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe49) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES16=r3, @ANYRES32=r2, @ANYRES16=r0, @ANYBLOB='\x00'/28, @ANYBLOB="e663e26c58c97976ef5057a6470c8e5f8f8fc3858861d7f237e8ba4493041c6f16a57866cf60d7eb5f7833eeec81fb2e5eb4fb1db734956ae9bd06d5101da246af71aee550fc2b8babca0f0b78c454957918278b94a7d5276ec680290bc51d1915734618b16c74fa89d7ce3927e969d9d9bc894f4922b6ee8df62a3fc5f8d81b9126d9fdcee61efb8486bf4f5abf23a5425f8045794bf8471a06ee96c18aaf9454bf7a4240cb587968", @ANYBLOB="93e97f20b5fa937df03d2c09f9f9e68088517d3c3b6a7df693298dcea197d5778f12c34d3524cfaa52539ff4f5f00b8ebf0c9964ef1bb5c34607b75cb8dab9831af9f6e62d29a443980636599fa2f485281b5f33d476f4ccf80c6d547ae3007eb0b4f6f9"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r7}, &(0x7f0000000540), &(0x7f0000000580)=r8}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r7, &(0x7f0000000780)}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r1, 0x58, &(0x7f0000000200)}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="184200000000000000000000000000001801000020646c4300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@abs, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000700)=""/42, 0x2a}, {&(0x7f0000000780)=""/46, 0x2e}, {&(0x7f0000000a80)=""/255, 0xff}, {&(0x7f0000000cc0)=""/231, 0xe7}, {&(0x7f0000000800)=""/40, 0x28}, {&(0x7f0000000840)=""/33, 0x21}], 0x6}, 0x0) kernel console output (not intermixed with test programs): ][ T4453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 141.653090][ T4453] Call Trace: [ 141.656394][ T4453] __dump_stack+0x21/0x24 [ 141.660760][ T4453] dump_stack_lvl+0x169/0x1d8 [ 141.665453][ T4453] ? show_regs_print_info+0x18/0x18 [ 141.670657][ T4453] ? kvm_sched_clock_read+0x18/0x40 [ 141.675863][ T4453] ? sched_clock_cpu+0x1b/0x3d0 [ 141.680719][ T4453] ? sched_clock+0x3a/0x40 [ 141.685192][ T4453] ? sched_clock_cpu+0x1b/0x3d0 [ 141.690083][ T4453] dump_stack+0x15/0x1c [ 141.694244][ T4453] should_fail+0x3c1/0x510 [ 141.698666][ T4453] should_fail_usercopy+0x1a/0x20 [ 141.703694][ T4453] _copy_from_user+0x20/0xd0 [ 141.708431][ T4453] kstrtouint_from_user+0xbe/0x200 [ 141.713546][ T4453] ? kstrtol_from_user+0x260/0x260 [ 141.718669][ T4453] ? avc_policy_seqno+0x2b/0x70 [ 141.723536][ T4453] ? selinux_file_permission+0x2a5/0x510 [ 141.729176][ T4453] proc_fail_nth_write+0x85/0x1f0 [ 141.734208][ T4453] ? proc_fail_nth_read+0x210/0x210 [ 141.739416][ T4453] ? rw_verify_area+0x1c0/0x360 [ 141.744272][ T4453] ? proc_fail_nth_read+0x210/0x210 [ 141.749479][ T4453] vfs_write+0x32d/0xd60 [ 141.753726][ T4453] ? kernel_write+0x3c0/0x3c0 [ 141.758407][ T4453] ? __kasan_check_write+0x14/0x20 [ 141.763541][ T4453] ? mutex_lock+0x8c/0xe0 [ 141.767988][ T4453] ? mutex_trylock+0xa0/0xa0 [ 141.772599][ T4453] ? __fget_files+0x2c4/0x320 [ 141.777269][ T4453] ? __fdget_pos+0x2d2/0x380 [ 141.781847][ T4453] ? ksys_write+0x71/0x240 [ 141.786251][ T4453] ksys_write+0x140/0x240 [ 141.790584][ T4453] ? __ia32_sys_read+0x90/0x90 [ 141.795341][ T4453] __x64_sys_write+0x7b/0x90 [ 141.799919][ T4453] do_syscall_64+0x31/0x40 [ 141.804501][ T4453] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 141.810374][ T4453] RIP: 0033:0x7f38b2d7841f [ 141.814775][ T4453] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 141.834363][ T4453] RSP: 002b:00007f38b13e2030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 141.842851][ T4453] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f38b2d7841f [ 141.850808][ T4453] RDX: 0000000000000001 RSI: 00007f38b13e20a0 RDI: 0000000000000008 [ 141.858770][ T4453] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 141.866774][ T4453] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 141.874730][ T4453] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 144.680802][ T24] audit: type=1400 audit(1748289635.300:148): avc: denied { ioctl } for pid=4517 comm="syz.2.1291" path="pid:[4026532402]" dev="nsfs" ino=4026532402 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 145.460083][ T4540] FAULT_INJECTION: forcing a failure. [ 145.460083][ T4540] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.639662][ T4540] CPU: 0 PID: 4540 Comm: syz.3.1297 Tainted: G W 5.10.237-syzkaller #0 [ 145.649330][ T4540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 145.659480][ T4540] Call Trace: [ 145.662784][ T4540] __dump_stack+0x21/0x24 [ 145.667126][ T4540] dump_stack_lvl+0x169/0x1d8 [ 145.671809][ T4540] ? show_regs_print_info+0x18/0x18 [ 145.677022][ T4540] dump_stack+0x15/0x1c [ 145.681275][ T4540] should_fail+0x3c1/0x510 [ 145.685702][ T4540] should_fail_usercopy+0x1a/0x20 [ 145.690725][ T4540] strncpy_from_user+0x24/0x2e0 [ 145.695583][ T4540] bpf_prog_load+0x15d/0x1420 [ 145.700264][ T4540] ? avc_has_perm+0x234/0x360 [ 145.704947][ T4540] ? avc_has_perm_noaudit+0x240/0x240 [ 145.710323][ T4540] ? map_freeze+0x320/0x320 [ 145.714880][ T4540] ? selinux_bpf+0xc7/0xf0 [ 145.719300][ T4540] ? security_bpf+0x82/0xa0 [ 145.723810][ T4540] __se_sys_bpf+0x442/0x680 [ 145.728317][ T4540] ? __x64_sys_bpf+0x90/0x90 [ 145.732930][ T4540] __x64_sys_bpf+0x7b/0x90 [ 145.737505][ T4540] do_syscall_64+0x31/0x40 [ 145.741933][ T4540] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 145.747922][ T4540] RIP: 0033:0x7f637cf70969 [ 145.752346][ T4540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.772076][ T4540] RSP: 002b:00007f637b5d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 145.780487][ T4540] RAX: ffffffffffffffda RBX: 00007f637d197fa0 RCX: 00007f637cf70969 [ 145.788453][ T4540] RDX: 0000000000000080 RSI: 0000200000000040 RDI: 0000000000000005 [ 145.796416][ T4540] RBP: 00007f637b5d9090 R08: 0000000000000000 R09: 0000000000000000 [ 145.804378][ T4540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.812379][ T4540] R13: 0000000000000001 R14: 00007f637d197fa0 R15: 00007fffd000d5f8 [ 146.650945][ T4573] device syzkaller0 entered promiscuous mode [ 147.749729][ T4608] FAULT_INJECTION: forcing a failure. [ 147.749729][ T4608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 147.813958][ T4608] CPU: 1 PID: 4608 Comm: syz.2.1318 Tainted: G W 5.10.237-syzkaller #0 [ 147.823541][ T4608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 147.833606][ T4608] Call Trace: [ 147.836924][ T4608] __dump_stack+0x21/0x24 [ 147.841261][ T4608] dump_stack_lvl+0x169/0x1d8 [ 147.845945][ T4608] ? show_regs_print_info+0x18/0x18 [ 147.851146][ T4608] ? kvm_sched_clock_read+0x18/0x40 [ 147.856361][ T4608] ? sched_clock+0x3a/0x40 [ 147.860785][ T4608] dump_stack+0x15/0x1c [ 147.864951][ T4608] should_fail+0x3c1/0x510 [ 147.869384][ T4608] should_fail_alloc_page+0x4f/0x60 [ 147.874602][ T4608] __alloc_pages_nodemask+0x109/0x5f0 [ 147.880104][ T4608] ? irq_exit_rcu+0x9/0x10 [ 147.884542][ T4608] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 147.890101][ T4608] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 147.896263][ T4608] ? _raw_spin_trylock_bh+0x130/0x130 [ 147.901703][ T4608] __get_free_pages+0xe/0x30 [ 147.906399][ T4608] kasan_populate_vmalloc_pte+0x29/0x120 [ 147.912043][ T4608] __apply_to_page_range+0x74e/0x9e0 [ 147.917340][ T4608] ? kasan_populate_vmalloc+0x70/0x70 [ 147.922730][ T4608] ? kasan_populate_vmalloc+0x70/0x70 [ 147.928119][ T4608] apply_to_page_range+0x3b/0x50 [ 147.933106][ T4608] kasan_populate_vmalloc+0x60/0x70 [ 147.938327][ T4608] alloc_vmap_area+0x1734/0x1870 [ 147.943436][ T4608] ? vm_map_ram+0x9c0/0x9c0 [ 147.947955][ T4608] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 147.953516][ T4608] ? sched_clock+0x3a/0x40 [ 147.957930][ T4608] ? __get_vm_area_node+0x113/0x450 [ 147.963131][ T4608] __get_vm_area_node+0x147/0x450 [ 147.968257][ T4608] __vmalloc_node_range+0xe0/0x780 [ 147.973374][ T4608] ? reuseport_array_alloc+0x16e/0x260 [ 147.978837][ T4608] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 147.984994][ T4608] bpf_map_area_alloc+0xd5/0xe0 [ 147.989841][ T4608] ? reuseport_array_alloc+0x16e/0x260 [ 147.995332][ T4608] reuseport_array_alloc+0x16e/0x260 [ 148.000623][ T4608] ? reuseport_array_alloc_check+0x90/0x90 [ 148.006506][ T4608] ? array_map_alloc_check+0x284/0x390 [ 148.011956][ T4608] map_create+0x441/0x2190 [ 148.016363][ T4608] __se_sys_bpf+0x203/0x680 [ 148.020851][ T4608] ? __x64_sys_bpf+0x90/0x90 [ 148.025433][ T4608] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 148.031570][ T4608] __x64_sys_bpf+0x7b/0x90 [ 148.035987][ T4608] do_syscall_64+0x31/0x40 [ 148.040404][ T4608] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 148.046293][ T4608] RIP: 0033:0x7fae2e817969 [ 148.050717][ T4608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.070633][ T4608] RSP: 002b:00007fae2ce80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 148.079042][ T4608] RAX: ffffffffffffffda RBX: 00007fae2ea3efa0 RCX: 00007fae2e817969 [ 148.087030][ T4608] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 148.095000][ T4608] RBP: 00007fae2ce80090 R08: 0000000000000000 R09: 0000000000000000 [ 148.102960][ T4608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.110922][ T4608] R13: 0000000000000000 R14: 00007fae2ea3efa0 R15: 00007ffff66b50e8 [ 150.353886][ T4692] FAULT_INJECTION: forcing a failure. [ 150.353886][ T4692] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 150.426795][ T4692] CPU: 1 PID: 4692 Comm: syz.4.1347 Tainted: G W 5.10.237-syzkaller #0 [ 150.436456][ T4692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 150.446501][ T4692] Call Trace: [ 150.449788][ T4692] __dump_stack+0x21/0x24 [ 150.454106][ T4692] dump_stack_lvl+0x169/0x1d8 [ 150.458781][ T4692] ? show_regs_print_info+0x18/0x18 [ 150.464054][ T4692] dump_stack+0x15/0x1c [ 150.468196][ T4692] should_fail+0x3c1/0x510 [ 150.472610][ T4692] should_fail_alloc_page+0x4f/0x60 [ 150.477886][ T4692] __alloc_pages_nodemask+0x109/0x5f0 [ 150.483249][ T4692] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 150.488779][ T4692] ? slab_post_alloc_hook+0x5d/0x2f0 [ 150.494137][ T4692] ? __kmalloc+0x1a7/0x330 [ 150.498553][ T4692] ? __vmalloc_node_range+0x29f/0x780 [ 150.503914][ T4692] __vmalloc_node_range+0x353/0x780 [ 150.509100][ T4692] bpf_map_area_alloc+0xd5/0xe0 [ 150.513933][ T4692] ? reuseport_array_alloc+0x16e/0x260 [ 150.519377][ T4692] reuseport_array_alloc+0x16e/0x260 [ 150.524658][ T4692] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 150.530451][ T4692] ? reuseport_array_alloc_check+0x90/0x90 [ 150.536245][ T4692] ? array_map_alloc_check+0x284/0x390 [ 150.541698][ T4692] map_create+0x441/0x2190 [ 150.546205][ T4692] __se_sys_bpf+0x203/0x680 [ 150.550777][ T4692] ? __x64_sys_bpf+0x90/0x90 [ 150.555357][ T4692] __x64_sys_bpf+0x7b/0x90 [ 150.559760][ T4692] do_syscall_64+0x31/0x40 [ 150.564163][ T4692] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 150.570040][ T4692] RIP: 0033:0x7f38b2d79969 [ 150.574453][ T4692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.594059][ T4692] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 150.602465][ T4692] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 150.610423][ T4692] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 150.618468][ T4692] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 150.626429][ T4692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 150.634388][ T4692] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 155.424216][ T4883] syz.4.1405[4883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.424278][ T4883] syz.4.1405[4883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.306607][ T4913] FAULT_INJECTION: forcing a failure. [ 156.306607][ T4913] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.424331][ T4913] CPU: 1 PID: 4913 Comm: syz.3.1414 Tainted: G W 5.10.237-syzkaller #0 [ 156.433906][ T4913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 156.443974][ T4913] Call Trace: [ 156.447280][ T4913] __dump_stack+0x21/0x24 [ 156.451617][ T4913] dump_stack_lvl+0x169/0x1d8 [ 156.456335][ T4913] ? show_regs_print_info+0x18/0x18 [ 156.461645][ T4913] dump_stack+0x15/0x1c [ 156.465806][ T4913] should_fail+0x3c1/0x510 [ 156.470225][ T4913] should_fail_alloc_page+0x4f/0x60 [ 156.475433][ T4913] __alloc_pages_nodemask+0x109/0x5f0 [ 156.480815][ T4913] ? irq_exit_rcu+0x9/0x10 [ 156.485238][ T4913] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 156.490797][ T4913] ? _raw_spin_trylock_bh+0x130/0x130 [ 156.496178][ T4913] ? kasan_check_range+0x173/0x290 [ 156.501303][ T4913] __get_free_pages+0xe/0x30 [ 156.505906][ T4913] kasan_populate_vmalloc_pte+0x29/0x120 [ 156.511555][ T4913] __apply_to_page_range+0x74e/0x9e0 [ 156.516855][ T4913] ? kasan_populate_vmalloc+0x70/0x70 [ 156.522254][ T4913] ? kasan_populate_vmalloc+0x70/0x70 [ 156.527640][ T4913] apply_to_page_range+0x3b/0x50 [ 156.532595][ T4913] kasan_populate_vmalloc+0x60/0x70 [ 156.537811][ T4913] alloc_vmap_area+0x1734/0x1870 [ 156.542779][ T4913] ? vm_map_ram+0x9c0/0x9c0 [ 156.547336][ T4913] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 156.552895][ T4913] ? selinux_capable+0x29c/0x380 [ 156.557855][ T4913] ? __get_vm_area_node+0x113/0x450 [ 156.563068][ T4913] __get_vm_area_node+0x147/0x450 [ 156.568107][ T4913] __vmalloc_node_range+0xe0/0x780 [ 156.573231][ T4913] ? reuseport_array_alloc+0x16e/0x260 [ 156.578702][ T4913] ? cap_capable+0x19c/0x220 [ 156.583313][ T4913] bpf_map_area_alloc+0xd5/0xe0 [ 156.588169][ T4913] ? reuseport_array_alloc+0x16e/0x260 [ 156.593645][ T4913] reuseport_array_alloc+0x16e/0x260 [ 156.598941][ T4913] ? reuseport_array_alloc_check+0x90/0x90 [ 156.604748][ T4913] ? array_map_alloc_check+0x284/0x390 [ 156.610207][ T4913] map_create+0x441/0x2190 [ 156.614631][ T4913] __se_sys_bpf+0x203/0x680 [ 156.619245][ T4913] ? __x64_sys_bpf+0x90/0x90 [ 156.623840][ T4913] ? debug_smp_processor_id+0x17/0x20 [ 156.629218][ T4913] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 156.635375][ T4913] __x64_sys_bpf+0x7b/0x90 [ 156.639797][ T4913] do_syscall_64+0x31/0x40 [ 156.644228][ T4913] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 156.650123][ T4913] RIP: 0033:0x7f637cf70969 [ 156.654543][ T4913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.674168][ T4913] RSP: 002b:00007f637b5d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 156.682595][ T4913] RAX: ffffffffffffffda RBX: 00007f637d197fa0 RCX: 00007f637cf70969 [ 156.690569][ T4913] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 156.698537][ T4913] RBP: 00007f637b5d9090 R08: 0000000000000000 R09: 0000000000000000 [ 156.706536][ T4913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 156.714839][ T4913] R13: 0000000000000000 R14: 00007f637d197fa0 R15: 00007fffd000d5f8 [ 156.803391][ T4924] syz.3.1417[4924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.803492][ T4924] syz.3.1417[4924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.874532][ T4925] syz.3.1417[4925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.918283][ T24] audit: type=1400 audit(1748289648.540:149): avc: denied { create } for pid=4952 comm="syz.4.1426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 158.845146][ T4970] syz.3.1431[4970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.845209][ T4970] syz.3.1431[4970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.281374][ T4995] FAULT_INJECTION: forcing a failure. [ 161.281374][ T4995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 161.433585][ T4995] CPU: 1 PID: 4995 Comm: syz.1.1438 Tainted: G W 5.10.237-syzkaller #0 [ 161.443170][ T4995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 161.453246][ T4995] Call Trace: [ 161.456559][ T4995] __dump_stack+0x21/0x24 [ 161.460897][ T4995] dump_stack_lvl+0x169/0x1d8 [ 161.465584][ T4995] ? show_regs_print_info+0x18/0x18 [ 161.470788][ T4995] dump_stack+0x15/0x1c [ 161.474945][ T4995] should_fail+0x3c1/0x510 [ 161.479369][ T4995] should_fail_alloc_page+0x4f/0x60 [ 161.484586][ T4995] __alloc_pages_nodemask+0x109/0x5f0 [ 161.490003][ T4995] ? irq_exit_rcu+0x9/0x10 [ 161.494438][ T4995] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 161.499990][ T4995] ? _raw_spin_trylock_bh+0x130/0x130 [ 161.505366][ T4995] ? kasan_check_range+0x16e/0x290 [ 161.510591][ T4995] __get_free_pages+0xe/0x30 [ 161.515186][ T4995] kasan_populate_vmalloc_pte+0x29/0x120 [ 161.520820][ T4995] __apply_to_page_range+0x74e/0x9e0 [ 161.526109][ T4995] ? kasan_populate_vmalloc+0x70/0x70 [ 161.531491][ T4995] ? kasan_populate_vmalloc+0x70/0x70 [ 161.536880][ T4995] apply_to_page_range+0x3b/0x50 [ 161.541836][ T4995] kasan_populate_vmalloc+0x60/0x70 [ 161.547056][ T4995] alloc_vmap_area+0x1734/0x1870 [ 161.552012][ T4995] ? vm_map_ram+0x9c0/0x9c0 [ 161.556525][ T4995] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 161.562190][ T4995] ? __get_vm_area_node+0x113/0x450 [ 161.567394][ T4995] __get_vm_area_node+0x147/0x450 [ 161.572468][ T4995] __vmalloc_node_range+0xe0/0x780 [ 161.577586][ T4995] ? reuseport_array_alloc+0x16e/0x260 [ 161.583054][ T4995] bpf_map_area_alloc+0xd5/0xe0 [ 161.587913][ T4995] ? reuseport_array_alloc+0x16e/0x260 [ 161.593375][ T4995] reuseport_array_alloc+0x16e/0x260 [ 161.598668][ T4995] ? reuseport_array_alloc_check+0x90/0x90 [ 161.604477][ T4995] ? array_map_alloc_check+0x284/0x390 [ 161.609955][ T4995] map_create+0x441/0x2190 [ 161.614440][ T4995] __se_sys_bpf+0x203/0x680 [ 161.618958][ T4995] ? __x64_sys_bpf+0x90/0x90 [ 161.623569][ T4995] __x64_sys_bpf+0x7b/0x90 [ 161.627996][ T4995] do_syscall_64+0x31/0x40 [ 161.632418][ T4995] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 161.638307][ T4995] RIP: 0033:0x7ff716301969 [ 161.642726][ T4995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.662339][ T4995] RSP: 002b:00007ff71496a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 161.670859][ T4995] RAX: ffffffffffffffda RBX: 00007ff716528fa0 RCX: 00007ff716301969 [ 161.678835][ T4995] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 161.686898][ T4995] RBP: 00007ff71496a090 R08: 0000000000000000 R09: 0000000000000000 [ 161.694964][ T4995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 161.703026][ T4995] R13: 0000000000000000 R14: 00007ff716528fa0 R15: 00007ffeccd6a118 [ 162.498284][ T5019] device veth0_vlan left promiscuous mode [ 162.519803][ T5019] device veth0_vlan entered promiscuous mode [ 162.619896][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.638717][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.690288][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.008018][ T24] audit: type=1400 audit(1748289653.630:150): avc: denied { create } for pid=5044 comm="syz.3.1453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 164.969759][ T5090] device syzkaller0 entered promiscuous mode [ 165.400931][ T5107] FAULT_INJECTION: forcing a failure. [ 165.400931][ T5107] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 165.429088][ T5107] CPU: 0 PID: 5107 Comm: syz.3.1473 Tainted: G W 5.10.237-syzkaller #0 [ 165.438667][ T5107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 165.448729][ T5107] Call Trace: [ 165.452031][ T5107] __dump_stack+0x21/0x24 [ 165.456363][ T5107] dump_stack_lvl+0x169/0x1d8 [ 165.461042][ T5107] ? show_regs_print_info+0x18/0x18 [ 165.466247][ T5107] ? stack_map_peek_elem+0x22c/0x330 [ 165.471546][ T5107] dump_stack+0x15/0x1c [ 165.475715][ T5107] should_fail+0x3c1/0x510 [ 165.480135][ T5107] should_fail_usercopy+0x1a/0x20 [ 165.485165][ T5107] _copy_to_user+0x20/0x90 [ 165.489593][ T5107] map_lookup_elem+0x4a4/0x630 [ 165.494363][ T5107] __se_sys_bpf+0x3e3/0x680 [ 165.498867][ T5107] ? __x64_sys_bpf+0x90/0x90 [ 165.503466][ T5107] ? fpu__clear_all+0x20/0x20 [ 165.504345][ T5099] device pim6reg1 entered promiscuous mode [ 165.508145][ T5107] __x64_sys_bpf+0x7b/0x90 [ 165.508169][ T5107] do_syscall_64+0x31/0x40 [ 165.522871][ T5107] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 165.528768][ T5107] RIP: 0033:0x7f637cf70969 [ 165.533190][ T5107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.552895][ T5107] RSP: 002b:00007f637b5d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 165.561308][ T5107] RAX: ffffffffffffffda RBX: 00007f637d197fa0 RCX: 00007f637cf70969 [ 165.569288][ T5107] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000001 [ 165.577260][ T5107] RBP: 00007f637b5d9090 R08: 0000000000000000 R09: 0000000000000000 [ 165.585223][ T5107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.593184][ T5107] R13: 0000000000000000 R14: 00007f637d197fa0 R15: 00007fffd000d5f8 [ 165.956616][ T5125] device pim6reg1 entered promiscuous mode [ 165.969363][ T5130] syz.4.1481[5130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.969454][ T5130] syz.4.1481[5130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.657999][ T5156] FAULT_INJECTION: forcing a failure. [ 166.657999][ T5156] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 166.833736][ T5156] CPU: 0 PID: 5156 Comm: syz.2.1488 Tainted: G W 5.10.237-syzkaller #0 [ 166.843319][ T5156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 166.853385][ T5156] Call Trace: [ 166.856696][ T5156] __dump_stack+0x21/0x24 [ 166.861037][ T5156] dump_stack_lvl+0x169/0x1d8 [ 166.865720][ T5156] ? show_regs_print_info+0x18/0x18 [ 166.870931][ T5156] dump_stack+0x15/0x1c [ 166.875101][ T5156] should_fail+0x3c1/0x510 [ 166.879528][ T5156] should_fail_alloc_page+0x4f/0x60 [ 166.884875][ T5156] __alloc_pages_nodemask+0x109/0x5f0 [ 166.890261][ T5156] ? __irq_exit_rcu+0x40/0x150 [ 166.895032][ T5156] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 166.900594][ T5156] ? irq_exit_rcu+0x9/0x10 [ 166.905142][ T5156] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 166.910973][ T5156] __vmalloc_node_range+0x353/0x780 [ 166.916212][ T5156] bpf_map_area_alloc+0xd5/0xe0 [ 166.921150][ T5156] ? reuseport_array_alloc+0x16e/0x260 [ 166.926610][ T5156] reuseport_array_alloc+0x16e/0x260 [ 166.931905][ T5156] ? reuseport_array_alloc_check+0x90/0x90 [ 166.937726][ T5156] ? array_map_alloc_check+0x284/0x390 [ 166.943208][ T5156] map_create+0x441/0x2190 [ 166.947652][ T5156] __se_sys_bpf+0x203/0x680 [ 166.952163][ T5156] ? __x64_sys_bpf+0x90/0x90 [ 166.956763][ T5156] __x64_sys_bpf+0x7b/0x90 [ 166.961187][ T5156] do_syscall_64+0x31/0x40 [ 166.965619][ T5156] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.971596][ T5156] RIP: 0033:0x7fae2e817969 [ 166.976013][ T5156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.995626][ T5156] RSP: 002b:00007fae2ce80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 167.004044][ T5156] RAX: ffffffffffffffda RBX: 00007fae2ea3efa0 RCX: 00007fae2e817969 [ 167.012028][ T5156] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 167.020003][ T5156] RBP: 00007fae2ce80090 R08: 0000000000000000 R09: 0000000000000000 [ 167.027976][ T5156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 167.035948][ T5156] R13: 0000000000000000 R14: 00007fae2ea3efa0 R15: 00007ffff66b50e8 [ 167.468086][ T5171] device veth0_vlan left promiscuous mode [ 167.553418][ T5171] device veth0_vlan entered promiscuous mode [ 167.602798][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.635785][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.666914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.303185][ T5308] syz.1.1540[5308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.303242][ T5308] syz.1.1540[5308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.575807][ T5321] syz.0.1545[5321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.613272][ T5321] syz.0.1545[5321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.236407][ T5348] device syzkaller0 entered promiscuous mode [ 171.760894][ T5374] syz.4.1558[5374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.760954][ T5374] syz.4.1558[5374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.087696][ T5386] syz.4.1562[5386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.100268][ T5386] syz.4.1562[5386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.115128][ T5386] syz.4.1562[5386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.132618][ T5386] syz.4.1562[5386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.414556][ T5424] syz.3.1573[5424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.452966][ T5424] syz.3.1573[5424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.019410][ T5443] syz.3.1578[5443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.143098][ T5443] syz.3.1578[5443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.505738][ T5482] device syzkaller0 entered promiscuous mode [ 176.547308][ T5529] device sit0 left promiscuous mode [ 176.572274][ T5529] device sit0 entered promiscuous mode [ 176.913333][ T5544] device syzkaller0 entered promiscuous mode [ 177.256275][ T5573] syz.3.1622[5573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.256335][ T5573] syz.3.1622[5573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.474505][ T5579] device wg2 entered promiscuous mode [ 177.659816][ T5582] ÿÿÿÿÿÿ: renamed from vlan1 [ 179.355355][ T5654] FAULT_INJECTION: forcing a failure. [ 179.355355][ T5654] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 179.389497][ T5654] CPU: 0 PID: 5654 Comm: syz.2.1648 Tainted: G W 5.10.237-syzkaller #0 [ 179.399088][ T5654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 179.409150][ T5654] Call Trace: [ 179.412461][ T5654] __dump_stack+0x21/0x24 [ 179.416809][ T5654] dump_stack_lvl+0x169/0x1d8 [ 179.421500][ T5654] ? show_regs_print_info+0x18/0x18 [ 179.426722][ T5654] dump_stack+0x15/0x1c [ 179.430895][ T5654] should_fail+0x3c1/0x510 [ 179.435361][ T5654] should_fail_alloc_page+0x4f/0x60 [ 179.440574][ T5654] __alloc_pages_nodemask+0x109/0x5f0 [ 179.445967][ T5654] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 179.451535][ T5654] ? __kmalloc+0x1a7/0x330 [ 179.455968][ T5654] ? __vmalloc_node_range+0x29f/0x780 [ 179.461537][ T5654] __vmalloc_node_range+0x353/0x780 [ 179.466762][ T5654] bpf_map_area_alloc+0xd5/0xe0 [ 179.467186][ T5656] device syzkaller0 entered promiscuous mode [ 179.471619][ T5654] ? reuseport_array_alloc+0x16e/0x260 [ 179.471629][ T5654] reuseport_array_alloc+0x16e/0x260 [ 179.471639][ T5654] ? reuseport_array_alloc_check+0x90/0x90 [ 179.471660][ T5654] ? array_map_alloc_check+0x284/0x390 [ 179.499779][ T5654] map_create+0x441/0x2190 [ 179.504210][ T5654] __se_sys_bpf+0x203/0x680 [ 179.508726][ T5654] ? __x64_sys_bpf+0x90/0x90 [ 179.513331][ T5654] __x64_sys_bpf+0x7b/0x90 [ 179.517757][ T5654] do_syscall_64+0x31/0x40 [ 179.522187][ T5654] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 179.528084][ T5654] RIP: 0033:0x7fae2e817969 [ 179.532526][ T5654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 179.552234][ T5654] RSP: 002b:00007fae2ce80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 179.560729][ T5654] RAX: ffffffffffffffda RBX: 00007fae2ea3efa0 RCX: 00007fae2e817969 [ 179.568713][ T5654] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 179.576678][ T5654] RBP: 00007fae2ce80090 R08: 0000000000000000 R09: 0000000000000000 [ 179.584639][ T5654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 179.592614][ T5654] R13: 0000000000000000 R14: 00007fae2ea3efa0 R15: 00007ffff66b50e8 [ 179.818774][ T24] audit: type=1400 audit(1748289670.440:151): avc: denied { create } for pid=5666 comm="syz.3.1652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 179.999841][ T5676] device syzkaller0 entered promiscuous mode [ 180.512927][ T5688] device sit0 left promiscuous mode [ 180.625344][ T5692] FAULT_INJECTION: forcing a failure. [ 180.625344][ T5692] name failslab, interval 1, probability 0, space 0, times 0 [ 180.663543][ T5692] CPU: 1 PID: 5692 Comm: syz.2.1661 Tainted: G W 5.10.237-syzkaller #0 [ 180.673236][ T5692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 180.683278][ T5692] Call Trace: [ 180.686566][ T5692] __dump_stack+0x21/0x24 [ 180.690878][ T5692] dump_stack_lvl+0x169/0x1d8 [ 180.695554][ T5692] ? show_regs_print_info+0x18/0x18 [ 180.700740][ T5692] dump_stack+0x15/0x1c [ 180.704896][ T5692] should_fail+0x3c1/0x510 [ 180.709299][ T5692] ? __alloc_skb+0x9e/0x520 [ 180.713876][ T5692] __should_failslab+0xa4/0xe0 [ 180.718645][ T5692] should_failslab+0x9/0x20 [ 180.723132][ T5692] kmem_cache_alloc+0x3d/0x2e0 [ 180.727882][ T5692] __alloc_skb+0x9e/0x520 [ 180.732197][ T5692] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 180.737472][ T5692] rtnetlink_event+0xd2/0x1a0 [ 180.742134][ T5692] raw_notifier_call_chain+0x90/0x100 [ 180.747492][ T5692] netdev_features_change+0x112/0x180 [ 180.752852][ T5692] ? dev_get_alias+0x80/0x80 [ 180.757425][ T5692] ? task_work_add+0x27/0x1e0 [ 180.762089][ T5692] netdev_update_features+0x35/0x50 [ 180.767270][ T5692] veth_xdp+0x452/0x5d0 [ 180.771409][ T5692] ? veth_set_rx_headroom+0x150/0x150 [ 180.776767][ T5692] bpf_xdp_link_release+0x300/0x490 [ 180.781964][ T5692] ? __netdev_adjacent_dev_remove+0x410/0x410 [ 180.788046][ T5692] ? radix_tree_delete_item+0x25c/0x360 [ 180.793586][ T5692] bpf_link_put+0x1f6/0x280 [ 180.798072][ T5692] ? bpf_prog_uncharge_memlock+0xc0/0xc0 [ 180.803691][ T5692] bpf_link_release+0x3b/0x40 [ 180.808352][ T5692] __fput+0x2fb/0x770 [ 180.812318][ T5692] ____fput+0x15/0x20 [ 180.816286][ T5692] task_work_run+0x127/0x190 [ 180.820862][ T5692] exit_to_user_mode_loop+0xcb/0xe0 [ 180.826046][ T5692] syscall_exit_to_user_mode+0x68/0x90 [ 180.831517][ T5692] do_syscall_64+0x3d/0x40 [ 180.835922][ T5692] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 180.841795][ T5692] RIP: 0033:0x7fae2e817969 [ 180.846199][ T5692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.865911][ T5692] RSP: 002b:00007fae2ce80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 180.874313][ T5692] RAX: 0000000000000000 RBX: 00007fae2ea3efa0 RCX: 00007fae2e817969 [ 180.882276][ T5692] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 180.890232][ T5692] RBP: 00007fae2ce80090 R08: 0000000000000000 R09: 0000000000000000 [ 180.898188][ T5692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.906232][ T5692] R13: 0000000000000000 R14: 00007fae2ea3efa0 R15: 00007ffff66b50e8 [ 180.931827][ T5680] device sit0 entered promiscuous mode [ 180.978134][ T5697] device sit0 entered promiscuous mode [ 181.856021][ T5733] syz.3.1675[5733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.856081][ T5733] syz.3.1675[5733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.073850][ T5760] device syzkaller0 entered promiscuous mode [ 183.759627][ T5803] FAULT_INJECTION: forcing a failure. [ 183.759627][ T5803] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 183.772905][ T5803] CPU: 0 PID: 5803 Comm: syz.0.1697 Tainted: G W 5.10.237-syzkaller #0 [ 183.782442][ T5803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 183.792494][ T5803] Call Trace: [ 183.795786][ T5803] __dump_stack+0x21/0x24 [ 183.800104][ T5803] dump_stack_lvl+0x169/0x1d8 [ 183.804769][ T5803] ? show_regs_print_info+0x18/0x18 [ 183.809951][ T5803] ? inet6_fill_ifla6_attrs+0x1367/0x2030 [ 183.815654][ T5803] dump_stack+0x15/0x1c [ 183.819796][ T5803] should_fail+0x3c1/0x510 [ 183.824198][ T5803] should_fail_alloc_page+0x4f/0x60 [ 183.829383][ T5803] __alloc_pages_nodemask+0x109/0x5f0 [ 183.834738][ T5803] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 183.840271][ T5803] new_slab+0x84/0x3f0 [ 183.844324][ T5803] ___slab_alloc+0x2a6/0x450 [ 183.848910][ T5803] ? netlink_trim+0x193/0x230 [ 183.853570][ T5803] ? rtnl_fill_prop_list+0x250/0x320 [ 183.858840][ T5803] __slab_alloc+0x63/0xa0 [ 183.863153][ T5803] ? netlink_trim+0x193/0x230 [ 183.867811][ T5803] ? netlink_trim+0x193/0x230 [ 183.872476][ T5803] __kmalloc_track_caller+0x1ef/0x320 [ 183.877856][ T5803] ? netlink_trim+0x193/0x230 [ 183.882538][ T5803] ? netlink_trim+0x193/0x230 [ 183.887221][ T5803] pskb_expand_head+0x123/0x1110 [ 183.892159][ T5803] netlink_trim+0x193/0x230 [ 183.896651][ T5803] netlink_broadcast_filtered+0x75/0x1290 [ 183.902392][ T5803] ? __kmalloc_track_caller+0x181/0x320 [ 183.907967][ T5803] ? kasan_unpoison+0x67/0x90 [ 183.912639][ T5803] ? rtmsg_ifinfo_build_skb+0xd8/0x180 [ 183.918087][ T5803] nlmsg_notify+0xed/0x1b0 [ 183.922499][ T5803] rtnetlink_event+0x13a/0x1a0 [ 183.927255][ T5803] raw_notifier_call_chain+0x90/0x100 [ 183.932612][ T5803] netdev_features_change+0x112/0x180 [ 183.937969][ T5803] ? dev_get_alias+0x80/0x80 [ 183.942560][ T5803] ? task_work_add+0x27/0x1e0 [ 183.947226][ T5803] netdev_update_features+0x35/0x50 [ 183.952409][ T5803] veth_xdp+0x452/0x5d0 [ 183.956556][ T5803] ? veth_set_rx_headroom+0x150/0x150 [ 183.961916][ T5803] bpf_xdp_link_release+0x300/0x490 [ 183.967103][ T5803] ? __netdev_adjacent_dev_remove+0x410/0x410 [ 183.973157][ T5803] ? radix_tree_delete_item+0x25c/0x360 [ 183.978689][ T5803] bpf_link_put+0x1f6/0x280 [ 183.983182][ T5803] ? bpf_prog_uncharge_memlock+0xc0/0xc0 [ 183.988797][ T5803] bpf_link_release+0x3b/0x40 [ 183.993458][ T5803] __fput+0x2fb/0x770 [ 183.997430][ T5803] ____fput+0x15/0x20 [ 184.001398][ T5803] task_work_run+0x127/0x190 [ 184.005978][ T5803] exit_to_user_mode_loop+0xcb/0xe0 [ 184.011159][ T5803] syscall_exit_to_user_mode+0x68/0x90 [ 184.016605][ T5803] do_syscall_64+0x3d/0x40 [ 184.021008][ T5803] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 184.026882][ T5803] RIP: 0033:0x7f13b3be1969 [ 184.031298][ T5803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.050891][ T5803] RSP: 002b:00007f13b224a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 184.059328][ T5803] RAX: 0000000000000000 RBX: 00007f13b3e08fa0 RCX: 00007f13b3be1969 [ 184.067292][ T5803] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 184.075252][ T5803] RBP: 00007f13b224a090 R08: 0000000000000000 R09: 0000000000000000 [ 184.083221][ T5803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.091188][ T5803] R13: 0000000000000000 R14: 00007f13b3e08fa0 R15: 00007ffe80db1538 [ 184.151377][ T5806] device syzkaller0 entered promiscuous mode [ 184.161695][ T5808] syz.2.1700[5808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.161755][ T5808] syz.2.1700[5808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.620675][ T5822] ÿÿÿÿÿÿ: renamed from vlan1 [ 184.706742][ T5832] FAULT_INJECTION: forcing a failure. [ 184.706742][ T5832] name failslab, interval 1, probability 0, space 0, times 0 [ 184.731778][ T5832] CPU: 1 PID: 5832 Comm: syz.4.1709 Tainted: G W 5.10.237-syzkaller #0 [ 184.741354][ T5832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 184.751702][ T5832] Call Trace: [ 184.754992][ T5832] __dump_stack+0x21/0x24 [ 184.759307][ T5832] dump_stack_lvl+0x169/0x1d8 [ 184.763969][ T5832] ? thaw_kernel_threads+0x220/0x220 [ 184.769245][ T5832] ? show_regs_print_info+0x18/0x18 [ 184.774432][ T5832] dump_stack+0x15/0x1c [ 184.778576][ T5832] should_fail+0x3c1/0x510 [ 184.782987][ T5832] ? ethnl_default_notify+0xf7/0x5e0 [ 184.788525][ T5832] __should_failslab+0xa4/0xe0 [ 184.793276][ T5832] should_failslab+0x9/0x20 [ 184.797778][ T5832] __kmalloc+0x60/0x330 [ 184.802040][ T5832] ? ethnl_default_notify+0xbf/0x5e0 [ 184.807308][ T5832] ethnl_default_notify+0xf7/0x5e0 [ 184.812406][ T5832] ethtool_notify+0xc1/0x1a0 [ 184.816981][ T5832] ethnl_netdev_event+0x58/0x70 [ 184.821815][ T5832] raw_notifier_call_chain+0x90/0x100 [ 184.827173][ T5832] netdev_features_change+0x112/0x180 [ 184.832532][ T5832] ? dev_get_alias+0x80/0x80 [ 184.837109][ T5832] ? task_work_add+0x27/0x1e0 [ 184.841775][ T5832] netdev_update_features+0x35/0x50 [ 184.846958][ T5832] veth_xdp+0x452/0x5d0 [ 184.851101][ T5832] ? veth_set_rx_headroom+0x150/0x150 [ 184.856459][ T5832] bpf_xdp_link_release+0x300/0x490 [ 184.861640][ T5832] ? __netdev_adjacent_dev_remove+0x410/0x410 [ 184.867718][ T5832] ? radix_tree_delete_item+0x25c/0x360 [ 184.873263][ T5832] bpf_link_put+0x1f6/0x280 [ 184.877757][ T5832] ? bpf_prog_uncharge_memlock+0xc0/0xc0 [ 184.883386][ T5832] bpf_link_release+0x3b/0x40 [ 184.888068][ T5832] __fput+0x2fb/0x770 [ 184.892046][ T5832] ____fput+0x15/0x20 [ 184.896021][ T5832] task_work_run+0x127/0x190 [ 184.900605][ T5832] exit_to_user_mode_loop+0xcb/0xe0 [ 184.905792][ T5832] syscall_exit_to_user_mode+0x68/0x90 [ 184.911235][ T5832] do_syscall_64+0x3d/0x40 [ 184.915638][ T5832] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 184.921512][ T5832] RIP: 0033:0x7f38b2d79969 [ 184.925914][ T5832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.945710][ T5832] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 184.954115][ T5832] RAX: 0000000000000000 RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 184.962074][ T5832] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 184.970028][ T5832] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 184.977985][ T5832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.985974][ T5832] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 185.251097][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.292596][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.343277][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.552161][ T5888] FAULT_INJECTION: forcing a failure. [ 185.552161][ T5888] name failslab, interval 1, probability 0, space 0, times 0 [ 185.582958][ T5888] CPU: 0 PID: 5888 Comm: syz.3.1725 Tainted: G W 5.10.237-syzkaller #0 [ 185.592529][ T5888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 185.602582][ T5888] Call Trace: [ 185.605880][ T5888] __dump_stack+0x21/0x24 [ 185.610213][ T5888] dump_stack_lvl+0x169/0x1d8 [ 185.614892][ T5888] ? thaw_kernel_threads+0x220/0x220 [ 185.620176][ T5888] ? do_syscall_64+0x3d/0x40 [ 185.624771][ T5888] ? show_regs_print_info+0x18/0x18 [ 185.629972][ T5888] dump_stack+0x15/0x1c [ 185.634131][ T5888] should_fail+0x3c1/0x510 [ 185.638547][ T5888] ? __alloc_skb+0x9e/0x520 [ 185.643138][ T5888] __should_failslab+0xa4/0xe0 [ 185.647903][ T5888] should_failslab+0x9/0x20 [ 185.652406][ T5888] kmem_cache_alloc+0x3d/0x2e0 [ 185.657176][ T5888] ? ethnl_bitset32_size+0x36/0x230 [ 185.662380][ T5888] __alloc_skb+0x9e/0x520 [ 185.666712][ T5888] ? features_reply_size+0x102/0x160 [ 185.672003][ T5888] ethnl_default_notify+0x225/0x5e0 [ 185.677204][ T5888] ethtool_notify+0xc1/0x1a0 [ 185.681810][ T5888] ethnl_netdev_event+0x58/0x70 [ 185.686701][ T5888] raw_notifier_call_chain+0x90/0x100 [ 185.692069][ T5888] netdev_features_change+0x112/0x180 [ 185.697437][ T5888] ? dev_get_alias+0x80/0x80 [ 185.702079][ T5888] netdev_update_features+0x35/0x50 [ 185.707271][ T5888] veth_xdp+0x452/0x5d0 [ 185.711416][ T5888] ? veth_set_rx_headroom+0x150/0x150 [ 185.716777][ T5888] bpf_xdp_link_release+0x300/0x490 [ 185.721965][ T5888] ? __netdev_adjacent_dev_remove+0x410/0x410 [ 185.728023][ T5888] ? radix_tree_delete_item+0x25c/0x360 [ 185.733559][ T5888] bpf_link_put+0x1f6/0x280 [ 185.738049][ T5888] ? bpf_prog_uncharge_memlock+0xc0/0xc0 [ 185.743670][ T5888] bpf_link_release+0x3b/0x40 [ 185.748339][ T5888] __fput+0x2fb/0x770 [ 185.752312][ T5888] ____fput+0x15/0x20 [ 185.756280][ T5888] task_work_run+0x127/0x190 [ 185.760860][ T5888] exit_to_user_mode_loop+0xcb/0xe0 [ 185.766045][ T5888] syscall_exit_to_user_mode+0x68/0x90 [ 185.771493][ T5888] do_syscall_64+0x3d/0x40 [ 185.775894][ T5888] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 185.781767][ T5888] RIP: 0033:0x7f637cf70969 [ 185.786169][ T5888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.805763][ T5888] RSP: 002b:00007f637b5d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 185.814163][ T5888] RAX: 0000000000000000 RBX: 00007f637d197fa0 RCX: 00007f637cf70969 [ 185.822118][ T5888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 185.830077][ T5888] RBP: 00007f637b5d9090 R08: 0000000000000000 R09: 0000000000000000 [ 185.838060][ T5888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.846020][ T5888] R13: 0000000000000000 R14: 00007f637d197fa0 R15: 00007fffd000d5f8 [ 185.857596][ T5889] !€ÿ: renamed from bond_slave_0 [ 186.442009][ T24] audit: type=1400 audit(1748289677.060:152): avc: denied { create } for pid=5926 comm="syz.0.1738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 187.590545][ T5953] device syzkaller0 entered promiscuous mode [ 187.686145][ T5983] device pim6reg1 entered promiscuous mode [ 188.392686][ T6011] device syzkaller0 entered promiscuous mode [ 189.402744][ T6050] syz.4.1776[6050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.406050][ T6050] syz.4.1776[6050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.339118][ T6071] device veth1_to_bond entered promiscuous mode [ 192.054788][ T6146] device veth0_vlan left promiscuous mode [ 192.129347][ T6146] device veth0_vlan entered promiscuous mode [ 192.191491][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.200153][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.208020][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.329305][ T6155] device sit0 left promiscuous mode [ 192.589286][ T6170] device veth0_vlan left promiscuous mode [ 192.604067][ T6170] device veth0_vlan entered promiscuous mode [ 192.615458][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.631715][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.656280][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 194.654535][ T6244] device syzkaller0 entered promiscuous mode [ 194.662423][ T6252] syz.2.1841[6252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.662482][ T6252] syz.2.1841[6252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.847378][ T6289] device veth0_vlan left promiscuous mode [ 195.864728][ T6289] device veth0_vlan entered promiscuous mode [ 196.762019][ T6313] device pim6reg1 entered promiscuous mode [ 196.915382][ T24] audit: type=1400 audit(1748289687.540:153): avc: denied { create } for pid=6317 comm="syz.0.1861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 197.042642][ T6316] device syzkaller0 entered promiscuous mode [ 197.896874][ T6335] FAULT_INJECTION: forcing a failure. [ 197.896874][ T6335] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.958754][ T6335] CPU: 1 PID: 6335 Comm: syz.3.1867 Tainted: G W 5.10.237-syzkaller #0 [ 197.968445][ T6335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 197.978505][ T6335] Call Trace: [ 197.981798][ T6335] __dump_stack+0x21/0x24 [ 197.986126][ T6335] dump_stack_lvl+0x169/0x1d8 [ 197.990800][ T6335] ? show_regs_print_info+0x18/0x18 [ 197.995998][ T6335] ? irq_exit_rcu+0x9/0x10 [ 198.000416][ T6335] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 198.006220][ T6335] dump_stack+0x15/0x1c [ 198.010370][ T6335] should_fail+0x3c1/0x510 [ 198.014781][ T6335] should_fail_alloc_page+0x4f/0x60 [ 198.019966][ T6335] __alloc_pages_nodemask+0x109/0x5f0 [ 198.025348][ T6335] ? __irq_exit_rcu+0x40/0x150 [ 198.030229][ T6335] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 198.035773][ T6335] ? irq_exit_rcu+0x9/0x10 [ 198.040187][ T6335] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 198.046002][ T6335] __vmalloc_node_range+0x353/0x780 [ 198.051365][ T6335] bpf_map_area_alloc+0xd5/0xe0 [ 198.056218][ T6335] ? reuseport_array_alloc+0x16e/0x260 [ 198.061686][ T6335] reuseport_array_alloc+0x16e/0x260 [ 198.066975][ T6335] ? reuseport_array_alloc_check+0x90/0x90 [ 198.072778][ T6335] ? reuseport_array_alloc_check+0x56/0x90 [ 198.078576][ T6335] ? array_map_alloc_check+0x284/0x390 [ 198.084031][ T6335] map_create+0x441/0x2190 [ 198.088436][ T6335] __se_sys_bpf+0x203/0x680 [ 198.092931][ T6335] ? __x64_sys_bpf+0x90/0x90 [ 198.097515][ T6335] ? debug_smp_processor_id+0x17/0x20 [ 198.102872][ T6335] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 198.108923][ T6335] __x64_sys_bpf+0x7b/0x90 [ 198.113329][ T6335] do_syscall_64+0x31/0x40 [ 198.117736][ T6335] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 198.123616][ T6335] RIP: 0033:0x7f637cf70969 [ 198.128042][ T6335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.147632][ T6335] RSP: 002b:00007f637b5d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 198.156039][ T6335] RAX: ffffffffffffffda RBX: 00007f637d197fa0 RCX: 00007f637cf70969 [ 198.163998][ T6335] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 198.171973][ T6335] RBP: 00007f637b5d9090 R08: 0000000000000000 R09: 0000000000000000 [ 198.180011][ T6335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.188063][ T6335] R13: 0000000000000000 R14: 00007f637d197fa0 R15: 00007fffd000d5f8 [ 198.764481][ T6364] device wg2 entered promiscuous mode [ 199.099491][ T6370] device syzkaller0 entered promiscuous mode [ 200.137413][ T6393] FAULT_INJECTION: forcing a failure. [ 200.137413][ T6393] name failslab, interval 1, probability 0, space 0, times 0 [ 200.163002][ T6393] CPU: 1 PID: 6393 Comm: syz.4.1885 Tainted: G W 5.10.237-syzkaller #0 [ 200.172578][ T6393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 200.182638][ T6393] Call Trace: [ 200.185942][ T6393] __dump_stack+0x21/0x24 [ 200.190274][ T6393] dump_stack_lvl+0x169/0x1d8 [ 200.194952][ T6393] ? thaw_kernel_threads+0x220/0x220 [ 200.200240][ T6393] ? show_regs_print_info+0x18/0x18 [ 200.205440][ T6393] ? stack_trace_save+0x98/0xe0 [ 200.210412][ T6393] ? stack_trace_snprint+0xf0/0xf0 [ 200.215527][ T6393] dump_stack+0x15/0x1c [ 200.219725][ T6393] should_fail+0x3c1/0x510 [ 200.224189][ T6393] ? dup_task_struct+0x57/0xbd0 [ 200.229059][ T6393] __should_failslab+0xa4/0xe0 [ 200.233839][ T6393] should_failslab+0x9/0x20 [ 200.238346][ T6393] kmem_cache_alloc+0x3d/0x2e0 [ 200.243113][ T6393] ? __kasan_check_write+0x14/0x20 [ 200.248227][ T6393] dup_task_struct+0x57/0xbd0 [ 200.253088][ T6393] ? __kasan_check_write+0x14/0x20 [ 200.258213][ T6393] ? recalc_sigpending+0x1ac/0x230 [ 200.263330][ T6393] copy_process+0x5af/0x3310 [ 200.267924][ T6393] ? memset+0x35/0x40 [ 200.271922][ T6393] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 200.278521][ T6393] ? proc_fail_nth_read+0x210/0x210 [ 200.283726][ T6393] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 200.288848][ T6393] ? rw_verify_area+0x1c0/0x360 [ 200.293700][ T6393] ? vfs_write+0xac8/0xd60 [ 200.298134][ T6393] ? __kasan_slab_free+0x11/0x20 [ 200.303073][ T6393] kernel_clone+0x23f/0x940 [ 200.307842][ T6393] ? kernel_write+0x3c0/0x3c0 [ 200.312524][ T6393] ? create_io_thread+0x130/0x130 [ 200.317644][ T6393] ? mutex_lock+0x8c/0xe0 [ 200.321981][ T6393] __x64_sys_clone+0x176/0x1d0 [ 200.326747][ T6393] ? __ia32_sys_vfork+0xf0/0xf0 [ 200.331593][ T6393] ? ksys_write+0x1eb/0x240 [ 200.336104][ T6393] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 200.342173][ T6393] do_syscall_64+0x31/0x40 [ 200.346608][ T6393] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 200.352500][ T6393] RIP: 0033:0x7f38b2d79969 [ 200.356918][ T6393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 200.376526][ T6393] RSP: 002b:00007f38b13e1fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 200.385138][ T6393] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 200.393136][ T6393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000041200000 [ 200.401117][ T6393] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 200.409091][ T6393] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 200.417069][ T6393] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 201.537500][ T6410] FAULT_INJECTION: forcing a failure. [ 201.537500][ T6410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 201.601517][ T6410] CPU: 1 PID: 6410 Comm: syz.1.1891 Tainted: G W 5.10.237-syzkaller #0 [ 201.611089][ T6410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 201.621146][ T6410] Call Trace: [ 201.624446][ T6410] __dump_stack+0x21/0x24 [ 201.628783][ T6410] dump_stack_lvl+0x169/0x1d8 [ 201.633464][ T6410] ? thaw_kernel_threads+0x220/0x220 [ 201.638749][ T6410] ? vsnprintf+0x1871/0x1960 [ 201.643346][ T6410] ? show_regs_print_info+0x18/0x18 [ 201.648554][ T6410] dump_stack+0x15/0x1c [ 201.652714][ T6410] should_fail+0x3c1/0x510 [ 201.657133][ T6410] should_fail_usercopy+0x1a/0x20 [ 201.662153][ T6410] _copy_to_user+0x20/0x90 [ 201.666577][ T6410] simple_read_from_buffer+0xe9/0x160 [ 201.671952][ T6410] proc_fail_nth_read+0x19a/0x210 [ 201.676989][ T6410] ? proc_fault_inject_write+0x2f0/0x2f0 [ 201.682633][ T6410] ? rw_verify_area+0x1c0/0x360 [ 201.687490][ T6410] ? proc_fault_inject_write+0x2f0/0x2f0 [ 201.693121][ T6410] vfs_read+0x1fe/0xa10 [ 201.697280][ T6410] ? kernel_read+0x70/0x70 [ 201.701699][ T6410] ? __kasan_check_write+0x14/0x20 [ 201.706804][ T6410] ? mutex_lock+0x8c/0xe0 [ 201.711131][ T6410] ? mutex_trylock+0xa0/0xa0 [ 201.715722][ T6410] ? __fget_files+0x2c4/0x320 [ 201.720400][ T6410] ? __fdget_pos+0x2d2/0x380 [ 201.724992][ T6410] ? ksys_read+0x71/0x240 [ 201.729344][ T6410] ksys_read+0x140/0x240 [ 201.733588][ T6410] ? vfs_write+0xd60/0xd60 [ 201.738009][ T6410] ? fpu__clear_all+0x20/0x20 [ 201.742689][ T6410] ? __se_sys_ioctl+0x184/0x1a0 [ 201.747539][ T6410] __x64_sys_read+0x7b/0x90 [ 201.752126][ T6410] do_syscall_64+0x31/0x40 [ 201.756548][ T6410] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 201.762529][ T6410] RIP: 0033:0x7ff71630037c [ 201.766940][ T6410] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 201.786556][ T6410] RSP: 002b:00007ff71496a030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 201.794994][ T6410] RAX: ffffffffffffffda RBX: 00007ff716528fa0 RCX: 00007ff71630037c [ 201.802968][ T6410] RDX: 000000000000000f RSI: 00007ff71496a0a0 RDI: 0000000000000006 [ 201.810942][ T6410] RBP: 00007ff71496a090 R08: 0000000000000000 R09: 0000000000000000 [ 201.818917][ T6410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.826894][ T6410] R13: 0000000000000000 R14: 00007ff716528fa0 R15: 00007ffeccd6a118 [ 203.558007][ T6458] FAULT_INJECTION: forcing a failure. [ 203.558007][ T6458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 203.571550][ T6458] CPU: 1 PID: 6458 Comm: syz.3.1906 Tainted: G W 5.10.237-syzkaller #0 [ 203.581097][ T6458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 203.591158][ T6458] Call Trace: [ 203.594469][ T6458] __dump_stack+0x21/0x24 [ 203.598886][ T6458] dump_stack_lvl+0x169/0x1d8 [ 203.603582][ T6458] ? show_regs_print_info+0x18/0x18 [ 203.608786][ T6458] dump_stack+0x15/0x1c [ 203.613096][ T6458] should_fail+0x3c1/0x510 [ 203.617895][ T6458] should_fail_alloc_page+0x4f/0x60 [ 203.623098][ T6458] __alloc_pages_nodemask+0x109/0x5f0 [ 203.628475][ T6458] ? __irq_exit_rcu+0x40/0x150 [ 203.633245][ T6458] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 203.638795][ T6458] ? irq_exit_rcu+0x9/0x10 [ 203.643214][ T6458] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 203.649029][ T6458] __vmalloc_node_range+0x353/0x780 [ 203.654248][ T6458] bpf_map_area_alloc+0xd5/0xe0 [ 203.659098][ T6458] ? reuseport_array_alloc+0x16e/0x260 [ 203.664552][ T6458] reuseport_array_alloc+0x16e/0x260 [ 203.669843][ T6458] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 203.675638][ T6458] ? reuseport_array_alloc_check+0x90/0x90 [ 203.681916][ T6458] ? array_map_alloc_check+0x284/0x390 [ 203.687478][ T6458] map_create+0x441/0x2190 [ 203.691899][ T6458] __se_sys_bpf+0x203/0x680 [ 203.696395][ T6458] ? __x64_sys_bpf+0x90/0x90 [ 203.700981][ T6458] ? debug_smp_processor_id+0x17/0x20 [ 203.706340][ T6458] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 203.712401][ T6458] __x64_sys_bpf+0x7b/0x90 [ 203.716806][ T6458] do_syscall_64+0x31/0x40 [ 203.721208][ T6458] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 203.727083][ T6458] RIP: 0033:0x7f637cf70969 [ 203.731484][ T6458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.751161][ T6458] RSP: 002b:00007f637b5d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 203.759559][ T6458] RAX: ffffffffffffffda RBX: 00007f637d197fa0 RCX: 00007f637cf70969 [ 203.767519][ T6458] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 203.775484][ T6458] RBP: 00007f637b5d9090 R08: 0000000000000000 R09: 0000000000000000 [ 203.783444][ T6458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.791488][ T6458] R13: 0000000000000000 R14: 00007f637d197fa0 R15: 00007fffd000d5f8 [ 204.441248][ T6478] device wg2 left promiscuous mode [ 204.477594][ T6478] device wg2 entered promiscuous mode [ 204.558072][ T6481] device syzkaller0 entered promiscuous mode [ 205.833664][ T6551] syz.3.1926[6551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.833728][ T6551] syz.3.1926[6551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.906352][ T6536] device pim6reg1 entered promiscuous mode [ 207.083166][ T6616] device syzkaller0 entered promiscuous mode [ 208.897330][ T6695] syz.2.1973[6695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.897387][ T6695] syz.2.1973[6695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.000627][ T6754] device wg2 left promiscuous mode [ 211.149502][ T6761] syz.0.1993[6761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.149562][ T6761] syz.0.1993[6761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.701265][ T6786] syz.1.2000[6786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.728074][ T6786] syz.1.2000[6786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.346171][ T6846] syz.3.2021[6846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.473526][ T6846] syz.3.2021[6846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.943335][ T6876] device sit0 left promiscuous mode [ 214.122624][ T6867] device sit0 entered promiscuous mode [ 214.694400][ T6899] device veth1_macvtap left promiscuous mode [ 214.733376][ T6899] device macsec0 entered promiscuous mode [ 215.629285][ T6929] syz.4.2044[6929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.629341][ T6929] syz.4.2044[6929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.898353][ T6943] device sit0 left promiscuous mode [ 215.939893][ T6955] FAULT_INJECTION: forcing a failure. [ 215.939893][ T6955] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 215.954418][ T6955] CPU: 0 PID: 6955 Comm: syz.2.2053 Tainted: G W 5.10.237-syzkaller #0 [ 215.963980][ T6955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 215.974039][ T6955] Call Trace: [ 215.977419][ T6955] __dump_stack+0x21/0x24 [ 215.981749][ T6955] dump_stack_lvl+0x169/0x1d8 [ 215.986434][ T6955] ? show_regs_print_info+0x18/0x18 [ 215.991652][ T6955] dump_stack+0x15/0x1c [ 215.995806][ T6955] should_fail+0x3c1/0x510 [ 216.000218][ T6955] should_fail_alloc_page+0x4f/0x60 [ 216.005411][ T6955] __alloc_pages_nodemask+0x109/0x5f0 [ 216.010790][ T6955] ? __irq_exit_rcu+0x40/0x150 [ 216.015551][ T6955] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 216.021091][ T6955] ? irq_exit_rcu+0x9/0x10 [ 216.025501][ T6955] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 216.031314][ T6955] __vmalloc_node_range+0x353/0x780 [ 216.036570][ T6955] bpf_map_area_alloc+0xd5/0xe0 [ 216.041414][ T6955] ? reuseport_array_alloc+0x16e/0x260 [ 216.046861][ T6955] reuseport_array_alloc+0x16e/0x260 [ 216.052134][ T6955] ? reuseport_array_alloc_check+0x90/0x90 [ 216.057925][ T6955] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 216.063758][ T6955] ? array_map_alloc_check+0x284/0x390 [ 216.069223][ T6955] map_create+0x441/0x2190 [ 216.073635][ T6955] __se_sys_bpf+0x203/0x680 [ 216.078129][ T6955] ? __x64_sys_bpf+0x90/0x90 [ 216.082717][ T6955] ? debug_smp_processor_id+0x17/0x20 [ 216.088077][ T6955] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 216.094127][ T6955] __x64_sys_bpf+0x7b/0x90 [ 216.098571][ T6955] do_syscall_64+0x31/0x40 [ 216.102975][ T6955] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 216.108967][ T6955] RIP: 0033:0x7fae2e817969 [ 216.113369][ T6955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.132962][ T6955] RSP: 002b:00007fae2ce80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 216.141378][ T6955] RAX: ffffffffffffffda RBX: 00007fae2ea3efa0 RCX: 00007fae2e817969 [ 216.149338][ T6955] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 216.157298][ T6955] RBP: 00007fae2ce80090 R08: 0000000000000000 R09: 0000000000000000 [ 216.165256][ T6955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.173213][ T6955] R13: 0000000000000000 R14: 00007fae2ea3efa0 R15: 00007ffff66b50e8 [ 216.450829][ T6986] FAULT_INJECTION: forcing a failure. [ 216.450829][ T6986] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 216.479826][ T6992] device syzkaller0 entered promiscuous mode [ 216.485996][ T6986] CPU: 1 PID: 6986 Comm: syz.4.2064 Tainted: G W 5.10.237-syzkaller #0 [ 216.495541][ T6986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 216.505597][ T6986] Call Trace: [ 216.508895][ T6986] __dump_stack+0x21/0x24 [ 216.513255][ T6986] dump_stack_lvl+0x169/0x1d8 [ 216.517971][ T6986] ? show_regs_print_info+0x18/0x18 [ 216.523181][ T6986] dump_stack+0x15/0x1c [ 216.527339][ T6986] should_fail+0x3c1/0x510 [ 216.531785][ T6986] should_fail_alloc_page+0x4f/0x60 [ 216.537023][ T6986] __alloc_pages_nodemask+0x109/0x5f0 [ 216.542421][ T6986] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 216.548068][ T6986] ? __kmalloc+0x1a7/0x330 [ 216.552570][ T6986] ? __vmalloc_node_range+0x29f/0x780 [ 216.557966][ T6986] __vmalloc_node_range+0x353/0x780 [ 216.563172][ T6986] bpf_map_area_alloc+0xd5/0xe0 [ 216.568139][ T6986] ? reuseport_array_alloc+0x16e/0x260 [ 216.573622][ T6986] reuseport_array_alloc+0x16e/0x260 [ 216.578914][ T6986] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 216.584725][ T6986] ? reuseport_array_alloc_check+0x90/0x90 [ 216.590531][ T6986] ? array_map_alloc_check+0x284/0x390 [ 216.595988][ T6986] map_create+0x441/0x2190 [ 216.600404][ T6986] __se_sys_bpf+0x203/0x680 [ 216.604990][ T6986] ? __x64_sys_bpf+0x90/0x90 [ 216.609586][ T6986] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 216.615823][ T6986] __x64_sys_bpf+0x7b/0x90 [ 216.620235][ T6986] do_syscall_64+0x31/0x40 [ 216.624649][ T6986] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 216.630537][ T6986] RIP: 0033:0x7f38b2d79969 [ 216.634958][ T6986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.654569][ T6986] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 216.662994][ T6986] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 216.670973][ T6986] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 216.678944][ T6986] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 216.686915][ T6986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.694974][ T6986] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 216.896652][ T6989] device macsec0 entered promiscuous mode [ 216.906290][ T6994] device veth1_macvtap entered promiscuous mode [ 216.916029][ T7004] device pim6reg1 entered promiscuous mode [ 216.959880][ T7006] device syzkaller0 entered promiscuous mode [ 219.068101][ T7099] device syzkaller0 entered promiscuous mode [ 219.530829][ T7125] syz.2.2107[7125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.530891][ T7125] syz.2.2107[7125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.957850][ T7123] device syzkaller0 entered promiscuous mode [ 220.465005][ T7172] FAULT_INJECTION: forcing a failure. [ 220.465005][ T7172] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 220.603079][ T7172] CPU: 0 PID: 7172 Comm: syz.3.2121 Tainted: G W 5.10.237-syzkaller #0 [ 220.612648][ T7172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 220.622702][ T7172] Call Trace: [ 220.626003][ T7172] __dump_stack+0x21/0x24 [ 220.630349][ T7172] dump_stack_lvl+0x169/0x1d8 [ 220.635037][ T7172] ? show_regs_print_info+0x18/0x18 [ 220.640417][ T7172] dump_stack+0x15/0x1c [ 220.644576][ T7172] should_fail+0x3c1/0x510 [ 220.648999][ T7172] should_fail_alloc_page+0x4f/0x60 [ 220.654221][ T7172] __alloc_pages_nodemask+0x109/0x5f0 [ 220.659593][ T7172] ? __irq_exit_rcu+0x40/0x150 [ 220.664391][ T7172] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 220.669929][ T7172] ? irq_exit_rcu+0x9/0x10 [ 220.674359][ T7172] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 220.680216][ T7172] __vmalloc_node_range+0x353/0x780 [ 220.685414][ T7172] bpf_map_area_alloc+0xd5/0xe0 [ 220.690255][ T7172] ? reuseport_array_alloc+0x16e/0x260 [ 220.695707][ T7172] reuseport_array_alloc+0x16e/0x260 [ 220.700993][ T7172] ? reuseport_array_alloc_check+0x90/0x90 [ 220.706789][ T7172] ? array_map_alloc_check+0x284/0x390 [ 220.712236][ T7172] map_create+0x441/0x2190 [ 220.716642][ T7172] __se_sys_bpf+0x203/0x680 [ 220.721301][ T7172] ? __x64_sys_bpf+0x90/0x90 [ 220.725879][ T7172] ? debug_smp_processor_id+0x17/0x20 [ 220.731240][ T7172] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 220.737293][ T7172] __x64_sys_bpf+0x7b/0x90 [ 220.741785][ T7172] do_syscall_64+0x31/0x40 [ 220.746188][ T7172] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 220.752069][ T7172] RIP: 0033:0x7f637cf70969 [ 220.756573][ T7172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.776181][ T7172] RSP: 002b:00007f637b5d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 220.784589][ T7172] RAX: ffffffffffffffda RBX: 00007f637d197fa0 RCX: 00007f637cf70969 [ 220.792549][ T7172] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 220.800509][ T7172] RBP: 00007f637b5d9090 R08: 0000000000000000 R09: 0000000000000000 [ 220.808469][ T7172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 220.816428][ T7172] R13: 0000000000000000 R14: 00007f637d197fa0 R15: 00007fffd000d5f8 [ 221.066627][ T7179] device syzkaller0 entered promiscuous mode [ 221.525975][ T7208] syz.0.2133[7208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.526052][ T7208] syz.0.2133[7208] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.607076][ T7210] FAULT_INJECTION: forcing a failure. [ 221.607076][ T7210] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 221.743075][ T7210] CPU: 0 PID: 7210 Comm: syz.4.2134 Tainted: G W 5.10.237-syzkaller #0 [ 221.752641][ T7210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 221.762697][ T7210] Call Trace: [ 221.765993][ T7210] __dump_stack+0x21/0x24 [ 221.770325][ T7210] dump_stack_lvl+0x169/0x1d8 [ 221.775006][ T7210] ? show_regs_print_info+0x18/0x18 [ 221.780209][ T7210] dump_stack+0x15/0x1c [ 221.784387][ T7210] should_fail+0x3c1/0x510 [ 221.788810][ T7210] should_fail_alloc_page+0x4f/0x60 [ 221.794015][ T7210] __alloc_pages_nodemask+0x109/0x5f0 [ 221.799581][ T7210] ? __irq_exit_rcu+0x40/0x150 [ 221.804351][ T7210] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 221.809905][ T7210] ? irq_exit_rcu+0x9/0x10 [ 221.814406][ T7210] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 221.820394][ T7210] __vmalloc_node_range+0x353/0x780 [ 221.825598][ T7210] bpf_map_area_alloc+0xd5/0xe0 [ 221.830451][ T7210] ? reuseport_array_alloc+0x16e/0x260 [ 221.835918][ T7210] reuseport_array_alloc+0x16e/0x260 [ 221.841205][ T7210] ? reuseport_array_alloc_check+0x90/0x90 [ 221.847017][ T7210] ? reuseport_array_alloc_check+0x56/0x90 [ 221.852828][ T7210] ? array_map_alloc_check+0x284/0x390 [ 221.858289][ T7210] map_create+0x441/0x2190 [ 221.862705][ T7210] __se_sys_bpf+0x203/0x680 [ 221.867204][ T7210] ? __x64_sys_bpf+0x90/0x90 [ 221.871807][ T7210] ? debug_smp_processor_id+0x17/0x20 [ 221.877178][ T7210] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 221.883242][ T7210] __x64_sys_bpf+0x7b/0x90 [ 221.887661][ T7210] do_syscall_64+0x31/0x40 [ 221.892080][ T7210] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 221.897967][ T7210] RIP: 0033:0x7f38b2d79969 [ 221.902435][ T7210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 221.922590][ T7210] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 221.931026][ T7210] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 221.939084][ T7210] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 221.947055][ T7210] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 221.955058][ T7210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 221.963028][ T7210] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 222.389127][ T7232] device sit0 entered promiscuous mode [ 222.904998][ T7259] tap0: tun_chr_ioctl cmd 1074025677 [ 222.921677][ T7259] tap0: linktype set to 270 [ 223.023906][ T7265] syz.0.2152[7265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.024046][ T7265] syz.0.2152[7265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.155784][ T7273] syz.4.2154[7273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.268575][ T7273] syz.4.2154[7273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.298570][ T7278] device macsec0 left promiscuous mode [ 225.504712][ T7381] syz.1.2188[7381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.504772][ T7381] syz.1.2188[7381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.604620][ T7384] FAULT_INJECTION: forcing a failure. [ 225.604620][ T7384] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 225.796233][ T7384] CPU: 1 PID: 7384 Comm: syz.4.2189 Tainted: G W 5.10.237-syzkaller #0 [ 225.805815][ T7384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 225.815873][ T7384] Call Trace: [ 225.819171][ T7384] __dump_stack+0x21/0x24 [ 225.823502][ T7384] dump_stack_lvl+0x169/0x1d8 [ 225.828184][ T7384] ? show_regs_print_info+0x18/0x18 [ 225.833387][ T7384] dump_stack+0x15/0x1c [ 225.837560][ T7384] should_fail+0x3c1/0x510 [ 225.841986][ T7384] should_fail_alloc_page+0x4f/0x60 [ 225.847193][ T7384] __alloc_pages_nodemask+0x109/0x5f0 [ 225.852660][ T7384] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 225.858221][ T7384] ? __kmalloc+0x1a7/0x330 [ 225.862646][ T7384] ? __vmalloc_node_range+0x29f/0x780 [ 225.868125][ T7384] __vmalloc_node_range+0x353/0x780 [ 225.873346][ T7384] bpf_map_area_alloc+0xd5/0xe0 [ 225.878196][ T7384] ? reuseport_array_alloc+0x16e/0x260 [ 225.883654][ T7384] reuseport_array_alloc+0x16e/0x260 [ 225.888936][ T7384] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 225.895101][ T7384] ? reuseport_array_alloc_check+0x90/0x90 [ 225.900899][ T7384] ? array_map_alloc_check+0x284/0x390 [ 225.906357][ T7384] map_create+0x441/0x2190 [ 225.910763][ T7384] __se_sys_bpf+0x203/0x680 [ 225.915257][ T7384] ? __x64_sys_bpf+0x90/0x90 [ 225.919835][ T7384] __x64_sys_bpf+0x7b/0x90 [ 225.924240][ T7384] do_syscall_64+0x31/0x40 [ 225.928665][ T7384] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 225.934543][ T7384] RIP: 0033:0x7f38b2d79969 [ 225.938950][ T7384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.958575][ T7384] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 225.967004][ T7384] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 225.974964][ T7384] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 225.982924][ T7384] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 225.990885][ T7384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 225.998841][ T7384] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 226.316186][ T7404] device syzkaller0 entered promiscuous mode [ 226.382387][ T7401] device sit0 left promiscuous mode [ 226.514299][ T7408] device sit0 entered promiscuous mode [ 226.759703][ T7416] FAULT_INJECTION: forcing a failure. [ 226.759703][ T7416] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 226.833095][ T7416] CPU: 0 PID: 7416 Comm: syz.4.2202 Tainted: G W 5.10.237-syzkaller #0 [ 226.842666][ T7416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 226.852735][ T7416] Call Trace: [ 226.856041][ T7416] __dump_stack+0x21/0x24 [ 226.860392][ T7416] dump_stack_lvl+0x169/0x1d8 [ 226.865080][ T7416] ? show_regs_print_info+0x18/0x18 [ 226.870281][ T7416] dump_stack+0x15/0x1c [ 226.874538][ T7416] should_fail+0x3c1/0x510 [ 226.878970][ T7416] should_fail_alloc_page+0x4f/0x60 [ 226.884173][ T7416] __alloc_pages_nodemask+0x109/0x5f0 [ 226.889575][ T7416] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 226.895125][ T7416] ? __kmalloc+0x1a7/0x330 [ 226.899540][ T7416] ? __vmalloc_node_range+0x29f/0x780 [ 226.904911][ T7416] __vmalloc_node_range+0x353/0x780 [ 226.910124][ T7416] bpf_map_area_alloc+0xd5/0xe0 [ 226.914984][ T7416] ? reuseport_array_alloc+0x16e/0x260 [ 226.920450][ T7416] reuseport_array_alloc+0x16e/0x260 [ 226.925831][ T7416] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 226.931647][ T7416] ? reuseport_array_alloc_check+0x90/0x90 [ 226.937475][ T7416] ? array_map_alloc_check+0x284/0x390 [ 226.943022][ T7416] map_create+0x441/0x2190 [ 226.947448][ T7416] __se_sys_bpf+0x203/0x680 [ 226.951970][ T7416] ? __x64_sys_bpf+0x90/0x90 [ 226.956580][ T7416] __x64_sys_bpf+0x7b/0x90 [ 226.961007][ T7416] do_syscall_64+0x31/0x40 [ 226.965429][ T7416] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 226.971398][ T7416] RIP: 0033:0x7f38b2d79969 [ 226.975810][ T7416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.995505][ T7416] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 227.003919][ T7416] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 227.011879][ T7416] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 227.019840][ T7416] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 227.027796][ T7416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 227.035756][ T7416] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 229.904450][ T7475] syz.0.2221[7475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.904509][ T7475] syz.0.2221[7475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.247941][ T24] audit: type=1400 audit(1748289720.870:154): avc: denied { create } for pid=7481 comm="syz.1.2223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 230.560394][ T7491] syz.0.2226[7491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.560454][ T7491] syz.0.2226[7491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.482118][ T7525] syz.0.2237[7525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.593207][ T7525] syz.0.2237[7525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.542925][ T7563] device veth0_vlan left promiscuous mode [ 232.638271][ T7563] device veth0_vlan entered promiscuous mode [ 232.658148][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.673645][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.704991][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 232.772005][ T7576] FAULT_INJECTION: forcing a failure. [ 232.772005][ T7576] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 232.790178][ T7576] CPU: 0 PID: 7576 Comm: syz.3.2255 Tainted: G W 5.10.237-syzkaller #0 [ 232.799748][ T7576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 232.809814][ T7576] Call Trace: [ 232.813107][ T7576] __dump_stack+0x21/0x24 [ 232.817423][ T7576] dump_stack_lvl+0x169/0x1d8 [ 232.822089][ T7576] ? show_regs_print_info+0x18/0x18 [ 232.827280][ T7576] dump_stack+0x15/0x1c [ 232.831423][ T7576] should_fail+0x3c1/0x510 [ 232.835831][ T7576] should_fail_alloc_page+0x4f/0x60 [ 232.841020][ T7576] __alloc_pages_nodemask+0x109/0x5f0 [ 232.846388][ T7576] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 232.851926][ T7576] ? __kmalloc+0x1a7/0x330 [ 232.856342][ T7576] ? __vmalloc_node_range+0x29f/0x780 [ 232.861714][ T7576] __vmalloc_node_range+0x353/0x780 [ 232.866907][ T7576] bpf_map_area_alloc+0xd5/0xe0 [ 232.871868][ T7576] ? reuseport_array_alloc+0x16e/0x260 [ 232.877332][ T7576] reuseport_array_alloc+0x16e/0x260 [ 232.882615][ T7576] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 232.888900][ T7576] ? reuseport_array_alloc_check+0x90/0x90 [ 232.894724][ T7576] ? array_map_alloc_check+0x284/0x390 [ 232.900178][ T7576] map_create+0x441/0x2190 [ 232.904599][ T7576] __se_sys_bpf+0x203/0x680 [ 232.909351][ T7576] ? __x64_sys_bpf+0x90/0x90 [ 232.913937][ T7576] ? debug_smp_processor_id+0x17/0x20 [ 232.919300][ T7576] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 232.925364][ T7576] __x64_sys_bpf+0x7b/0x90 [ 232.929773][ T7576] do_syscall_64+0x31/0x40 [ 232.934181][ T7576] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 232.940069][ T7576] RIP: 0033:0x7f637cf70969 [ 232.944487][ T7576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 232.964087][ T7576] RSP: 002b:00007f637b5d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 232.972501][ T7576] RAX: ffffffffffffffda RBX: 00007f637d197fa0 RCX: 00007f637cf70969 [ 232.980463][ T7576] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 232.988439][ T7576] RBP: 00007f637b5d9090 R08: 0000000000000000 R09: 0000000000000000 [ 232.996459][ T7576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.004419][ T7576] R13: 0000000000000000 R14: 00007f637d197fa0 R15: 00007fffd000d5f8 [ 233.695408][ T7621] syz.1.2268[7621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.695471][ T7621] syz.1.2268[7621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.184024][ T7633] device pim6reg1 entered promiscuous mode [ 234.488074][ T7654] FAULT_INJECTION: forcing a failure. [ 234.488074][ T7654] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 234.633055][ T7654] CPU: 1 PID: 7654 Comm: syz.2.2280 Tainted: G W 5.10.237-syzkaller #0 [ 234.642637][ T7654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 234.652705][ T7654] Call Trace: [ 234.656008][ T7654] __dump_stack+0x21/0x24 [ 234.660337][ T7654] dump_stack_lvl+0x169/0x1d8 [ 234.665014][ T7654] ? show_regs_print_info+0x18/0x18 [ 234.670231][ T7654] dump_stack+0x15/0x1c [ 234.674386][ T7654] should_fail+0x3c1/0x510 [ 234.678804][ T7654] should_fail_alloc_page+0x4f/0x60 [ 234.684000][ T7654] __alloc_pages_nodemask+0x109/0x5f0 [ 234.689390][ T7654] ? __irq_exit_rcu+0x40/0x150 [ 234.694154][ T7654] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 234.699700][ T7654] ? irq_exit_rcu+0x9/0x10 [ 234.704117][ T7654] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 234.709928][ T7654] __vmalloc_node_range+0x353/0x780 [ 234.715137][ T7654] bpf_map_area_alloc+0xd5/0xe0 [ 234.719990][ T7654] ? reuseport_array_alloc+0x16e/0x260 [ 234.725452][ T7654] reuseport_array_alloc+0x16e/0x260 [ 234.730740][ T7654] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 234.736896][ T7654] ? reuseport_array_alloc_check+0x90/0x90 [ 234.742700][ T7654] ? array_map_alloc_check+0x284/0x390 [ 234.748155][ T7654] map_create+0x441/0x2190 [ 234.752580][ T7654] __se_sys_bpf+0x203/0x680 [ 234.757079][ T7654] ? __x64_sys_bpf+0x90/0x90 [ 234.761673][ T7654] __x64_sys_bpf+0x7b/0x90 [ 234.766093][ T7654] do_syscall_64+0x31/0x40 [ 234.770525][ T7654] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 234.776418][ T7654] RIP: 0033:0x7fae2e817969 [ 234.780834][ T7654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.800441][ T7654] RSP: 002b:00007fae2ce80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 234.809119][ T7654] RAX: ffffffffffffffda RBX: 00007fae2ea3efa0 RCX: 00007fae2e817969 [ 234.817087][ T7654] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 234.825059][ T7654] RBP: 00007fae2ce80090 R08: 0000000000000000 R09: 0000000000000000 [ 234.833026][ T7654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 234.840993][ T7654] R13: 0000000000000000 R14: 00007fae2ea3efa0 R15: 00007ffff66b50e8 [ 235.474443][ T7669] device pim6reg1 entered promiscuous mode [ 236.577231][ T7686] syz.2.2292[7686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.577291][ T7686] syz.2.2292[7686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.046358][ T7692] device syzkaller0 entered promiscuous mode [ 237.084125][ T7695] device sit0 left promiscuous mode [ 237.221076][ T7699] device sit0 entered promiscuous mode [ 237.792932][ T7723] syz.3.2304[7723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.792990][ T7723] syz.3.2304[7723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.825983][ T7721] ªªªªªª: renamed from vlan0 [ 238.334620][ T7748] syz.1.2308[7748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.336305][ T7748] syz.1.2308[7748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.374904][ T7748] device pim6reg1 entered promiscuous mode [ 238.726628][ T7750] device syzkaller0 entered promiscuous mode [ 238.991991][ T7768] device pim6reg1 entered promiscuous mode [ 240.698076][ T7812] device veth0_vlan left promiscuous mode [ 240.704486][ T7812] device veth0_vlan entered promiscuous mode [ 240.728417][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.747622][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.773528][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.865832][ T7814] FAULT_INJECTION: forcing a failure. [ 240.865832][ T7814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 240.959983][ T7814] CPU: 0 PID: 7814 Comm: syz.2.2327 Tainted: G W 5.10.237-syzkaller #0 [ 240.969559][ T7814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 240.979620][ T7814] Call Trace: [ 240.982920][ T7814] __dump_stack+0x21/0x24 [ 240.987253][ T7814] dump_stack_lvl+0x169/0x1d8 [ 240.991935][ T7814] ? show_regs_print_info+0x18/0x18 [ 240.997138][ T7814] ? kvm_sched_clock_read+0x18/0x40 [ 241.002429][ T7814] dump_stack+0x15/0x1c [ 241.006590][ T7814] should_fail+0x3c1/0x510 [ 241.011008][ T7814] should_fail_alloc_page+0x4f/0x60 [ 241.016215][ T7814] __alloc_pages_nodemask+0x109/0x5f0 [ 241.021595][ T7814] ? irq_exit_rcu+0x9/0x10 [ 241.026018][ T7814] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 241.031570][ T7814] ? __alloc_pages_nodemask+0x2fe/0x5f0 [ 241.037123][ T7814] __vmalloc_node_range+0x353/0x780 [ 241.042339][ T7814] bpf_map_area_alloc+0xd5/0xe0 [ 241.047192][ T7814] ? reuseport_array_alloc+0x16e/0x260 [ 241.052682][ T7814] reuseport_array_alloc+0x16e/0x260 [ 241.057997][ T7814] ? reuseport_array_alloc_check+0x90/0x90 [ 241.063821][ T7814] ? array_map_alloc_check+0x284/0x390 [ 241.069299][ T7814] map_create+0x441/0x2190 [ 241.073741][ T7814] __se_sys_bpf+0x203/0x680 [ 241.078249][ T7814] ? __x64_sys_bpf+0x90/0x90 [ 241.082982][ T7814] __x64_sys_bpf+0x7b/0x90 [ 241.087404][ T7814] do_syscall_64+0x31/0x40 [ 241.091842][ T7814] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 241.097736][ T7814] RIP: 0033:0x7fae2e817969 [ 241.102164][ T7814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.121887][ T7814] RSP: 002b:00007fae2ce80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 241.130460][ T7814] RAX: ffffffffffffffda RBX: 00007fae2ea3efa0 RCX: 00007fae2e817969 [ 241.138444][ T7814] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 241.146455][ T7814] RBP: 00007fae2ce80090 R08: 0000000000000000 R09: 0000000000000000 [ 241.154436][ T7814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 241.162421][ T7814] R13: 0000000000000000 R14: 00007fae2ea3efa0 R15: 00007ffff66b50e8 [ 241.704720][ T7829] syz.2.2333[7829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.704779][ T7829] syz.2.2333[7829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.531630][ T7854] FAULT_INJECTION: forcing a failure. [ 242.531630][ T7854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 242.639452][ T7854] CPU: 0 PID: 7854 Comm: syz.4.2339 Tainted: G W 5.10.237-syzkaller #0 [ 242.649036][ T7854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 242.659187][ T7854] Call Trace: [ 242.662489][ T7854] __dump_stack+0x21/0x24 [ 242.666826][ T7854] dump_stack_lvl+0x169/0x1d8 [ 242.671512][ T7854] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 242.677681][ T7854] ? show_regs_print_info+0x18/0x18 [ 242.682900][ T7854] ? dump_stack+0x9/0x1c [ 242.687148][ T7854] dump_stack+0x15/0x1c [ 242.691346][ T7854] should_fail+0x3c1/0x510 [ 242.695769][ T7854] should_fail_alloc_page+0x4f/0x60 [ 242.700970][ T7854] __alloc_pages_nodemask+0x109/0x5f0 [ 242.706336][ T7854] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 242.711873][ T7854] ? __kmalloc+0x1a7/0x330 [ 242.716276][ T7854] ? __vmalloc_node_range+0x29f/0x780 [ 242.721631][ T7854] __vmalloc_node_range+0x353/0x780 [ 242.726819][ T7854] bpf_map_area_alloc+0xd5/0xe0 [ 242.731653][ T7854] ? reuseport_array_alloc+0x16e/0x260 [ 242.737098][ T7854] reuseport_array_alloc+0x16e/0x260 [ 242.742367][ T7854] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 242.748156][ T7854] ? reuseport_array_alloc_check+0x90/0x90 [ 242.753947][ T7854] ? array_map_alloc_check+0x284/0x390 [ 242.759395][ T7854] map_create+0x441/0x2190 [ 242.763798][ T7854] __se_sys_bpf+0x203/0x680 [ 242.768286][ T7854] ? __x64_sys_bpf+0x90/0x90 [ 242.772867][ T7854] __x64_sys_bpf+0x7b/0x90 [ 242.777269][ T7854] do_syscall_64+0x31/0x40 [ 242.781673][ T7854] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 242.787548][ T7854] RIP: 0033:0x7f38b2d79969 [ 242.791952][ T7854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 242.811553][ T7854] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 242.819952][ T7854] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 242.827911][ T7854] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 242.835867][ T7854] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 242.843866][ T7854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 242.851840][ T7854] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 243.393893][ T7874] syz.2.2346[7874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.393953][ T7874] syz.2.2346[7874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.296159][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.531536][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 244.593059][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.766562][ T7923] syz.1.2360[7923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.766664][ T7923] syz.1.2360[7923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.025111][ T7958] FAULT_INJECTION: forcing a failure. [ 246.025111][ T7958] name failslab, interval 1, probability 0, space 0, times 0 [ 246.105752][ T7958] CPU: 0 PID: 7958 Comm: syz.4.2374 Tainted: G W 5.10.237-syzkaller #0 [ 246.115425][ T7958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 246.125506][ T7958] Call Trace: [ 246.128809][ T7958] __dump_stack+0x21/0x24 [ 246.133171][ T7958] dump_stack_lvl+0x169/0x1d8 [ 246.137866][ T7958] ? show_regs_print_info+0x18/0x18 [ 246.143070][ T7958] ? rw_verify_area+0x1c0/0x360 [ 246.147950][ T7958] dump_stack+0x15/0x1c [ 246.152109][ T7958] should_fail+0x3c1/0x510 [ 246.156520][ T7958] ? sock_alloc_inode+0x1b/0xb0 [ 246.161362][ T7958] __should_failslab+0xa4/0xe0 [ 246.166122][ T7958] should_failslab+0x9/0x20 [ 246.170760][ T7958] kmem_cache_alloc+0x3d/0x2e0 [ 246.175787][ T7958] ? find_next_zero_bit+0x83/0x110 [ 246.180900][ T7958] ? sockfs_init_fs_context+0xb0/0xb0 [ 246.186269][ T7958] sock_alloc_inode+0x1b/0xb0 [ 246.190942][ T7958] ? sockfs_init_fs_context+0xb0/0xb0 [ 246.196303][ T7958] new_inode_pseudo+0x62/0x210 [ 246.201056][ T7958] __sock_create+0x12c/0x770 [ 246.205654][ T7958] ? get_unused_fd_flags+0x92/0xa0 [ 246.210751][ T7958] __sys_socketpair+0x1a1/0x590 [ 246.215588][ T7958] __x64_sys_socketpair+0x9b/0xb0 [ 246.220599][ T7958] do_syscall_64+0x31/0x40 [ 246.225005][ T7958] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 246.230879][ T7958] RIP: 0033:0x7f38b2d79969 [ 246.235281][ T7958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.254869][ T7958] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 246.263270][ T7958] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 246.271227][ T7958] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 246.279184][ T7958] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 246.287150][ T7958] R10: 0000200000000280 R11: 0000000000000246 R12: 0000000000000001 [ 246.295107][ T7958] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 246.305374][ T7967] syz.1.2376[7967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.305429][ T7967] syz.1.2376[7967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.317661][ T7958] socket: no more sockets [ 247.374759][ T8005] FAULT_INJECTION: forcing a failure. [ 247.374759][ T8005] name failslab, interval 1, probability 0, space 0, times 0 [ 247.473050][ T8005] CPU: 0 PID: 8005 Comm: syz.4.2391 Tainted: G W 5.10.237-syzkaller #0 [ 247.482626][ T8005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 247.492695][ T8005] Call Trace: [ 247.495989][ T8005] __dump_stack+0x21/0x24 [ 247.500307][ T8005] dump_stack_lvl+0x169/0x1d8 [ 247.504973][ T8005] ? show_regs_print_info+0x18/0x18 [ 247.510161][ T8005] dump_stack+0x15/0x1c [ 247.514337][ T8005] should_fail+0x3c1/0x510 [ 247.518746][ T8005] ? security_inode_alloc+0x33/0x110 [ 247.524025][ T8005] __should_failslab+0xa4/0xe0 [ 247.528780][ T8005] should_failslab+0x9/0x20 [ 247.533268][ T8005] kmem_cache_alloc+0x3d/0x2e0 [ 247.538039][ T8005] ? sock_alloc_inode+0x1b/0xb0 [ 247.542879][ T8005] security_inode_alloc+0x33/0x110 [ 247.547975][ T8005] inode_init_always+0x70a/0x9b0 [ 247.552903][ T8005] new_inode_pseudo+0x91/0x210 [ 247.557769][ T8005] __sock_create+0x12c/0x770 [ 247.562371][ T8005] ? get_unused_fd_flags+0x92/0xa0 [ 247.567479][ T8005] __sys_socketpair+0x1a1/0x590 [ 247.572333][ T8005] __x64_sys_socketpair+0x9b/0xb0 [ 247.577356][ T8005] do_syscall_64+0x31/0x40 [ 247.581856][ T8005] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 247.587745][ T8005] RIP: 0033:0x7f38b2d79969 [ 247.592153][ T8005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.611836][ T8005] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 247.620248][ T8005] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 247.628210][ T8005] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 247.636174][ T8005] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 247.644137][ T8005] R10: 0000200000000280 R11: 0000000000000246 R12: 0000000000000001 [ 247.652097][ T8005] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 247.776153][ T8005] socket: no more sockets [ 247.907222][ T8017] device pim6reg1 entered promiscuous mode [ 249.243155][ T8051] FAULT_INJECTION: forcing a failure. [ 249.243155][ T8051] name failslab, interval 1, probability 0, space 0, times 0 [ 249.286255][ T8051] CPU: 0 PID: 8051 Comm: syz.4.2406 Tainted: G W 5.10.237-syzkaller #0 [ 249.295839][ T8051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 249.306002][ T8051] Call Trace: [ 249.309322][ T8051] __dump_stack+0x21/0x24 [ 249.313693][ T8051] dump_stack_lvl+0x169/0x1d8 [ 249.318372][ T8051] ? thaw_kernel_threads+0x220/0x220 [ 249.323670][ T8051] ? show_regs_print_info+0x18/0x18 [ 249.328880][ T8051] dump_stack+0x15/0x1c [ 249.333054][ T8051] should_fail+0x3c1/0x510 [ 249.337479][ T8051] ? sk_prot_alloc+0xb2/0x340 [ 249.342161][ T8051] __should_failslab+0xa4/0xe0 [ 249.346929][ T8051] should_failslab+0x9/0x20 [ 249.351439][ T8051] __kmalloc+0x60/0x330 [ 249.355605][ T8051] sk_prot_alloc+0xb2/0x340 [ 249.360121][ T8051] sk_alloc+0x38/0x4e0 [ 249.364198][ T8051] can_create+0x2ea/0x5c0 [ 249.368536][ T8051] __sock_create+0x38d/0x770 [ 249.373158][ T8051] __sys_socketpair+0x1a1/0x590 [ 249.378033][ T8051] __x64_sys_socketpair+0x9b/0xb0 [ 249.383065][ T8051] do_syscall_64+0x31/0x40 [ 249.387504][ T8051] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 249.393398][ T8051] RIP: 0033:0x7f38b2d79969 [ 249.397823][ T8051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 249.417536][ T8051] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 249.425963][ T8051] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 249.433943][ T8051] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 249.441922][ T8051] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 249.449917][ T8051] R10: 0000200000000280 R11: 0000000000000246 R12: 0000000000000001 [ 249.457899][ T8051] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 249.690127][ T8059] device syzkaller0 entered promiscuous mode [ 250.348524][ T8090] syz.0.2419[8090] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.348585][ T8090] syz.0.2419[8090] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.791489][ T8201] syz.3.2458[8201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.892404][ T8190] device syzkaller0 entered promiscuous mode [ 253.976374][ T8201] syz.3.2458[8201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.724963][ T8237] syz.1.2471[8237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.768572][ T8237] syz.1.2471[8237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.142771][ T8300] device wg2 left promiscuous mode [ 257.254932][ T8304] device pim6reg1 entered promiscuous mode [ 257.370991][ T8308] syz.4.2495[8308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.371050][ T8308] syz.4.2495[8308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.294665][ T8369] syz.2.2515[8369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.342341][ T8369] syz.2.2515[8369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.348820][ T8371] FAULT_INJECTION: forcing a failure. [ 259.348820][ T8371] name failslab, interval 1, probability 0, space 0, times 0 [ 259.389395][ T8371] CPU: 0 PID: 8371 Comm: syz.4.2516 Tainted: G W 5.10.237-syzkaller #0 [ 259.398966][ T8371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 259.409026][ T8371] Call Trace: [ 259.412329][ T8371] __dump_stack+0x21/0x24 [ 259.416676][ T8371] dump_stack_lvl+0x169/0x1d8 [ 259.421368][ T8371] ? thaw_kernel_threads+0x220/0x220 [ 259.426667][ T8371] ? show_regs_print_info+0x18/0x18 [ 259.431876][ T8371] dump_stack+0x15/0x1c [ 259.436038][ T8371] should_fail+0x3c1/0x510 [ 259.440460][ T8371] ? selinux_sk_alloc_security+0x63/0x140 [ 259.446184][ T8371] __should_failslab+0xa4/0xe0 [ 259.450959][ T8371] should_failslab+0x9/0x20 [ 259.455467][ T8371] kmem_cache_alloc_trace+0x3a/0x2e0 [ 259.460744][ T8371] selinux_sk_alloc_security+0x63/0x140 [ 259.466306][ T8371] security_sk_alloc+0x72/0xa0 [ 259.471080][ T8371] sk_prot_alloc+0x138/0x340 [ 259.475661][ T8371] sk_alloc+0x38/0x4e0 [ 259.479719][ T8371] can_create+0x2ea/0x5c0 [ 259.484048][ T8371] __sock_create+0x38d/0x770 [ 259.488626][ T8371] __sys_socketpair+0x218/0x590 [ 259.493476][ T8371] __x64_sys_socketpair+0x9b/0xb0 [ 259.498488][ T8371] do_syscall_64+0x31/0x40 [ 259.502891][ T8371] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 259.508773][ T8371] RIP: 0033:0x7f38b2d79969 [ 259.513202][ T8371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.532792][ T8371] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 259.541194][ T8371] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 259.549154][ T8371] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 259.557113][ T8371] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 259.565072][ T8371] R10: 0000200000000280 R11: 0000000000000246 R12: 0000000000000001 [ 259.573031][ T8371] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 260.458785][ T8397] syz.4.2527[8397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.458845][ T8397] syz.4.2527[8397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.532598][ T8397] syz.4.2527[8397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.593925][ T8407] syz.0.2528[8407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.595826][ T8408] syz.4.2527[8408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.629370][ T8407] syz.0.2528[8407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.289859][ T8445] device syzkaller0 entered promiscuous mode [ 262.745349][ T8475] device pim6reg1 entered promiscuous mode [ 263.675859][ T8491] bpf_get_probe_write_proto: 8 callbacks suppressed [ 263.675869][ T8491] syz.2.2556[8491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.773973][ T8491] syz.2.2556[8491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.867668][ T8491] syz.2.2556[8491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.916460][ T8491] syz.2.2556[8491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.962562][ T8491] syz.2.2556[8491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.015106][ T8491] syz.2.2556[8491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.059844][ T8556] syz.3.2572[8556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.081310][ T8556] syz.3.2572[8556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.101833][ T8560] syz.1.2579[8560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.149686][ T8564] syz.2.2580[8564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.220408][ T8723] bpf_get_probe_write_proto: 4 callbacks suppressed [ 271.220418][ T8723] syz.0.2630[8723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.239589][ T8723] syz.0.2630[8723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.961518][ T8827] syz.0.2660[8827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.997771][ T8827] syz.0.2660[8827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.165501][ T8825] -1: renamed from syzkaller0 [ 275.424246][ T8855] syz.0.2669[8855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.424341][ T8855] syz.0.2669[8855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.620675][ T8860] device syzkaller0 entered promiscuous mode [ 275.678311][ T8862] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 275.884992][ T8868] syz.4.2673[8868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.885063][ T8868] syz.4.2673[8868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.023108][ T8870] device veth0_vlan left promiscuous mode [ 276.085112][ T8870] device veth0_vlan entered promiscuous mode [ 276.147237][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.163536][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.192397][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.336130][ T8879] device syzkaller0 entered promiscuous mode [ 276.596214][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.606927][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 276.614901][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.695417][ T8905] syz.4.2685[8905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.695496][ T8905] syz.4.2685[8905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.171239][ T8919] FAULT_INJECTION: forcing a failure. [ 277.171239][ T8919] name failslab, interval 1, probability 0, space 0, times 0 [ 277.245592][ T8919] CPU: 1 PID: 8919 Comm: syz.4.2689 Tainted: G W 5.10.237-syzkaller #0 [ 277.255183][ T8919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 277.265249][ T8919] Call Trace: [ 277.268558][ T8919] __dump_stack+0x21/0x24 [ 277.272901][ T8919] dump_stack_lvl+0x169/0x1d8 [ 277.277587][ T8919] ? thaw_kernel_threads+0x220/0x220 [ 277.282881][ T8919] ? show_regs_print_info+0x18/0x18 [ 277.288083][ T8919] ? proc_fail_nth_read+0x210/0x210 [ 277.293286][ T8919] dump_stack+0x15/0x1c [ 277.297438][ T8919] should_fail+0x3c1/0x510 [ 277.301852][ T8919] ? map_lookup_elem+0x406/0x630 [ 277.306786][ T8919] __should_failslab+0xa4/0xe0 [ 277.311542][ T8919] should_failslab+0x9/0x20 [ 277.316041][ T8919] __kmalloc+0x60/0x330 [ 277.320187][ T8919] ? __fdget+0x1a1/0x230 [ 277.324423][ T8919] map_lookup_elem+0x406/0x630 [ 277.329181][ T8919] __se_sys_bpf+0x3e3/0x680 [ 277.333677][ T8919] ? __x64_sys_bpf+0x90/0x90 [ 277.338263][ T8919] ? fpu__clear_all+0x20/0x20 [ 277.342930][ T8919] __x64_sys_bpf+0x7b/0x90 [ 277.347333][ T8919] do_syscall_64+0x31/0x40 [ 277.351740][ T8919] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 277.357626][ T8919] RIP: 0033:0x7f38b2d79969 [ 277.362034][ T8919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.381726][ T8919] RSP: 002b:00007f38b13e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 277.390164][ T8919] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d79969 [ 277.398133][ T8919] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000001 [ 277.406095][ T8919] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 277.414059][ T8919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.422027][ T8919] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 278.334232][ T8940] device sit0 left promiscuous mode [ 278.345886][ T8942] device sit0 entered promiscuous mode [ 279.124868][ T8959] FAULT_INJECTION: forcing a failure. [ 279.124868][ T8959] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.263048][ T8959] CPU: 0 PID: 8959 Comm: syz.0.2702 Tainted: G W 5.10.237-syzkaller #0 [ 279.272623][ T8959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 279.282697][ T8959] Call Trace: [ 279.285997][ T8959] __dump_stack+0x21/0x24 [ 279.290336][ T8959] dump_stack_lvl+0x169/0x1d8 [ 279.295019][ T8959] ? show_regs_print_info+0x18/0x18 [ 279.300221][ T8959] ? stack_map_peek_elem+0x22c/0x330 [ 279.305523][ T8959] dump_stack+0x15/0x1c [ 279.309686][ T8959] should_fail+0x3c1/0x510 [ 279.314317][ T8959] should_fail_usercopy+0x1a/0x20 [ 279.319351][ T8959] _copy_to_user+0x20/0x90 [ 279.323776][ T8959] map_lookup_elem+0x4a4/0x630 [ 279.328548][ T8959] __se_sys_bpf+0x3e3/0x680 [ 279.333055][ T8959] ? __x64_sys_bpf+0x90/0x90 [ 279.337656][ T8959] ? fpu__clear_all+0x20/0x20 [ 279.342340][ T8959] __x64_sys_bpf+0x7b/0x90 [ 279.346765][ T8959] do_syscall_64+0x31/0x40 [ 279.351191][ T8959] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 279.357098][ T8959] RIP: 0033:0x7f13b3be1969 [ 279.361515][ T8959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.381127][ T8959] RSP: 002b:00007f13b224a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 279.389552][ T8959] RAX: ffffffffffffffda RBX: 00007f13b3e08fa0 RCX: 00007f13b3be1969 [ 279.397541][ T8959] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000001 [ 279.405520][ T8959] RBP: 00007f13b224a090 R08: 0000000000000000 R09: 0000000000000000 [ 279.413540][ T8959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.421519][ T8959] R13: 0000000000000000 R14: 00007f13b3e08fa0 R15: 00007ffe80db1538 [ 280.098359][ T8976] device veth1_macvtap left promiscuous mode [ 280.146801][ T8978] device veth1_macvtap entered promiscuous mode [ 280.154246][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 281.110535][ T9002] syz.3.2716[9002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.110597][ T9002] syz.3.2716[9002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.404526][ T9012] FAULT_INJECTION: forcing a failure. [ 281.404526][ T9012] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.533392][ T9012] CPU: 0 PID: 9012 Comm: syz.4.2719 Tainted: G W 5.10.237-syzkaller #0 [ 281.542967][ T9012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 281.553375][ T9012] Call Trace: [ 281.556665][ T9012] __dump_stack+0x21/0x24 [ 281.560983][ T9012] dump_stack_lvl+0x169/0x1d8 [ 281.565735][ T9012] ? thaw_kernel_threads+0x220/0x220 [ 281.571003][ T9012] ? vsnprintf+0x1871/0x1960 [ 281.575582][ T9012] ? show_regs_print_info+0x18/0x18 [ 281.580798][ T9012] dump_stack+0x15/0x1c [ 281.584947][ T9012] should_fail+0x3c1/0x510 [ 281.589350][ T9012] should_fail_usercopy+0x1a/0x20 [ 281.594359][ T9012] _copy_to_user+0x20/0x90 [ 281.598765][ T9012] simple_read_from_buffer+0xe9/0x160 [ 281.604214][ T9012] proc_fail_nth_read+0x19a/0x210 [ 281.609460][ T9012] ? proc_fault_inject_write+0x2f0/0x2f0 [ 281.615092][ T9012] ? rw_verify_area+0x1c0/0x360 [ 281.619968][ T9012] ? proc_fault_inject_write+0x2f0/0x2f0 [ 281.625589][ T9012] vfs_read+0x1fe/0xa10 [ 281.629737][ T9012] ? kernel_read+0x70/0x70 [ 281.634142][ T9012] ? __kasan_check_write+0x14/0x20 [ 281.639245][ T9012] ? __kasan_check_write+0x14/0x20 [ 281.644349][ T9012] ? mutex_lock+0x8c/0xe0 [ 281.648691][ T9012] ? mutex_trylock+0xa0/0xa0 [ 281.653287][ T9012] ? __fget_files+0x2c4/0x320 [ 281.658125][ T9012] ? __fdget_pos+0x2d2/0x380 [ 281.662698][ T9012] ? ksys_read+0x71/0x240 [ 281.667016][ T9012] ksys_read+0x140/0x240 [ 281.671248][ T9012] ? vfs_write+0xd60/0xd60 [ 281.675653][ T9012] ? fpu__clear_all+0x20/0x20 [ 281.680318][ T9012] __x64_sys_read+0x7b/0x90 [ 281.684810][ T9012] do_syscall_64+0x31/0x40 [ 281.689214][ T9012] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 281.695091][ T9012] RIP: 0033:0x7f38b2d7837c [ 281.699494][ T9012] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 281.719347][ T9012] RSP: 002b:00007f38b13e2030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 281.727748][ T9012] RAX: ffffffffffffffda RBX: 00007f38b2fa0fa0 RCX: 00007f38b2d7837c [ 281.735704][ T9012] RDX: 000000000000000f RSI: 00007f38b13e20a0 RDI: 0000000000000004 [ 281.743659][ T9012] RBP: 00007f38b13e2090 R08: 0000000000000000 R09: 0000000000000000 [ 281.751616][ T9012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.759574][ T9012] R13: 0000000000000000 R14: 00007f38b2fa0fa0 R15: 00007ffd98648bd8 [ 282.073246][ T9030] syz.3.2726[9030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.073306][ T9030] syz.3.2726[9030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.442241][ T9041] syz.2.2730[9041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.504290][ T9041] syz.2.2730[9041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.653388][ T9043] syz.2.2730[9043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.753576][ T9043] syz.2.2730[9043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.120093][ T9091] device sit0 left promiscuous mode [ 286.810891][ T9145] syz.4.2763[9145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.813907][ T9145] syz.4.2763[9145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.959974][ T9145] syz.4.2763[9145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.110682][ T9145] syz.4.2763[9145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.907327][ T9212] device syzkaller0 entered promiscuous mode [ 288.966409][ T9217] device sit0 left promiscuous mode [ 289.187008][ T9217] device sit0 entered promiscuous mode [ 289.244343][ T9233] syz.0.2787[9233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.244408][ T9233] syz.0.2787[9233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.862135][ T9238] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.890578][ T9238] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.909251][ T9238] device bridge_slave_0 entered promiscuous mode [ 290.053980][ T9238] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.061043][ T9238] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.086564][ T9238] device bridge_slave_1 entered promiscuous mode [ 290.543785][ T9238] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.550889][ T9238] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.558203][ T9238] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.565265][ T9238] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.791831][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.806100][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.961080][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.971036][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.101782][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 291.113227][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 291.132291][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.139406][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.164661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 291.181981][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 291.200357][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.207568][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.285297][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 291.300082][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.310081][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.318315][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.443803][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 291.452234][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 291.524508][ T9238] device veth0_vlan entered promiscuous mode [ 291.533580][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 291.550842][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.559620][ T9281] device veth1_macvtap entered promiscuous mode [ 291.607360][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.615184][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.625458][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 291.638185][ T9238] device veth1_macvtap entered promiscuous mode [ 291.696809][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 291.709797][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 291.718574][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 291.762223][ T358] device erspan0 left promiscuous mode [ 291.768059][ T358] Ÿë: port 2(erspan0) entered disabled state [ 291.817805][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 291.826963][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 291.835744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 291.844688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 292.032638][ T9303] device syzkaller0 entered promiscuous mode [ 292.463992][ T358] device veth0_to_team left promiscuous mode [ 292.470635][ T358] Ÿë: port 1(veth0_to_team) entered disabled state [ 292.514227][ T358] device veth1_macvtap left promiscuous mode [ 292.529738][ T358] device veth0_vlan left promiscuous mode [ 293.643655][ T9341] @0Ù: renamed from bond_slave_1 [ 294.181751][ T9362] device sit0 left promiscuous mode [ 294.350331][ T9367] device sit0 entered promiscuous mode [ 294.638824][ T9384] device syzkaller0 entered promiscuous mode [ 295.188287][ T9415] device sit0 entered promiscuous mode [ 295.379033][ T9429] device pim6reg1 entered promiscuous mode [ 296.331738][ T9442] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.359164][ T9442] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.368843][ T9442] device bridge_slave_0 entered promiscuous mode [ 296.406458][ T9461] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 296.413986][ T9461] syzkaller0: linktype set to 804 [ 296.422174][ T9442] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.430177][ T9442] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.443889][ T9442] device bridge_slave_1 entered promiscuous mode [ 296.919911][ T9442] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.927014][ T9442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.934350][ T9442] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.941380][ T9442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.020700][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.038934][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.141529][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.156078][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.203297][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.223550][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.243490][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.250608][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.258513][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.267088][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.275687][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.282739][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.340904][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 297.358885][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.377347][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 297.463211][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.532190][ T9442] device veth0_vlan entered promiscuous mode [ 297.556402][ T9442] device veth1_macvtap entered promiscuous mode [ 297.663099][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 297.671524][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 297.687109][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.695585][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.703965][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 297.712324][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 297.721043][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 297.810073][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.822048][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.830694][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.839974][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.848865][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.858887][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 298.458871][ T9491] device syzkaller0 entered promiscuous mode [ 298.469645][ T9510] syz.1.2872[9510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.469702][ T9510] syz.1.2872[9510] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.611013][ T9515] device veth0_vlan left promiscuous mode [ 298.635975][ T9515] device veth0_vlan entered promiscuous mode [ 298.682674][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.701245][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.709145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 298.719890][ T358] device veth1_macvtap left promiscuous mode [ 299.726016][ T9547] device sit0 entered promiscuous mode [ 300.265684][ T9563] device sit0 left promiscuous mode [ 300.371974][ T9562] device sit0 entered promiscuous mode [ 301.684765][ T9585] device veth0_vlan left promiscuous mode [ 301.690864][ T9585] device veth0_vlan entered promiscuous mode [ 301.717185][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.746304][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.807737][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.020563][ T9663] @ÿ: renamed from bond_slave_0 [ 304.463044][ T9674] device pim6reg1 entered promiscuous mode [ 306.104065][ T9708] device wg2 entered promiscuous mode [ 306.643884][ T9732] syz.2.2938[9732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.643977][ T9732] syz.2.2938[9732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.172940][ T9741] tap0: tun_chr_ioctl cmd 1074025675 [ 307.272945][ T9741] tap0: persist enabled [ 307.360789][ T9741] tap0: tun_chr_ioctl cmd 1074025675 [ 307.366807][ T9741] tap0: persist disabled [ 307.777863][ T9757] device wg2 entered promiscuous mode [ 308.109115][ T9764] device syzkaller0 entered promiscuous mode [ 309.812890][ T9807] device syzkaller0 entered promiscuous mode [ 313.418346][ T24] audit: type=1400 audit(1748289804.040:155): avc: denied { create } for pid=9927 comm="syz.3.2996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 313.562930][ T24] audit: type=1400 audit(1748289804.120:156): avc: denied { read } for pid=9931 comm="syz.0.2994" dev="nsfs" ino=4026532715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 313.623105][ T24] audit: type=1400 audit(1748289804.140:157): avc: denied { open } for pid=9931 comm="syz.0.2994" path="uts:[4026532715]" dev="nsfs" ino=4026532715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 313.898624][ T9953] device pim6reg1 entered promiscuous mode [ 314.004757][ T9957] device sit0 left promiscuous mode [ 314.754875][T10002] device pim6reg1 entered promiscuous mode [ 314.903966][T10011] device syzkaller0 entered promiscuous mode [ 315.870982][T10067] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.878229][T10067] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.984070][T10067] device bridge_slave_1 left promiscuous mode [ 316.000501][T10067] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.067457][T10067] device bridge_slave_0 left promiscuous mode [ 316.075060][T10067] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.958774][T10108] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.966033][T10108] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.995320][T10108] device bridge_slave_0 entered promiscuous mode [ 317.023865][T10108] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.037816][T10108] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.045611][T10108] device bridge_slave_1 entered promiscuous mode [ 317.275125][T10108] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.282220][T10108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.289587][T10108] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.296649][T10108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.330440][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.365785][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.373953][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.401564][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.410588][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.419426][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.426498][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.434170][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.443599][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.451856][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.458895][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.466455][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 317.484913][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.504801][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 317.513180][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.521326][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 317.530107][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 317.547982][T10108] device veth0_vlan entered promiscuous mode [ 317.554969][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 317.563217][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.571260][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.579014][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.593682][T10108] device veth1_macvtap entered promiscuous mode [ 317.617221][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 317.626749][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.636629][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.654554][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.663446][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.672043][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 317.689845][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 317.723990][T10139] ------------[ cut here ]------------ [ 317.729499][T10139] kernel BUG at kernel/bpf/arraymap.c:980! [ 317.756416][T10139] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 317.762615][T10139] CPU: 1 PID: 10139 Comm: syz.0.3051 Tainted: G W 5.10.237-syzkaller #0 [ 317.772353][T10139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 317.782436][T10139] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 317.788682][T10139] Code: 93 e9 ff eb 05 e8 bc 93 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 a8 93 e9 ff 0f 0b e9 78 f9 ff ff e8 9c 93 e9 ff <0f> 0b e8 95 93 e9 ff 0f 0b e8 8e 93 e9 ff 0f 0b e8 87 93 e9 ff 0f [ 317.808409][T10139] RSP: 0018:ffffc900018dfc30 EFLAGS: 00010293 [ 317.810130][ T24] audit: type=1400 audit(1748289808.390:158): avc: denied { create } for pid=10141 comm="syz.3.3044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 317.814477][T10139] RAX: ffffffff8179ff64 RBX: ffff88810678d290 RCX: ffff88811c0413c0 [ 317.814485][T10139] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 317.814493][T10139] RBP: ffffc900018dfcb0 R08: dffffc0000000000 R09: fffffbfff0c5d40d [ 317.814502][T10139] R10: fffffbfff0c5d40d R11: 1ffffffff0c5d40c R12: ffffffffa0042800 [ 317.814510][T10139] R13: ffff8881296df580 R14: 0000000000000001 R15: 00000000fffffff0 [ 317.814528][T10139] FS: 00007f13b22086c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 317.882659][T10139] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.889237][T10139] CR2: ffffffffdfa50000 CR3: 000000010f9b7000 CR4: 00000000003506a0 [ 317.897206][T10139] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 317.905167][T10139] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 317.913278][T10139] Call Trace: [ 317.916571][T10139] ? bpf_prog_4b8b081278bac347+0xb/0x73c [ 317.922197][T10139] bpf_fd_array_map_update_elem+0x21f/0x330 [ 317.928084][T10139] bpf_map_update_value+0xb4/0x410 [ 317.933182][T10139] map_update_elem+0x4a1/0x5e0 [ 317.937929][T10139] __se_sys_bpf+0x398/0x680 [ 317.942420][T10139] ? __x64_sys_bpf+0x90/0x90 [ 317.946993][T10139] ? do_user_addr_fault+0x791/0xc80 [ 317.952183][T10139] ? debug_smp_processor_id+0x17/0x20 [ 317.957545][T10139] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 317.963598][T10139] __x64_sys_bpf+0x7b/0x90 [ 317.968002][T10139] do_syscall_64+0x31/0x40 [ 317.972409][T10139] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 317.978286][T10139] RIP: 0033:0x7f13b3be1969 [ 317.982691][T10139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.002300][T10139] RSP: 002b:00007f13b2208038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 318.010731][T10139] RAX: ffffffffffffffda RBX: 00007f13b3e09160 RCX: 00007f13b3be1969 [ 318.018698][T10139] RDX: 0000000000000020 RSI: 0000200000000400 RDI: 0000000000000002 [ 318.027185][T10139] RBP: 00007f13b3c63ab1 R08: 0000000000000000 R09: 0000000000000000 [ 318.035149][T10139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 318.043110][T10139] R13: 0000000000000001 R14: 00007f13b3e09160 R15: 00007ffe80db1538 [ 318.051105][T10139] Modules linked in: [ 318.056574][T10142] device veth1_macvtap left promiscuous mode [ 318.102936][T10139] ---[ end trace 0f68a114c507d2cb ]--- [ 318.108451][T10139] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 318.114923][T10139] Code: 93 e9 ff eb 05 e8 bc 93 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 a8 93 e9 ff 0f 0b e9 78 f9 ff ff e8 9c 93 e9 ff <0f> 0b e8 95 93 e9 ff 0f 0b e8 8e 93 e9 ff 0f 0b e8 87 93 e9 ff 0f [ 318.134761][T10139] RSP: 0018:ffffc900018dfc30 EFLAGS: 00010293 [ 318.141009][T10139] RAX: ffffffff8179ff64 RBX: ffff88810678d290 RCX: ffff88811c0413c0 [ 318.149151][T10139] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 318.157191][T10139] RBP: ffffc900018dfcb0 R08: dffffc0000000000 R09: fffffbfff0c5d40d [ 318.165339][T10139] R10: fffffbfff0c5d40d R11: 1ffffffff0c5d40c R12: ffffffffa0042800 [ 318.173385][T10139] R13: ffff8881296df580 R14: 0000000000000001 R15: 00000000fffffff0 [ 318.181382][T10139] FS: 00007f13b22086c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 318.190610][T10139] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.197235][T10139] CR2: 0000000100000000 CR3: 000000010f9b7000 CR4: 00000000003506b0 [ 318.205488][T10139] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 318.213494][T10139] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 318.221577][T10139] Kernel panic - not syncing: Fatal exception [ 318.227840][T10139] Kernel Offset: disabled [ 318.232165][T10139] Rebooting in 86400 seconds..