last executing test programs: 7.531724842s ago: executing program 0 (id=1670): openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7b3, 0x653}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={0x1, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='blkio.bfq.io_merged\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x20000000000000c8, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095c0ac022eb2068f92105b916130bceec523a72ab9c2cfb98eee4a2d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @fallback=0x28, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000c80)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000400000000000008000000000000000061"], 0x0, 0x2a}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x10, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756e6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070000000850000000f00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000540)={r3}, 0xc) r4 = bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001100)=ANY=[@ANYBLOB="1000000004000000040000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="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"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x93, &(0x7f0000000380)=[{}], 0x8, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x22b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x1}, 0x0, 0xffeffffffffffffb, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=@base={0x1f, 0x4, 0x599, 0xa, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, r2}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000a00)={&(0x7f0000000900)="41c1c04b2c4b1497a97433bc953af730fb67ea7c5f3f8d3cc1d268821f802ad2e1d21966da6697f61cce70eb8e98b20ee0616dacb18e31acc08e4816b7949898c97b749c0a6a589d45e2e6c074dd8658e66b807018377f65409c61a6b9bdef5ea0d71d9bff3e59368418e9b6c946ea09a93f5b84739a0e8788363b3a89bc160e33fbf45d427114ba349d2afe3676893da4a63b7c975c0e4ac0fcf27fde45b7917f071e2be3055dbb2f0656f53735f92877be8ae59ef641989797ba14a94ea0f8d8b1195738e3de291f56210cee9d756c429def3acbb169f2250b835e973ad3a2ec12", &(0x7f0000000b00)=""/230, &(0x7f0000000dc0)="5068b0c0c8a20304c8493aef0dca655de417bc750967c037c7dd2721d483d9565905feb879c2ee9bf385e5d898171a6455edb60a4ee1057a4a3818646c57119b8d57430ab4462b3c9aba1972e9ede569155524683b80744bae31b0c5e544b6906038c912e301e3a01b40a163fb47920afad892d6363b7f1431718ba9597651eba6718d12796822b63349b1d7a9b9711c4fc17496fff7ae31a2afe0d3ff102d36da9072242a36ef137aad22116a63a5fd36c0619dcdd520f7649059797d86bcfac870e44e83f5f80a4ad51a7c", &(0x7f0000000cc0)="6dd61f08205e228f1bef7771378f4466d6d0238da5d73e6c39d1d3c6d272320563b3dd843504f8d1959a556b998d6a94fc5f47970b9099a9acaa4b9b90722d27687060dd249645204a9557014630bfcc4d1d51d1f9c8665214962997758161384e1b80d12398b7dcea21a919be860f453929dc60ee5e55ddd4bf61d9e680d16ad5ffbce7628e2e354da81a085e48ec1e0eba1118d515a04b7736dfe575e300f077fcb43d97", 0x5, r4}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r6, 0x0, 0x1ba8847c99}, 0x38) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x280b40, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYBLOB="0000000000000000d7a30c0000006ba700000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32=r9], 0x0}, 0x94) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r7, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) 7.020227673s ago: executing program 0 (id=1671): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRESDEC, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1601, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000004000000000000000000073010d000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000000)='cpu&\t\t') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) 5.995098626s ago: executing program 4 (id=1678): openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7b3, 0x653}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={0x1, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='blkio.bfq.io_merged\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x20000000000000c8, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095c0ac022eb2068f92105b916130bceec523a72ab9c2cfb98eee4a2d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @fallback=0x28, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000c80)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000400000000000008000000000000000061"], 0x0, 0x2a}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x10, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756e6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070000000850000000f00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000540)={r3}, 0xc) r4 = bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001100)=ANY=[@ANYBLOB="1000000004000000040000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="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"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x93, &(0x7f0000000380)=[{}], 0x8, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x22b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x1}, 0x0, 0xffeffffffffffffb, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=@base={0x1f, 0x4, 0x599, 0xa, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, r2}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000a00)={&(0x7f0000000900)="41c1c04b2c4b1497a97433bc953af730fb67ea7c5f3f8d3cc1d268821f802ad2e1d21966da6697f61cce70eb8e98b20ee0616dacb18e31acc08e4816b7949898c97b749c0a6a589d45e2e6c074dd8658e66b807018377f65409c61a6b9bdef5ea0d71d9bff3e59368418e9b6c946ea09a93f5b84739a0e8788363b3a89bc160e33fbf45d427114ba349d2afe3676893da4a63b7c975c0e4ac0fcf27fde45b7917f071e2be3055dbb2f0656f53735f92877be8ae59ef641989797ba14a94ea0f8d8b1195738e3de291f56210cee9d756c429def3acbb169f2250b835e973ad3a2ec12", &(0x7f0000000b00)=""/230, &(0x7f0000000dc0)="5068b0c0c8a20304c8493aef0dca655de417bc750967c037c7dd2721d483d9565905feb879c2ee9bf385e5d898171a6455edb60a4ee1057a4a3818646c57119b8d57430ab4462b3c9aba1972e9ede569155524683b80744bae31b0c5e544b6906038c912e301e3a01b40a163fb47920afad892d6363b7f1431718ba9597651eba6718d12796822b63349b1d7a9b9711c4fc17496fff7ae31a2afe0d3ff102d36da9072242a36ef137aad22116a63a5fd36c0619dcdd520f7649059797d86bcfac870e44e83f5f80a4ad51a7c", &(0x7f0000000cc0)="6dd61f08205e228f1bef7771378f4466d6d0238da5d73e6c39d1d3c6d272320563b3dd843504f8d1959a556b998d6a94fc5f47970b9099a9acaa4b9b90722d27687060dd249645204a9557014630bfcc4d1d51d1f9c8665214962997758161384e1b80d12398b7dcea21a919be860f453929dc60ee5e55ddd4bf61d9e680d16ad5ffbce7628e2e354da81a085e48ec1e0eba1118d515a04b7736dfe575e300f077fcb43d97", 0x5, r4}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r6, 0x0, 0x1ba8847c99}, 0x38) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x280b40, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB="0000000000000000d7a30c0000006ba7000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32=r9], 0x0}, 0x94) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r7, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) 5.478728468s ago: executing program 2 (id=1684): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r2, 0x0, 0x1c, 0xa6, &(0x7f0000000000)="e4f5a61fbce06e985dfe0b807b56ce08a58633d8347db07b5eacfff6", &(0x7f0000000340)=""/166, 0x5, 0x0, 0xb4, 0x4a, &(0x7f0000000580)="da24467ce13a80b9386ad0d6174dfc9cf35101e60d2d0fe0187e1159671e159d9fdcd56cbb70ea1321fa23089bee31dc3d22ee65ec7681170ca6a34da191794d291f93d02d17a5984c48e2246de3d3124780bc896883582b81d60f789b2c697df28350e673d28ce54c0c33a58d5a657e6e0b6b00d67e5ce87cb9551589f6e1650bc5fd4396471dc588bf5287f24d9a91ad08a82f8e9e5a5a60295f804d8d646a5ae5027aa4e94ef1e364955af861af77eb554b1d", &(0x7f0000000040)="492d880c700aba98c9be799a75d4ed20e8a94f83b91428f472095fe04509110886af09a2987c0e48e4da26dc377fb7faad7c4f010c10d60ba6f4654a0c4080c72ba5dfdac3fd339bd53a", 0x0, 0x0, 0xa71}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.304287101s ago: executing program 2 (id=1685): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0xc6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="020000fe030000000400000008000000000000002c81cd6503b0ea00d87f747000677bece41e7793b3b191b670bbc928e490e083093395653dcea7add820a56de57c3e4e4affbb0500ca701f9aad078e40365bff991409d4c4444d09698252b5aedc33a6c4b99af1dc61c51f5851d8eeee5b29fb6a9df848045082a854407750d9a1ea0cc74f20791324c21299fea4a00b", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRESDEC], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8905, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x3, [@func={0x7, 0x0, 0x0, 0xc, 0x5}, @const={0xc, 0x0, 0x0, 0xa, 0x3}, @func={0x10, 0x0, 0x0, 0xc, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x4}}]}, {0x0, [0x30]}}, &(0x7f0000000880)=""/247, 0x57, 0xf7, 0x1}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x16, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x80000001}, @alu={0x4, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xae}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='GPL\x00', 0x7135, 0x65, &(0x7f00000005c0)=""/101, 0x41000, 0xa0, '\x00', r7, 0x15, r8, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xa5be, r3, 0x0, &(0x7f0000000980)=[r1], 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.181227102s ago: executing program 4 (id=1686): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0xc6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="020000fe030000000400000008000000000000002c81cd6503b0ea00d87f747000677bece41e7793b3b191b670bbc928e490e083093395653dcea7add820a56de57c3e4e4affbb0500ca701f9aad078e40365bff991409d4c4444d09698252b5aedc33a6c4b99af1dc61c51f5851d8eeee5b29fb6a9df848045082a854407750d9a1ea0cc74f20791324c21299fea4a00b", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRESDEC], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8905, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x30]}}, &(0x7f0000000880)=""/247, 0x1b, 0xf7, 0x1}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x16, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x80000001}, @alu={0x4, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xae}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='GPL\x00', 0x7135, 0x65, &(0x7f00000005c0)=""/101, 0x41000, 0xa0, '\x00', r7, 0x15, r8, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xa5be, r3, 0x0, &(0x7f0000000980)=[r1], 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.511249166s ago: executing program 0 (id=1688): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0xc6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="020000fe030000000400000008000000000000002c81cd6503b0ea00d87f747000677bece41e7793b3b191b670bbc928e490e083093395653dcea7add820a56de57c3e4e4affbb0500ca701f9aad078e40365bff991409d4c4444d09698252b5aedc33a6c4b99af1dc61c51f5851d8eeee5b29fb6a9df848045082a854407750d9a1ea0cc74f20791324c21299fea4a00b", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRESDEC], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8905, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={0x0, &(0x7f0000000880)=""/247, 0x0, 0xf7, 0x1}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x16, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x80000001}, @alu={0x4, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xae}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='GPL\x00', 0x7135, 0x65, &(0x7f00000005c0)=""/101, 0x41000, 0xa0, '\x00', r7, 0x15, r8, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xa5be, r3, 0x0, &(0x7f0000000980)=[r1], 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.350877979s ago: executing program 2 (id=1691): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB='\x00'/11], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18020000000000000000", @ANYRESDEC=0x0], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1e00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) 4.162240134s ago: executing program 4 (id=1692): openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7b3, 0x653}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={0x1, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='blkio.bfq.io_merged\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x20000000000000c8, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095c0ac022eb2068f92105b916130bceec523a72ab9c2cfb98eee4a2d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @fallback=0x28, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000c80)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000400000000000008000000000000000061"], 0x0, 0x2a}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x10, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756e6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070000000850000000f00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000540)={r3}, 0xc) r4 = bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001100)=ANY=[@ANYBLOB="1000000004000000040000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="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"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x93, &(0x7f0000000380)=[{}], 0x8, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x22b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x1}, 0x0, 0xffeffffffffffffb, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=@base={0x1f, 0x4, 0x599, 0xa, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, r2}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000a00)={&(0x7f0000000900)="41c1c04b2c4b1497a97433bc953af730fb67ea7c5f3f8d3cc1d268821f802ad2e1d21966da6697f61cce70eb8e98b20ee0616dacb18e31acc08e4816b7949898c97b749c0a6a589d45e2e6c074dd8658e66b807018377f65409c61a6b9bdef5ea0d71d9bff3e59368418e9b6c946ea09a93f5b84739a0e8788363b3a89bc160e33fbf45d427114ba349d2afe3676893da4a63b7c975c0e4ac0fcf27fde45b7917f071e2be3055dbb2f0656f53735f92877be8ae59ef641989797ba14a94ea0f8d8b1195738e3de291f56210cee9d756c429def3acbb169f2250b835e973ad3a2ec12", &(0x7f0000000b00)=""/230, &(0x7f0000000dc0)="5068b0c0c8a20304c8493aef0dca655de417bc750967c037c7dd2721d483d9565905feb879c2ee9bf385e5d898171a6455edb60a4ee1057a4a3818646c57119b8d57430ab4462b3c9aba1972e9ede569155524683b80744bae31b0c5e544b6906038c912e301e3a01b40a163fb47920afad892d6363b7f1431718ba9597651eba6718d12796822b63349b1d7a9b9711c4fc17496fff7ae31a2afe0d3ff102d36da9072242a36ef137aad22116a63a5fd36c0619dcdd520f7649059797d86bcfac870e44e83f5f80a4ad51a7c", &(0x7f0000000cc0)="6dd61f08205e228f1bef7771378f4466d6d0238da5d73e6c39d1d3c6d272320563b3dd843504f8d1959a556b998d6a94fc5f47970b9099a9acaa4b9b90722d27687060dd249645204a9557014630bfcc4d1d51d1f9c8665214962997758161384e1b80d12398b7dcea21a919be860f453929dc60ee5e55ddd4bf61d9e680d16ad5ffbce7628e2e354da81a085e48ec1e0eba1118d515a04b7736dfe575e300f077fcb43d97", 0x5, r4}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r6, 0x0, 0x1ba8847c99}, 0x38) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x280b40, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYBLOB="0000000000000000d7a30c0000006ba700000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32=r9], 0x0}, 0x94) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r7, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) 4.045879273s ago: executing program 3 (id=1693): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x1, 0x7, [@empty, @random="797f1f610dd5", @multicast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @local, @random="949f7a11d5e0"]}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000080)) write$cgroup_int(r0, &(0x7f00000000c0)=0x81, 0x12) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x2, 0x80, 0x6, 0x78, 0x7, 0x0, 0x0, 0x7fff, 0xa4090, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb19, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x2004, 0x2, 0x8, 0x7, 0x4, 0x9, 0x6, 0x0, 0x72b2, 0x0, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)={0x3, 0x0, [0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='fscache_cache\x00', r0, 0x0, 0x6}, 0x18) r2 = syz_clone(0x44000, &(0x7f0000000280)="ffc48311c51c60160aac2e822589d33e0f08d956072d4619ce012e704592fd7f5ad1ca87", 0x24, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="c9bcbad0304779d3c39746f61b1ac40d4d1a7e80ba7e2936edb5ba8260820f1c22bf604b66c433c8") perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0xdb, 0x6, 0xc, 0x8, 0x0, 0x5, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x8001, 0xffffffffffffffff, 0x7fffffff, 0x1, 0x9, 0x2, 0xfff0, 0x0, 0xfffffffd, 0x0, 0xa}, r2, 0x6, r0, 0xc) bpf$ENABLE_STATS(0x20, &(0x7f0000000440), 0x4) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0xb, 0x18}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000004c0)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r0, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000006c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd7, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0xf4, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000a40)={0x2, 0x0}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xe, 0x27, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1e42}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x2, 0x1, 0xa, 0x30, 0x10}, @alu={0x3, 0x1, 0x0, 0x5, 0x2, 0x1}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_fd={0x18, 0x6, 0x1, 0x0, r3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}]}, &(0x7f0000000640)='syzkaller\x00', 0x4, 0x2f, &(0x7f0000000680)=""/47, 0x40f00, 0x16, '\x00', r5, @sk_skb=0x27, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000a00)={0x0, 0x10, 0x4, 0x3ff}, 0x10, r7, r0, 0x2, &(0x7f0000000a80)=[r0, 0xffffffffffffffff], &(0x7f0000000ac0)=[{0x1, 0x4, 0x7, 0x9}, {0x3, 0x2, 0x5, 0xc}], 0x10, 0x10}, 0x94) mkdirat$cgroup(r0, &(0x7f0000000bc0)='syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x11, 0x1e, &(0x7f0000000c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r4}, @jmp={0x5, 0x0, 0x3, 0x8, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @exit, @alu={0x3, 0x0, 0x1, 0xb, 0xc, 0x8, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8fc1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x7, 0x0, 0xd, 0x0, 0x1d, 0xfffffffffffffff4, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000d40)='GPL\x00', 0x1d4, 0x85, &(0x7f0000000d80)=""/133, 0x0, 0x2, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000e40)={0x2, 0x8, 0x8, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[r3, r3, r0, 0xffffffffffffffff, r0], 0x0, 0x10, 0x8000}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x3, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x800, 0xe50da1c4f048f3d8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000f80), 0x2}, 0x10001, 0xfffffffffffffffd, 0x4ff, 0x1, 0x3, 0x10, 0x8591, 0x0, 0x3091, 0x0, 0x3}, r2, 0xb, r1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r11, &(0x7f0000001140)={&(0x7f0000001080)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000001100)}, 0x40012022) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001200)={{r0, 0xffffffffffffffff}, &(0x7f0000001180), &(0x7f00000011c0)=r10}, 0x20) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={0xffffffffffffffff, 0x101, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x12, 0x17, &(0x7f0000001240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0x9}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}, @alu={0x4, 0x1, 0x5, 0x5, 0x2, 0xacd8888af591dd08, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001300)='GPL\x00', 0x6, 0xc5, &(0x7f0000001340)=""/197, 0x40f00, 0x8, '\x00', r5, @cgroup_sock_addr=0x34, 0xffffffffffffffff, 0x8, &(0x7f0000001440)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001480)={0x0, 0x6, 0x4, 0x400}, 0x10, r6, r8, 0x2, &(0x7f0000001500)=[r0, r3, r3, r3, r14, 0xffffffffffffffff, r3, r4], &(0x7f0000001540)=[{0x4, 0x2, 0x9, 0x9}, {0x0, 0x4, 0x1, 0x5}], 0x10, 0x1}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001640)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000001680)='./file0\x00', 0x0) openat$cgroup_procs(r0, &(0x7f00000016c0)='tasks\x00', 0x2, 0x0) recvmsg(r12, &(0x7f0000002a00)={&(0x7f0000001700)=@qipcrtr, 0x80, &(0x7f0000002940)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/24, 0x18}, {&(0x7f00000027c0)=""/85, 0x55}, {&(0x7f0000002840)=""/235, 0xeb}], 0x4, &(0x7f0000002980)=""/67, 0x43}, 0x140) openat$cgroup_procs(r9, &(0x7f0000002a40)='tasks\x00', 0x2, 0x0) 3.861363128s ago: executing program 0 (id=1694): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x1, 0x1, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r3}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)=0x10000) 3.767847586s ago: executing program 0 (id=1695): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340), 0x10}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x20083500, 0x0, 0x300, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000b00)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf000000000000", @ANYRES32, @ANYBLOB="000000000000e9ff0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x94) 3.529703375s ago: executing program 4 (id=1697): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff038}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x13, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0xfffffd26) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8e20, 0xa2a}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @typedef={0x0, 0x0, 0x0, 0x2}, @type_tag={0x4, 0x0, 0x0, 0x12, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000001000000bca30000000000002403000040feffff720af0ff00000e0771a4f0ff000000001f030000000000002e0a0200000000002600000000ff000e61146c00000000001d430000000000007a0a00fe00581c1f6114140000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7d06a59ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566de74e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48b936e6f9e0fcda88fe4413537528fdb6153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b602396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54dd84323afc4c10eff46248843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f0e6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf699b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae543d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80aba439772bf60a1db18c472dafc5569adc2c406f39f82928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a4a274000000000000000000000000000000000000000000000009dd14b38f2f5426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd030000006d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10b0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0c69c2c03f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08a1a4b94cb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac98708007c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703fc52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f1d2156befec432e8e993c79027b7ef285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23ed080000000000002bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c370267cc51ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de0600ee477d71bf3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812dc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a296c22fdc0500000000000000b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf15dd64c9ece60b8588ee8777d0ea8f4713b258427c7d90f9e93348e17723ba9ab8ae790f74cc41ae5795835f3cec40dff485d2802c08611454d9ea784a205bcc07ec26f906f3cf45bb37014ab6f22af6213618e242b283ea9d3f0677ee598072ec06f7170009d92bb87d9d12c378dfd3e74ec056ee83eef666423d934fc5908c9ff98715218a5964f1e00000000426ac9588e27aefe307f49662990ee823568bbc2f89596ced7c6c52d76b8096f1848410843b93fd404f535be474f456778b5ef85abb8fc2336abd5ea64a6efea8a5aca0015499b88ae780a7bae4df603bd3c72808cf300440b1b638a6640f7de8d0d82f359ca2f779cd48cd8d3603f4f69e47f386988c9b7b5d6dd3d48a1fdca780049d7c87bea42161a4c0d7cf0125b43dc9d8845f3c05a08acda647e7143d0e0aee2949a45e28488b0522c2288072467d2afe269f589fb7e034b92d3ca245b16b71998711bfe206c9690b6d0eebb06a29349229eb45ff15c63aa2c82c56d7420738cd1b04eb16e87cb524315d7361ea3635d3799bb7fcc56aa5e1dbe031a7a12554dee6754b72f43a6fddf427f32ec3df274a88097725679769beebf1aa6eb09d5154e4900000000000d0f7160a05911d969879953d3d4702b2676c07bb0fd14020a66718378825d5ed789711b77d40dc31e0b8fc651b45559da463f0000000000000000000000000052d42124e9c26aba885015e69d42ecd710342ac597ebea576ae15fdf611356f622e831741ab15549e0d7a2bd0324e2b3b48a10551607492c19eaf58485feb4cab19c303b30ba2ddea0d792d77724c9fa4ed58b93668fc20484f141ee2b6a0029e88fdc853189b4dafd36ff23b11967090e508f45e3f10857038a52ef275cf9e3e4b5d30b12d138dfa70930c603b5e3f4b7be67be3dba3cbd8d4d143195af0697d779445d67dcfbd922d12a8b49f93eac7a72faacf80346b3b669615f2710eb8df39fc8c04d2c9c196fa6facfea613569a35cde6451f2edf55ce25c7d72ec7ea85a92458c0559ca3a94727d495bd4671a55a70bc544d71d8e0257707a31936f1adf224077310a86bf447ec92c650acca8c6b0721020894b06178c32f4472d17174d6eb2b067030c5d2c12583f46d2da7fba42d4083259c7cdc8bf1f4299c248865d3c809356c3ed"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES16=0x0], &(0x7f0000000080)='syzkaller\x00', 0x17627b7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r5}, 0x10) close(r4) socketpair(0x1, 0x1, 0x8000, 0x0) 3.118035728s ago: executing program 3 (id=1698): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x220, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x20000000000001fa, &(0x7f00000002c0)=ANY=[@ANYBLOB="1809000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x900) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000000000000000000000100085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000080)='syzkaller\x00'}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000440)=ANY=[@ANYBLOB="0600000004000000060000006d20f767373a1edf", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x24, 0x0, 0x10000000, 0x0, 0x2, 0x7}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES64=r1, @ANYRES32, @ANYBLOB='\x00'/20, @ANYBLOB="c484d7627844d98e7f9f05b6b99bea2dbf3d11659ddff0a3a98a4d0bba2afe172f09abc3472963bf926ae952c85130f53e8047436f812942d66b6ab738ebd5af58337f9064a7f61f8ae89c10cb0a2d2d8cb380b0896e98c62913478cfd63362e29b00ef3da2e96fc78046b937f17e731f86feb6f147b9dba700f931889a7ff6ddd3e89b2a59b6e584bae4a68bd73ec5520be5516a3b248a9", @ANYRES64=r0, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r7}, 0x10) syz_clone(0xab009500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r5, 0x0, 0x800000000}, 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.116679088s ago: executing program 1 (id=1699): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004000000dd0000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x6, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x1b, &(0x7f0000000500)=@framed={{}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x35083632}, @ldst={0x3, 0x0, 0x0, 0xc, 0x8, 0xc, 0x1}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xe}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @exit, @map_idx={0x18, 0xb, 0x5, 0x0, 0xc}, @alu={0x7, 0x0, 0xb, 0x7, 0x9, 0x30, 0xfffffffffffffffc}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0xfdef}], 0x1, 0x0, 0x0, 0x800300}, 0x20000801) recvmsg(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) recvmsg(r10, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0xa3) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.455048842s ago: executing program 4 (id=1700): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 2.272636197s ago: executing program 4 (id=1701): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0xc6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="020000fe030000000400000008000000000000002c81cd6503b0ea00d87f747000677bece41e7793b3b191b670bbc928e490e083093395653dcea7add820a56de57c3e4e4affbb0500ca701f9aad078e40365bff991409d4c4444d09698252b5aedc33a6c4b99af1dc61c51f5851d8eeee5b29fb6a9df848045082a854407750d9a1ea0cc74f20791324c21299fea4a00b", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRESDEC], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8905, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x3, [@func={0x7, 0x0, 0x0, 0xc, 0x5}, @const={0xc, 0x0, 0x0, 0xa, 0x3}, @func={0x10, 0x0, 0x0, 0xc, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x4}}]}, {0x0, [0x30]}}, &(0x7f0000000880)=""/247, 0x57, 0xf7, 0x1}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x16, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x80000001}, @alu={0x4, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xae}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='GPL\x00', 0x7135, 0x65, &(0x7f00000005c0)=""/101, 0x41000, 0xa0, '\x00', r7, 0x15, r8, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xa5be, r3, 0x0, &(0x7f0000000980)=[r1], 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.175686585s ago: executing program 3 (id=1702): socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000001100)=ANY=[@ANYRES16], &(0x7f0000000280)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xfffffffffffffd76) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x80060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000020000800000000000000000850000004f0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000690f0000850000000600000095"], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 2.098272981s ago: executing program 0 (id=1703): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0xc6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="020000fe030000000400000008000000000000002c81cd6503b0ea00d87f747000677bece41e7793b3b191b670bbc928e490e083093395653dcea7add820a56de57c3e4e4affbb0500ca701f9aad078e40365bff991409d4c4444d09698252b5aedc33a6c4b99af1dc61c51f5851d8eeee5b29fb6a9df848045082a854407750d9a1ea0cc74f20791324c21299fea4a00b", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRESDEC], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8905, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func={0x7, 0x0, 0x0, 0xc, 0x5}, @const={0xc, 0x0, 0x0, 0xa, 0x3}, @func={0x10, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x30]}}, &(0x7f0000000880)=""/247, 0x3f, 0xf7, 0x1}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x16, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x80000001}, @alu={0x4, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xae}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='GPL\x00', 0x7135, 0x65, &(0x7f00000005c0)=""/101, 0x41000, 0xa0, '\x00', r7, 0x15, r8, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xa5be, r3, 0x0, &(0x7f0000000980)=[r1], 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.074670543s ago: executing program 1 (id=1704): openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7b3, 0x653}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={0x1, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='blkio.bfq.io_merged\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x20000000000000c8, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095c0ac022eb2068f92105b916130bceec523a72ab9c2cfb98eee4a2d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @fallback=0x28, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000c80)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000400000000000008000000000000000061"], 0x0, 0x2a}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x10, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756e6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070000000850000000f00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000540)={r3}, 0xc) r4 = bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001100)=ANY=[@ANYBLOB="1000000004000000040000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="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"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x93, &(0x7f0000000380)=[{}], 0x8, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x22b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x1}, 0x0, 0xffeffffffffffffb, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=@base={0x1f, 0x4, 0x599, 0xa, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, r2}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000a00)={&(0x7f0000000900)="41c1c04b2c4b1497a97433bc953af730fb67ea7c5f3f8d3cc1d268821f802ad2e1d21966da6697f61cce70eb8e98b20ee0616dacb18e31acc08e4816b7949898c97b749c0a6a589d45e2e6c074dd8658e66b807018377f65409c61a6b9bdef5ea0d71d9bff3e59368418e9b6c946ea09a93f5b84739a0e8788363b3a89bc160e33fbf45d427114ba349d2afe3676893da4a63b7c975c0e4ac0fcf27fde45b7917f071e2be3055dbb2f0656f53735f92877be8ae59ef641989797ba14a94ea0f8d8b1195738e3de291f56210cee9d756c429def3acbb169f2250b835e973ad3a2ec12", &(0x7f0000000b00)=""/230, &(0x7f0000000dc0)="5068b0c0c8a20304c8493aef0dca655de417bc750967c037c7dd2721d483d9565905feb879c2ee9bf385e5d898171a6455edb60a4ee1057a4a3818646c57119b8d57430ab4462b3c9aba1972e9ede569155524683b80744bae31b0c5e544b6906038c912e301e3a01b40a163fb47920afad892d6363b7f1431718ba9597651eba6718d12796822b63349b1d7a9b9711c4fc17496fff7ae31a2afe0d3ff102d36da9072242a36ef137aad22116a63a5fd36c0619dcdd520f7649059797d86bcfac870e44e83f5f80a4ad51a7c", &(0x7f0000000cc0)="6dd61f08205e228f1bef7771378f4466d6d0238da5d73e6c39d1d3c6d272320563b3dd843504f8d1959a556b998d6a94fc5f47970b9099a9acaa4b9b90722d27687060dd249645204a9557014630bfcc4d1d51d1f9c8665214962997758161384e1b80d12398b7dcea21a919be860f453929dc60ee5e55ddd4bf61d9e680d16ad5ffbce7628e2e354da81a085e48ec1e0eba1118d515a04b7736dfe575e300f077fcb43d97", 0x5, r4}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r6, 0x0, 0x1ba8847c99}, 0x38) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x280b40, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000d7a30c0000006ba700000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32=r9], 0x0}, 0x94) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r7, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) 1.664142446s ago: executing program 3 (id=1705): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x1, 0x1, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r3}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)=0x10000) 1.561140874s ago: executing program 3 (id=1706): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000005000000060000000000000700000000010000000000000e01000000000000000030002e00"], 0x0, 0x39, 0x0, 0x0, 0x1}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f0000000300)}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xc, 0x7ff, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000800000085000000b0000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r0}, 0xc) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, &(0x7f0000001f40)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00a81e7c00"/20, @ANYRES32, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000000000000030000000700"/28], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32=r6], 0x10) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) 1.506354839s ago: executing program 2 (id=1707): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000005000000060000000000000700000000010000000000000e01000000000000000030002e00"], 0x0, 0x39, 0x0, 0x0, 0x1}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f0000000300)}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xc, 0x7ff, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000800000085000000b000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r0}, 0xc) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, &(0x7f0000001f40)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00a81e7c00"/20, @ANYRES32, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000000000000030000000700"/28], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32=r6], 0x10) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) 1.091544382s ago: executing program 1 (id=1708): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="0000000000f5ffffffffffffff00200000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x160480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x1) close(r3) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000000811cf2cddb505790c1d3a0b300247e8365aee04eedeb1403158a4769f9e285341fe9bbb81ddaf3cba574892"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r5, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', r6}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@ifindex=r6, 0x15, 0x0, 0x287, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000240), &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="c0463f41d55a555c82c58cc3c739a40b0000001100000002e6ffff0300000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000e0000000000000000000053ac927a2e8f8b5e00"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018"], 0x0, 0x37}, 0x28) 757.914229ms ago: executing program 1 (id=1709): bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r2}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100)=0x1, 0x12) 721.442582ms ago: executing program 1 (id=1710): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0xc6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="020000fe030000000400000008000000000000002c81cd6503b0ea00d87f747000677bece41e7793b3b191b670bbc928e490e083093395653dcea7add820a56de57c3e4e4affbb0500ca701f9aad078e40365bff991409d4c4444d09698252b5aedc33a6c4b99af1dc61c51f5851d8eeee5b29fb6a9df848045082a854407750d9a1ea0cc74f20791324c21299fea4a00b", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRESDEC], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8905, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x30]}}, &(0x7f0000000880)=""/247, 0x1b, 0xf7, 0x1}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x16, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x9c}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x80000001}, @alu={0x4, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xae}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='GPL\x00', 0x7135, 0x65, &(0x7f00000005c0)=""/101, 0x41000, 0xa0, '\x00', r7, 0x15, r8, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xa5be, r3, 0x0, &(0x7f0000000980)=[r1], 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 531.487087ms ago: executing program 2 (id=1711): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 425.264706ms ago: executing program 3 (id=1712): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @typedef={0x0, 0x0, 0x0, 0x2}, @type_tag={0x4, 0x0, 0x0, 0x12, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x17627b7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, 0x0, &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r3}, 0x10) close(r2) (fail_nth: 1) socketpair(0x1, 0x1, 0x8000, &(0x7f0000000000)) 367.469221ms ago: executing program 2 (id=1713): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x220, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x20000000000001fa, &(0x7f00000002c0)=ANY=[@ANYBLOB="1809000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x900) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000000000000000000000100085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000080)='syzkaller\x00'}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000440)=ANY=[@ANYBLOB="0600000004000000060000006d20f767373a1edf", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x24, 0x0, 0x10000000, 0x0, 0x2, 0x7}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES64=r1, @ANYRES32, @ANYBLOB='\x00'/20, @ANYBLOB="c484d7627844d98e7f9f05b6b99bea2dbf3d11659ddff0a3a98a4d0bba2afe172f09abc3472963bf926ae952c85130f53e8047436f812942d66b6ab738ebd5af58337f9064a7f61f8ae89c10cb0a2d2d8cb380b0896e98c62913478cfd63362e29b00ef3da2e96fc78046b937f17e731f86feb6f147b9dba700f931889a7ff6ddd3e89b2a59b6e584bae4a68bd73ec5520be5516a3b248a9", @ANYRES64=r0, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r7}, 0x10) syz_clone(0xab009500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r5, 0x0, 0x800000000}, 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 1 (id=1714): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340), 0x10}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x20083500, 0x0, 0x300, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000b00)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf000000000000", @ANYRES32, @ANYBLOB="000000000000e9ff0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x94) kernel console output (not intermixed with test programs): v6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.558766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.721117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.730030][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.738770][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.747681][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.795667][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.807074][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.818097][ T284] device veth1_macvtap entered promiscuous mode [ 29.032558][ T349] device sit0 entered promiscuous mode [ 29.507067][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.533018][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.541490][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.596851][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.614249][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.659121][ T356] device veth1_macvtap left promiscuous mode [ 29.743495][ T361] syz.3.4[361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.743632][ T361] syz.3.4[361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.467482][ T371] device sit0 entered promiscuous mode [ 30.838836][ T376] device pim6reg1 entered promiscuous mode [ 31.017868][ T383] device veth1_macvtap left promiscuous mode [ 31.175226][ T386] device pim6reg1 entered promiscuous mode [ 31.326107][ T388] device sit0 left promiscuous mode [ 31.361877][ T390] device sit0 entered promiscuous mode [ 31.630724][ T392] device pim6reg1 entered promiscuous mode [ 31.654310][ T395] device sit0 entered promiscuous mode [ 31.896669][ T398] device veth1_macvtap left promiscuous mode [ 32.636703][ T407] device sit0 entered promiscuous mode [ 33.537765][ T423] device sit0 left promiscuous mode [ 33.689435][ T427] device sit0 entered promiscuous mode [ 34.321845][ T438] device veth1_macvtap left promiscuous mode [ 34.446438][ T443] device sit0 left promiscuous mode [ 34.475026][ T445] device sit0 left promiscuous mode [ 34.500673][ T443] device sit0 entered promiscuous mode [ 34.671453][ T445] device sit0 entered promiscuous mode [ 35.503690][ T461] device veth1_macvtap left promiscuous mode [ 35.622294][ T467] device sit0 left promiscuous mode [ 35.668684][ T469] device sit0 entered promiscuous mode [ 35.986903][ T472] device sit0 left promiscuous mode [ 36.101913][ T473] device sit0 entered promiscuous mode [ 37.602440][ T506] device sit0 left promiscuous mode [ 37.668741][ T506] device sit0 entered promiscuous mode [ 38.359888][ T522] device sit0 left promiscuous mode [ 38.457726][ T526] device sit0 entered promiscuous mode [ 38.553601][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 38.553617][ T28] audit: type=1400 audit(1754979462.366:107): avc: denied { cpu } for pid=530 comm="syz.0.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.756325][ T529] device sit0 left promiscuous mode [ 38.778495][ T532] device sit0 entered promiscuous mode [ 38.786933][ T28] audit: type=1400 audit(1754979462.606:108): avc: denied { write } for pid=538 comm="syz.4.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 39.007407][ T544] device sit0 left promiscuous mode [ 39.108299][ T544] device sit0 entered promiscuous mode [ 39.356672][ T554] syz.4.66[554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.356770][ T554] syz.4.66[554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.440089][ T554] syz.4.66[554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.564189][ T554] syz.4.66[554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.117561][ T590] device sit0 left promiscuous mode [ 41.150799][ T591] device sit0 entered promiscuous mode [ 42.438472][ T637] device sit0 entered promiscuous mode [ 43.113632][ T648] syz.0.97[648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.122308][ T648] syz.0.97[648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.212921][ T645] syz.0.97[645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.224159][ T645] syz.0.97[645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.487329][ T654] device sit0 left promiscuous mode [ 43.518870][ T657] device sit0 entered promiscuous mode [ 43.797464][ T668] device sit0 left promiscuous mode [ 43.946187][ T669] device sit0 entered promiscuous mode [ 44.889015][ T688] device sit0 left promiscuous mode [ 45.045549][ T691] device sit0 entered promiscuous mode [ 45.837463][ T701] device pim6reg1 entered promiscuous mode [ 46.119313][ T710] device sit0 left promiscuous mode [ 46.132052][ T712] device sit0 left promiscuous mode [ 46.179154][ T713] device sit0 entered promiscuous mode [ 46.390364][ T714] device sit0 entered promiscuous mode [ 47.981407][ T746] device pim6reg1 entered promiscuous mode [ 48.992816][ T768] device sit0 left promiscuous mode [ 49.044933][ T771] device sit0 entered promiscuous mode [ 49.936195][ T783] device sit0 left promiscuous mode [ 49.943830][ T785] syz.2.142[785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.943929][ T785] syz.2.142[785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.962047][ T804] device pim6reg1 entered promiscuous mode [ 51.220041][ T815] device pim6reg1 entered promiscuous mode [ 51.800942][ T827] device sit0 left promiscuous mode [ 51.978782][ T828] device sit0 entered promiscuous mode [ 52.487266][ T835] device sit0 left promiscuous mode [ 52.536686][ T836] device sit0 entered promiscuous mode [ 52.564877][ T838] syz.2.160[838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.564990][ T838] syz.2.160[838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.924881][ T848] device sit0 left promiscuous mode [ 53.020367][ T849] device sit0 entered promiscuous mode [ 53.534982][ T857] device sit0 left promiscuous mode [ 53.576425][ T855] device pim6reg1 entered promiscuous mode [ 53.609465][ T857] device sit0 entered promiscuous mode [ 53.923102][ T869] device pim6reg1 entered promiscuous mode [ 54.017636][ T873] device sit0 entered promiscuous mode [ 54.447167][ T878] device pim6reg1 entered promiscuous mode [ 54.451198][ T880] syz.0.176[880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.453182][ T880] syz.0.176[880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.920708][ T889] device sit0 left promiscuous mode [ 55.043371][ T889] device sit0 entered promiscuous mode [ 56.532416][ T917] device sit0 left promiscuous mode [ 56.594064][ T918] device sit0 entered promiscuous mode [ 56.798705][ T925] syz.4.190[925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.798811][ T925] syz.4.190[925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.226495][ T935] device pim6reg1 entered promiscuous mode [ 57.287381][ T938] syz.0.194[938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.287486][ T938] syz.0.194[938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.761351][ T951] syz.4.200[951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.825403][ T951] syz.4.200[951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.273277][ T958] device pim6reg1 entered promiscuous mode [ 59.052973][ T968] device sit0 left promiscuous mode [ 59.153663][ T971] device sit0 entered promiscuous mode [ 60.112365][ T993] syz.3.212[993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.112486][ T993] syz.3.212[993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.119152][ T1011] device pim6reg1 entered promiscuous mode [ 61.233876][ T1009] device pim6reg1 entered promiscuous mode [ 61.850410][ T1028] device pim6reg1 entered promiscuous mode [ 62.493456][ T1041] syz.0.231[1041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.493569][ T1041] syz.0.231[1041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.530573][ T1043] device pim6reg1 entered promiscuous mode [ 63.062477][ T1055] device pim6reg1 entered promiscuous mode [ 64.722019][ T1087] device pim6reg1 entered promiscuous mode [ 64.880627][ T1093] syz.2.251[1093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.880719][ T1093] syz.2.251[1093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.111931][ T1127] device pim6reg1 entered promiscuous mode [ 66.160426][ T1131] device syzkaller0 entered promiscuous mode [ 66.290439][ T1137] device veth0_vlan left promiscuous mode [ 66.333690][ T1137] device veth0_vlan entered promiscuous mode [ 66.336381][ T1144] syz.1.269[1144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.339982][ T1144] syz.1.269[1144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.410714][ T1137] device pim6reg1 entered promiscuous mode [ 68.043004][ T28] audit: type=1400 audit(1754979491.846:109): avc: denied { create } for pid=1175 comm="syz.3.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 69.189438][ T1196] syz.3.298[1196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.189539][ T1196] syz.3.298[1196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.701394][ T1205] FAULT_INJECTION: forcing a failure. [ 69.701394][ T1205] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 69.725688][ T1205] CPU: 1 PID: 1205 Comm: syz.4.290 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 69.735428][ T1205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 69.745523][ T1205] Call Trace: [ 69.748816][ T1205] [ 69.751758][ T1205] __dump_stack+0x21/0x24 [ 69.756123][ T1205] dump_stack_lvl+0xee/0x150 [ 69.760747][ T1205] ? __cfi_dump_stack_lvl+0x8/0x8 [ 69.765804][ T1205] dump_stack+0x15/0x24 [ 69.769986][ T1205] should_fail_ex+0x3d4/0x520 [ 69.774695][ T1205] should_fail+0xb/0x10 [ 69.778849][ T1205] should_fail_usercopy+0x1a/0x20 [ 69.783871][ T1205] copy_to_user_nofault+0x92/0x140 [ 69.788978][ T1205] bpf_probe_write_user+0x98/0xf0 [ 69.793998][ T1205] bpf_prog_c7763bb3f68e5cb3+0x38/0x3a [ 69.799461][ T1205] bpf_trace_run4+0x11b/0x270 [ 69.804130][ T1205] ? __cfi_bpf_trace_run4+0x10/0x10 [ 69.809321][ T1205] ? __this_cpu_preempt_check+0x13/0x20 [ 69.814858][ T1205] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 69.821527][ T1205] ? probe_sched_switch+0x63/0x90 [ 69.826551][ T1205] ? __cfi___bpf_trace_sched_switch+0x10/0x10 [ 69.832612][ T1205] __bpf_trace_sched_switch+0xe/0x10 [ 69.837902][ T1205] __traceiter_sched_switch+0xa0/0xd0 [ 69.843265][ T1205] __schedule+0x1263/0x14e0 [ 69.847757][ T1205] ? proc_tid_base_lookup+0x2b/0x30 [ 69.852946][ T1205] ? path_openat+0xff3/0x2f50 [ 69.857613][ T1205] ? release_firmware_map_entry+0x194/0x194 [ 69.863603][ T1205] ? __check_object_size+0x90/0x600 [ 69.868797][ T1205] ? preempt_schedule+0xa7/0xb0 [ 69.873637][ T1205] preempt_schedule_common+0x9b/0xf0 [ 69.878909][ T1205] preempt_schedule+0xa7/0xb0 [ 69.883572][ T1205] ? __cfi_preempt_schedule+0x10/0x10 [ 69.888957][ T1205] ? _raw_spin_unlock_irqrestore+0x55/0x80 [ 69.894774][ T1205] preempt_schedule_thunk+0x16/0x18 [ 69.899984][ T1205] _raw_spin_unlock+0x5f/0x70 [ 69.904671][ T1205] unix_stream_read_generic+0x13dc/0x1fa0 [ 69.910386][ T1205] ? unix_stream_read_actor+0xc0/0xc0 [ 69.915749][ T1205] ? is_bpf_text_address+0x177/0x190 [ 69.921029][ T1205] ? __cfi_autoremove_wake_function+0x10/0x10 [ 69.927093][ T1205] ? kernel_text_address+0xa0/0xd0 [ 69.932200][ T1205] ? selinux_socket_recvmsg+0x208/0x2e0 [ 69.937740][ T1205] ? __cfi_selinux_socket_recvmsg+0x10/0x10 [ 69.943628][ T1205] unix_stream_recvmsg+0x165/0x1b0 [ 69.948733][ T1205] ? __cfi_unix_stream_recvmsg+0x10/0x10 [ 69.954355][ T1205] ? stack_trace_save+0x98/0xe0 [ 69.959196][ T1205] ? __cfi_unix_stream_read_actor+0x10/0x10 [ 69.965109][ T1205] ? __stack_depot_save+0x36/0x480 [ 69.970237][ T1205] ? security_socket_recvmsg+0x99/0xc0 [ 69.975696][ T1205] ? __cfi_unix_stream_recvmsg+0x10/0x10 [ 69.981338][ T1205] ____sys_recvmsg+0x2a0/0x590 [ 69.986099][ T1205] ? __sys_recvmsg_sock+0x50/0x50 [ 69.991117][ T1205] ? import_iovec+0x7c/0xb0 [ 69.995624][ T1205] ___sys_recvmsg+0x1b2/0x510 [ 70.000294][ T1205] ? __sys_recvmsg+0x270/0x270 [ 70.005049][ T1205] ? security_file_permission+0x94/0xb0 [ 70.010588][ T1205] ? __fget_files+0x2d5/0x330 [ 70.015263][ T1205] ? __fdget+0x19c/0x220 [ 70.019518][ T1205] __x64_sys_recvmsg+0x1ed/0x2c0 [ 70.024445][ T1205] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 70.029900][ T1205] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 70.035957][ T1205] x64_sys_call+0x75/0x9a0 [ 70.040367][ T1205] do_syscall_64+0x4c/0xa0 [ 70.044779][ T1205] ? clear_bhb_loop+0x30/0x80 [ 70.049447][ T1205] ? clear_bhb_loop+0x30/0x80 [ 70.054116][ T1205] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 70.060012][ T1205] RIP: 0033:0x7fc8db58ebe9 [ 70.064429][ T1205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.084045][ T1205] RSP: 002b:00007fc8dc3cc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 70.092531][ T1205] RAX: ffffffffffffffda RBX: 00007fc8db7b5fa0 RCX: 00007fc8db58ebe9 [ 70.100491][ T1205] RDX: 0000000040002002 RSI: 0000200000000000 RDI: 0000000000000004 [ 70.108451][ T1205] RBP: 00007fc8dc3cc090 R08: 0000000000000000 R09: 0000000000000000 [ 70.116408][ T1205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.124376][ T1205] R13: 00007fc8db7b6038 R14: 00007fc8db7b5fa0 R15: 00007fff3a7b5f68 [ 70.132342][ T1205] [ 70.220870][ T1211] FAULT_INJECTION: forcing a failure. [ 70.220870][ T1211] name failslab, interval 1, probability 0, space 0, times 1 [ 70.264596][ T1211] CPU: 0 PID: 1211 Comm: syz.1.293 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 70.274406][ T1211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 70.284478][ T1211] Call Trace: [ 70.287773][ T1211] [ 70.290720][ T1211] __dump_stack+0x21/0x24 [ 70.295090][ T1211] dump_stack_lvl+0xee/0x150 [ 70.299699][ T1211] ? __cfi_dump_stack_lvl+0x8/0x8 [ 70.304749][ T1211] ? bpf_prog_test_run+0x3e3/0x630 [ 70.309879][ T1211] ? __x64_sys_bpf+0x7c/0x90 [ 70.314497][ T1211] ? x64_sys_call+0x488/0x9a0 [ 70.319196][ T1211] ? do_syscall_64+0x4c/0xa0 [ 70.323809][ T1211] dump_stack+0x15/0x24 [ 70.327992][ T1211] should_fail_ex+0x3d4/0x520 [ 70.332705][ T1211] __should_failslab+0xac/0xf0 [ 70.337509][ T1211] ? kvmalloc_node+0x294/0x480 [ 70.342312][ T1211] should_failslab+0x9/0x20 [ 70.346845][ T1211] __kmem_cache_alloc_node+0x3d/0x2c0 [ 70.352241][ T1211] ? kvmalloc_node+0x294/0x480 [ 70.357058][ T1211] __kmalloc_node+0xa1/0x1e0 [ 70.361689][ T1211] kvmalloc_node+0x294/0x480 [ 70.366309][ T1211] ? page_pool_create+0x70/0x620 [ 70.371267][ T1211] ? __cfi_kvmalloc_node+0x10/0x10 [ 70.376410][ T1211] ? kasan_save_alloc_info+0x25/0x30 [ 70.381716][ T1211] ? __kasan_kmalloc+0x95/0xb0 [ 70.386505][ T1211] ? page_pool_create+0x70/0x620 [ 70.391460][ T1211] ? memcpy+0x56/0x70 [ 70.395468][ T1211] page_pool_create+0x1fa/0x620 [ 70.400344][ T1211] bpf_test_run_xdp_live+0x1c3/0x19e0 [ 70.405748][ T1211] ? __cfi_mutex_unlock+0x10/0x10 [ 70.410793][ T1211] ? text_poke_copy+0x7b/0x90 [ 70.415493][ T1211] ? 0xffffffffa0004440 [ 70.419663][ T1211] ? 0xffffffffa0004440 [ 70.423830][ T1211] ? 0xffffffffa0004440 [ 70.428005][ T1211] ? xdp_convert_md_to_buff+0x370/0x370 [ 70.433586][ T1211] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 70.439504][ T1211] ? __kasan_check_write+0x14/0x20 [ 70.444693][ T1211] ? _copy_from_user+0x8f/0xc0 [ 70.449482][ T1211] bpf_prog_test_run_xdp+0x6f1/0xe50 [ 70.454791][ T1211] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 70.460620][ T1211] ? __kasan_check_write+0x14/0x20 [ 70.465756][ T1211] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 70.471586][ T1211] bpf_prog_test_run+0x3e3/0x630 [ 70.476538][ T1211] ? slab_free_freelist_hook+0xc2/0x190 [ 70.482118][ T1211] ? bpf_prog_query+0x270/0x270 [ 70.486988][ T1211] ? selinux_bpf+0xce/0xf0 [ 70.491420][ T1211] ? security_bpf+0x93/0xb0 [ 70.495940][ T1211] __sys_bpf+0x56d/0x780 [ 70.500198][ T1211] ? bpf_link_show_fdinfo+0x320/0x320 [ 70.505595][ T1211] ? __cfi_ksys_write+0x10/0x10 [ 70.510471][ T1211] ? debug_smp_processor_id+0x17/0x20 [ 70.515885][ T1211] __x64_sys_bpf+0x7c/0x90 [ 70.520332][ T1211] x64_sys_call+0x488/0x9a0 [ 70.524860][ T1211] do_syscall_64+0x4c/0xa0 [ 70.529304][ T1211] ? clear_bhb_loop+0x30/0x80 [ 70.534002][ T1211] ? clear_bhb_loop+0x30/0x80 [ 70.538707][ T1211] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 70.544650][ T1211] RIP: 0033:0x7f9422f8ebe9 [ 70.549079][ T1211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.568702][ T1211] RSP: 002b:00007f9423ed0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 70.577147][ T1211] RAX: ffffffffffffffda RBX: 00007f94231b5fa0 RCX: 00007f9422f8ebe9 [ 70.585148][ T1211] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 000000000000000a [ 70.593140][ T1211] RBP: 00007f9423ed0090 R08: 0000000000000000 R09: 0000000000000000 [ 70.601133][ T1211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 70.609125][ T1211] R13: 00007f94231b6038 R14: 00007f94231b5fa0 R15: 00007fffef6c98c8 [ 70.617115][ T1211] [ 70.732406][ T1211] page_pool_create() gave up with errno -12 [ 71.470075][ T1246] syz.3.303[1246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.470174][ T1246] syz.3.303[1246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.662927][ T1263] device macsec0 entered promiscuous mode [ 72.680981][ T1264] device veth1_macvtap entered promiscuous mode [ 72.795982][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 73.911087][ T1296] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.920646][ T1296] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.947465][ T1293] FAULT_INJECTION: forcing a failure. [ 73.947465][ T1293] name failslab, interval 1, probability 0, space 0, times 0 [ 73.971285][ T1293] CPU: 1 PID: 1293 Comm: syz.2.320 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 73.981075][ T1293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 73.991151][ T1293] Call Trace: [ 73.994448][ T1293] [ 73.997397][ T1293] __dump_stack+0x21/0x24 [ 74.001774][ T1293] dump_stack_lvl+0xee/0x150 [ 74.006398][ T1293] ? __cfi_dump_stack_lvl+0x8/0x8 [ 74.011458][ T1293] ? __perf_event_overflow+0x4e9/0x620 [ 74.016944][ T1293] dump_stack+0x15/0x24 [ 74.021121][ T1293] should_fail_ex+0x3d4/0x520 [ 74.025824][ T1293] __should_failslab+0xac/0xf0 [ 74.030620][ T1293] ? tipc_group_create+0xa1/0x650 [ 74.035665][ T1293] should_failslab+0x9/0x20 [ 74.040200][ T1293] __kmem_cache_alloc_node+0x3d/0x2c0 [ 74.045602][ T1293] ? tipc_group_create+0xa1/0x650 [ 74.050648][ T1293] kmalloc_trace+0x29/0xb0 [ 74.055094][ T1293] tipc_group_create+0xa1/0x650 [ 74.059965][ T1293] ? __local_bh_enable_ip+0x58/0x80 [ 74.065185][ T1293] tipc_sk_join+0x234/0x6a0 [ 74.069705][ T1293] ? __cfi_lock_sock_nested+0x10/0x10 [ 74.075098][ T1293] ? __tipc_sendstream+0x11a0/0x11a0 [ 74.080402][ T1293] ? __kasan_check_write+0x14/0x20 [ 74.085559][ T1293] tipc_setsockopt+0x684/0x900 [ 74.090352][ T1293] ? __cfi_tipc_setsockopt+0x10/0x10 [ 74.095676][ T1293] ? security_socket_setsockopt+0x93/0xb0 [ 74.101420][ T1293] ? __cfi_tipc_setsockopt+0x10/0x10 [ 74.106734][ T1293] __sys_setsockopt+0x306/0x4e0 [ 74.111600][ T1293] ? __cfi___sys_setsockopt+0x10/0x10 [ 74.116987][ T1293] ? sched_clock_cpu+0x6e/0x250 [ 74.121858][ T1293] __x64_sys_setsockopt+0xbf/0xd0 [ 74.126910][ T1293] x64_sys_call+0x124/0x9a0 [ 74.131447][ T1293] do_syscall_64+0x4c/0xa0 [ 74.135893][ T1293] ? clear_bhb_loop+0x30/0x80 [ 74.140589][ T1293] ? clear_bhb_loop+0x30/0x80 [ 74.145286][ T1293] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 74.151194][ T1293] RIP: 0033:0x7f47ce78ebe9 [ 74.155623][ T1293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.175244][ T1293] RSP: 002b:00007f47cf5d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 74.183769][ T1293] RAX: ffffffffffffffda RBX: 00007f47ce9b5fa0 RCX: 00007f47ce78ebe9 [ 74.191768][ T1293] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000008 [ 74.199764][ T1293] RBP: 00007f47cf5d0090 R08: 00000000000004bd R09: 0000000000000000 [ 74.207760][ T1293] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 74.215770][ T1293] R13: 00007f47ce9b6038 R14: 00007f47ce9b5fa0 R15: 00007fff5bd31318 [ 74.223773][ T1293] [ 74.574700][ T1312] FAULT_INJECTION: forcing a failure. [ 74.574700][ T1312] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 74.620998][ T1312] CPU: 1 PID: 1312 Comm: syz.1.324 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 74.630780][ T1312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 74.640853][ T1312] Call Trace: [ 74.644142][ T1312] [ 74.647083][ T1312] __dump_stack+0x21/0x24 [ 74.651449][ T1312] dump_stack_lvl+0xee/0x150 [ 74.656068][ T1312] ? __cfi_dump_stack_lvl+0x8/0x8 [ 74.661117][ T1312] ? proc_fail_nth_write+0x17a/0x1f0 [ 74.666458][ T1312] dump_stack+0x15/0x24 [ 74.670646][ T1312] should_fail_ex+0x3d4/0x520 [ 74.675356][ T1312] should_fail+0xb/0x10 [ 74.679534][ T1312] should_fail_usercopy+0x1a/0x20 [ 74.684577][ T1312] strncpy_from_user+0x24/0x2d0 [ 74.689456][ T1312] ? getname_flags+0xb9/0x500 [ 74.694179][ T1312] getname_flags+0xf4/0x500 [ 74.698713][ T1312] getname+0x19/0x20 [ 74.702638][ T1312] do_sys_openat2+0xcb/0x7e0 [ 74.707251][ T1312] ? __kasan_check_write+0x14/0x20 [ 74.712393][ T1312] ? do_sys_open+0xe0/0xe0 [ 74.716829][ T1312] ? ksys_write+0x1eb/0x240 [ 74.721362][ T1312] ? __cfi_ksys_write+0x10/0x10 [ 74.726242][ T1312] ? do_user_addr_fault+0x9ac/0x1050 [ 74.731559][ T1312] __x64_sys_openat+0x136/0x160 [ 74.736429][ T1312] x64_sys_call+0x783/0x9a0 [ 74.740952][ T1312] do_syscall_64+0x4c/0xa0 [ 74.745390][ T1312] ? clear_bhb_loop+0x30/0x80 [ 74.750090][ T1312] ? clear_bhb_loop+0x30/0x80 [ 74.754784][ T1312] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 74.760693][ T1312] RIP: 0033:0x7f9422f8ebe9 [ 74.765127][ T1312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.784748][ T1312] RSP: 002b:00007f9423eaf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 74.793168][ T1312] RAX: ffffffffffffffda RBX: 00007f94231b6090 RCX: 00007f9422f8ebe9 [ 74.801139][ T1312] RDX: 0000000000200002 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 74.809110][ T1312] RBP: 00007f9423eaf090 R08: 0000000000000000 R09: 0000000000000000 [ 74.817079][ T1312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.825044][ T1312] R13: 00007f94231b6128 R14: 00007f94231b6090 R15: 00007fffef6c98c8 [ 74.833019][ T1312] [ 74.921048][ T28] audit: type=1400 audit(1754979498.726:110): avc: denied { write } for pid=1308 comm="syz.1.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 75.261605][ T1320] device pim6reg1 entered promiscuous mode [ 75.294840][ T28] audit: type=1400 audit(1754979499.106:111): avc: denied { create } for pid=1323 comm="syz.1.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 75.560050][ T1336] FAULT_INJECTION: forcing a failure. [ 75.560050][ T1336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.587101][ T1338] device pim6reg1 entered promiscuous mode [ 75.605860][ T1336] CPU: 0 PID: 1336 Comm: syz.1.334 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 75.615633][ T1336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 75.625707][ T1336] Call Trace: [ 75.629001][ T1336] [ 75.631940][ T1336] __dump_stack+0x21/0x24 [ 75.636302][ T1336] dump_stack_lvl+0xee/0x150 [ 75.640912][ T1336] ? __cfi_dump_stack_lvl+0x8/0x8 [ 75.645948][ T1336] ? getname_flags+0xb9/0x500 [ 75.650638][ T1336] ? proc_fail_nth_write+0x17a/0x1f0 [ 75.655930][ T1336] dump_stack+0x15/0x24 [ 75.660099][ T1336] should_fail_ex+0x3d4/0x520 [ 75.664788][ T1336] should_fail+0xb/0x10 [ 75.668956][ T1336] should_fail_usercopy+0x1a/0x20 [ 75.673989][ T1336] strncpy_from_user+0x24/0x2d0 [ 75.678848][ T1336] ? getname_flags+0xb9/0x500 [ 75.683533][ T1336] getname_flags+0xf4/0x500 [ 75.688045][ T1336] getname+0x19/0x20 [ 75.691949][ T1336] do_sys_openat2+0xcb/0x7e0 [ 75.696545][ T1336] ? __kasan_check_write+0x14/0x20 [ 75.701663][ T1336] ? do_sys_open+0xe0/0xe0 [ 75.706089][ T1336] ? ksys_write+0x1eb/0x240 [ 75.710597][ T1336] ? __cfi_ksys_write+0x10/0x10 [ 75.715453][ T1336] __x64_sys_openat+0x136/0x160 [ 75.720329][ T1336] x64_sys_call+0x783/0x9a0 [ 75.724834][ T1336] do_syscall_64+0x4c/0xa0 [ 75.729262][ T1336] ? clear_bhb_loop+0x30/0x80 [ 75.733940][ T1336] ? clear_bhb_loop+0x30/0x80 [ 75.738616][ T1336] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 75.744510][ T1336] RIP: 0033:0x7f9422f8d550 [ 75.748924][ T1336] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 75.768526][ T1336] RSP: 002b:00007f9423eaef10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 75.776937][ T1336] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f9422f8d550 [ 75.784906][ T1336] RDX: 0000000000000002 RSI: 00007f9423eaefa0 RDI: 00000000ffffff9c [ 75.792876][ T1336] RBP: 00007f9423eaefa0 R08: 0000000000000000 R09: 0000000000000000 [ 75.800851][ T1336] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 75.808819][ T1336] R13: 00007f94231b6128 R14: 00007f94231b6090 R15: 00007fffef6c98c8 [ 75.816795][ T1336] [ 76.453695][ T1360] device pim6reg1 entered promiscuous mode [ 76.557304][ T28] audit: type=1400 audit(1754979500.366:112): avc: denied { read } for pid=1365 comm="syz.3.346" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 76.661919][ T28] audit: type=1400 audit(1754979500.366:113): avc: denied { open } for pid=1365 comm="syz.3.346" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 76.704965][ T28] audit: type=1400 audit(1754979500.366:114): avc: denied { ioctl } for pid=1365 comm="syz.3.346" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 77.506019][ T1376] device wg2 entered promiscuous mode [ 77.571024][ T28] audit: type=1400 audit(1754979501.376:115): avc: denied { create } for pid=1375 comm="syz.2.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 77.692699][ T1385] device veth0_vlan left promiscuous mode [ 77.759583][ T1385] device veth0_vlan entered promiscuous mode [ 78.394305][ T1409] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.401572][ T1409] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.901865][ T1445] syz.1.374[1445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.901978][ T1445] syz.1.374[1445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.160816][ T1449] FAULT_INJECTION: forcing a failure. [ 81.160816][ T1449] name failslab, interval 1, probability 0, space 0, times 0 [ 81.185089][ T1449] CPU: 1 PID: 1449 Comm: syz.3.375 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 81.194854][ T1449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 81.204930][ T1449] Call Trace: [ 81.208224][ T1449] [ 81.211170][ T1449] __dump_stack+0x21/0x24 [ 81.215529][ T1449] dump_stack_lvl+0xee/0x150 [ 81.220148][ T1449] ? __cfi_dump_stack_lvl+0x8/0x8 [ 81.225209][ T1449] dump_stack+0x15/0x24 [ 81.229397][ T1449] should_fail_ex+0x3d4/0x520 [ 81.234109][ T1449] __should_failslab+0xac/0xf0 [ 81.238902][ T1449] ? kvmalloc_node+0x294/0x480 [ 81.243698][ T1449] should_failslab+0x9/0x20 [ 81.248231][ T1449] __kmem_cache_alloc_node+0x3d/0x2c0 [ 81.253629][ T1449] ? kasan_save_alloc_info+0x25/0x30 [ 81.258938][ T1449] ? kvmalloc_node+0x294/0x480 [ 81.263731][ T1449] __kmalloc_node+0xa1/0x1e0 [ 81.268377][ T1449] kvmalloc_node+0x294/0x480 [ 81.273012][ T1449] ? __cfi_kvmalloc_node+0x10/0x10 [ 81.278152][ T1449] ? synchronize_rcu+0x93/0x3a0 [ 81.283029][ T1449] ? schedule_delayed_monitor_work+0x100/0x160 [ 81.289206][ T1449] bpf_test_run_xdp_live+0x1a9/0x19e0 [ 81.294607][ T1449] ? __cfi_mutex_unlock+0x10/0x10 [ 81.299659][ T1449] ? text_poke_copy+0x7b/0x90 [ 81.304359][ T1449] ? 0xffffffffa0004440 [ 81.308568][ T1449] ? 0xffffffffa0004440 [ 81.312742][ T1449] ? 0xffffffffa0004440 [ 81.316912][ T1449] ? xdp_convert_md_to_buff+0x370/0x370 [ 81.322486][ T1449] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 81.328407][ T1449] ? __kasan_check_write+0x14/0x20 [ 81.333556][ T1449] ? _copy_from_user+0x8f/0xc0 [ 81.338347][ T1449] bpf_prog_test_run_xdp+0x6f1/0xe50 [ 81.343664][ T1449] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 81.349500][ T1449] ? __kasan_check_write+0x14/0x20 [ 81.354643][ T1449] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 81.360557][ T1449] bpf_prog_test_run+0x3e3/0x630 [ 81.365508][ T1449] ? slab_free_freelist_hook+0xc2/0x190 [ 81.371088][ T1449] ? bpf_prog_query+0x270/0x270 [ 81.375957][ T1449] ? selinux_bpf+0xce/0xf0 [ 81.380391][ T1449] ? security_bpf+0x93/0xb0 [ 81.384918][ T1449] __sys_bpf+0x56d/0x780 [ 81.389175][ T1449] ? bpf_link_show_fdinfo+0x320/0x320 [ 81.394576][ T1449] ? __cfi_ksys_write+0x10/0x10 [ 81.399461][ T1449] ? debug_smp_processor_id+0x17/0x20 [ 81.404862][ T1449] __x64_sys_bpf+0x7c/0x90 [ 81.409308][ T1449] x64_sys_call+0x488/0x9a0 [ 81.413839][ T1449] do_syscall_64+0x4c/0xa0 [ 81.418284][ T1449] ? clear_bhb_loop+0x30/0x80 [ 81.422983][ T1449] ? clear_bhb_loop+0x30/0x80 [ 81.427680][ T1449] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 81.433596][ T1449] RIP: 0033:0x7fc98758ebe9 [ 81.438029][ T1449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.457660][ T1449] RSP: 002b:00007fc9883f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 81.466105][ T1449] RAX: ffffffffffffffda RBX: 00007fc9877b5fa0 RCX: 00007fc98758ebe9 [ 81.474099][ T1449] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 81.482106][ T1449] RBP: 00007fc9883f4090 R08: 0000000000000000 R09: 0000000000000000 [ 81.490098][ T1449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.498089][ T1449] R13: 00007fc9877b6038 R14: 00007fc9877b5fa0 R15: 00007ffe629734d8 [ 81.506092][ T1449] [ 82.809486][ T1481] FAULT_INJECTION: forcing a failure. [ 82.809486][ T1481] name failslab, interval 1, probability 0, space 0, times 0 [ 82.832658][ T1481] CPU: 0 PID: 1481 Comm: syz.2.385 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 82.842443][ T1481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 82.852503][ T1481] Call Trace: [ 82.855783][ T1481] [ 82.858712][ T1481] __dump_stack+0x21/0x24 [ 82.863059][ T1481] dump_stack_lvl+0xee/0x150 [ 82.867664][ T1481] ? __cfi_dump_stack_lvl+0x8/0x8 [ 82.872701][ T1481] ? skb_release_data+0x1d2/0x890 [ 82.877781][ T1481] ? skb_ensure_writable+0x2f8/0x470 [ 82.883160][ T1481] dump_stack+0x15/0x24 [ 82.887327][ T1481] should_fail_ex+0x3d4/0x520 [ 82.892015][ T1481] ? skb_clone+0x1f5/0x380 [ 82.896450][ T1481] __should_failslab+0xac/0xf0 [ 82.901218][ T1481] should_failslab+0x9/0x20 [ 82.905737][ T1481] kmem_cache_alloc+0x3b/0x330 [ 82.910516][ T1481] skb_clone+0x1f5/0x380 [ 82.914771][ T1481] bpf_clone_redirect+0xa7/0x3c0 [ 82.919751][ T1481] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 82.925211][ T1481] ? kasan_set_track+0x60/0x70 [ 82.930000][ T1481] ? kasan_set_track+0x4b/0x70 [ 82.934764][ T1481] ? kasan_save_alloc_info+0x25/0x30 [ 82.940142][ T1481] ? __kasan_slab_alloc+0x72/0x80 [ 82.945180][ T1481] ? slab_post_alloc_hook+0x4f/0x2d0 [ 82.950469][ T1481] ? kmem_cache_alloc+0x16e/0x330 [ 82.955496][ T1481] ? build_skb+0x2a/0x220 [ 82.959836][ T1481] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 82.965394][ T1481] ? bpf_prog_test_run+0x3e3/0x630 [ 82.970503][ T1481] ? __sys_bpf+0x56d/0x780 [ 82.974914][ T1481] ? __x64_sys_bpf+0x7c/0x90 [ 82.979515][ T1481] ? x64_sys_call+0x488/0x9a0 [ 82.984199][ T1481] ? do_syscall_64+0x4c/0xa0 [ 82.988798][ T1481] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 82.994886][ T1481] ? __kasan_check_read+0x11/0x20 [ 82.999923][ T1481] ? bpf_test_timer_continue+0x147/0x4a0 [ 83.005563][ T1481] bpf_test_run+0x349/0x8d0 [ 83.010077][ T1481] ? __kasan_slab_alloc+0x72/0x80 [ 83.015104][ T1481] ? convert___skb_to_skb+0x5b0/0x5b0 [ 83.020496][ T1481] ? __cfi_eth_type_trans+0x10/0x10 [ 83.025720][ T1481] ? convert___skb_to_skb+0x40/0x5b0 [ 83.031026][ T1481] bpf_prog_test_run_skb+0xaec/0x1290 [ 83.036420][ T1481] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 83.042243][ T1481] bpf_prog_test_run+0x3e3/0x630 [ 83.047197][ T1481] ? slab_free_freelist_hook+0xc2/0x190 [ 83.052759][ T1481] ? bpf_prog_query+0x270/0x270 [ 83.057618][ T1481] ? selinux_bpf+0xce/0xf0 [ 83.062041][ T1481] ? security_bpf+0x93/0xb0 [ 83.066549][ T1481] __sys_bpf+0x56d/0x780 [ 83.070792][ T1481] ? bpf_link_show_fdinfo+0x320/0x320 [ 83.076193][ T1481] ? __cfi_ksys_write+0x10/0x10 [ 83.081064][ T1481] ? debug_smp_processor_id+0x17/0x20 [ 83.086456][ T1481] __x64_sys_bpf+0x7c/0x90 [ 83.090892][ T1481] x64_sys_call+0x488/0x9a0 [ 83.095411][ T1481] do_syscall_64+0x4c/0xa0 [ 83.099850][ T1481] ? clear_bhb_loop+0x30/0x80 [ 83.104538][ T1481] ? clear_bhb_loop+0x30/0x80 [ 83.109224][ T1481] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 83.115123][ T1481] RIP: 0033:0x7f47ce78ebe9 [ 83.119542][ T1481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.139156][ T1481] RSP: 002b:00007f47cf5d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 83.147585][ T1481] RAX: ffffffffffffffda RBX: 00007f47ce9b5fa0 RCX: 00007f47ce78ebe9 [ 83.155575][ T1481] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 83.163566][ T1481] RBP: 00007f47cf5d0090 R08: 0000000000000000 R09: 0000000000000000 [ 83.171548][ T1481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 83.179523][ T1481] R13: 00007f47ce9b6038 R14: 00007f47ce9b5fa0 R15: 00007fff5bd31318 [ 83.187507][ T1481] [ 83.364234][ T1487] syz.0.388[1487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.364375][ T1487] syz.0.388[1487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.126270][ T1485] syz.2.387 (1485) used greatest stack depth: 21856 bytes left [ 84.175921][ T28] audit: type=1400 audit(1754979507.986:116): avc: denied { read } for pid=1500 comm="syz.4.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 85.988472][ T1543] syz.1.405[1543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.988572][ T1543] syz.1.405[1543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.667191][ T1582] syz.1.421[1582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.704050][ T1582] syz.1.421[1582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.763750][ T1603] device sit0 left promiscuous mode [ 88.827013][ T1604] device sit0 entered promiscuous mode [ 90.109711][ T1632] syz.3.437[1632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.109819][ T1632] syz.3.437[1632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.236964][ T1636] device pim6reg1 entered promiscuous mode [ 92.064845][ T1674] device pim6reg1 entered promiscuous mode [ 92.090531][ T1675] syz.4.453[1675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.090629][ T1675] syz.4.453[1675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.879494][ T28] audit: type=1400 audit(1754979516.686:117): avc: denied { create } for pid=1683 comm="syz.2.455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 93.004906][ T1689] GPL: port 1(erspan0) entered blocking state [ 93.011121][ T1689] GPL: port 1(erspan0) entered disabled state [ 93.040126][ T1689] device erspan0 entered promiscuous mode [ 93.082688][ T1696] GPL: port 1(erspan0) entered blocking state [ 93.088839][ T1696] GPL: port 1(erspan0) entered forwarding state [ 93.718417][ T1716] device veth0_vlan left promiscuous mode [ 93.760404][ T1716] device veth0_vlan entered promiscuous mode [ 94.702282][ T1738] bridge0: port 3(veth0) entered blocking state [ 94.740289][ T1738] bridge0: port 3(veth0) entered disabled state [ 94.770650][ T1738] device veth0 entered promiscuous mode [ 94.776649][ T1738] bridge0: port 3(veth0) entered blocking state [ 94.782968][ T1738] bridge0: port 3(veth0) entered forwarding state [ 95.164481][ T1762] ÿ: renamed from bond_slave_0 [ 95.193283][ T1765] device pim6reg1 entered promiscuous mode [ 96.771153][ T1795] GPL: port 1(erspan0) entered blocking state [ 96.830244][ T1795] GPL: port 1(erspan0) entered disabled state [ 96.906913][ T1795] device erspan0 entered promiscuous mode [ 96.992348][ T1791] GPL: port 1(erspan0) entered blocking state [ 96.999124][ T1791] GPL: port 1(erspan0) entered forwarding state [ 98.136302][ T1824] device pim6reg1 entered promiscuous mode [ 98.894211][ T1848] device veth1_macvtap left promiscuous mode [ 98.932599][ T1848] device macsec0 left promiscuous mode [ 99.360888][ T1863] FAULT_INJECTION: forcing a failure. [ 99.360888][ T1863] name failslab, interval 1, probability 0, space 0, times 0 [ 99.374197][ T1863] CPU: 1 PID: 1863 Comm: syz.0.510 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 99.383958][ T1863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 99.394037][ T1863] Call Trace: [ 99.397333][ T1863] [ 99.400275][ T1863] __dump_stack+0x21/0x24 [ 99.404636][ T1863] dump_stack_lvl+0xee/0x150 [ 99.409249][ T1863] ? __cfi_dump_stack_lvl+0x8/0x8 [ 99.414295][ T1863] ? rwsem_read_trylock+0x29a/0x620 [ 99.419522][ T1863] dump_stack+0x15/0x24 [ 99.423711][ T1863] should_fail_ex+0x3d4/0x520 [ 99.428421][ T1863] __should_failslab+0xac/0xf0 [ 99.433205][ T1863] should_failslab+0x9/0x20 [ 99.437735][ T1863] kmem_cache_alloc_node+0x42/0x340 [ 99.442962][ T1863] ? __alloc_skb+0xea/0x4b0 [ 99.447488][ T1863] ? br_get_link_af_size_filtered+0x152/0x180 [ 99.453575][ T1863] __alloc_skb+0xea/0x4b0 [ 99.457925][ T1863] rtmsg_ifinfo_build_skb+0x7c/0x190 [ 99.463236][ T1863] rtnetlink_event+0xd2/0x1a0 [ 99.467929][ T1863] raw_notifier_call_chain+0xa1/0x110 [ 99.473412][ T1863] dev_set_mac_address+0x329/0x430 [ 99.478536][ T1863] ? __cfi_dev_set_mac_address+0x10/0x10 [ 99.484187][ T1863] dev_set_mac_address_user+0x31/0x50 [ 99.489568][ T1863] dev_ifsioc+0x770/0xed0 [ 99.493909][ T1863] ? dev_ioctl+0xd10/0xd10 [ 99.498338][ T1863] ? __kasan_check_write+0x14/0x20 [ 99.503474][ T1863] ? mutex_lock+0x8d/0x1a0 [ 99.507905][ T1863] ? __cfi_mutex_lock+0x10/0x10 [ 99.512776][ T1863] ? dev_get_by_name_rcu+0xe5/0x130 [ 99.518001][ T1863] dev_ioctl+0x556/0xd10 [ 99.522257][ T1863] sock_do_ioctl+0x23f/0x310 [ 99.526877][ T1863] ? sock_show_fdinfo+0xb0/0xb0 [ 99.531751][ T1863] ? selinux_file_ioctl+0x377/0x480 [ 99.536974][ T1863] sock_ioctl+0x4d8/0x6e0 [ 99.541325][ T1863] ? __cfi_sock_ioctl+0x10/0x10 [ 99.546193][ T1863] ? __fget_files+0x2d5/0x330 [ 99.550898][ T1863] ? security_file_ioctl+0x95/0xc0 [ 99.556021][ T1863] ? __cfi_sock_ioctl+0x10/0x10 [ 99.560888][ T1863] __se_sys_ioctl+0x12f/0x1b0 [ 99.565577][ T1863] __x64_sys_ioctl+0x7b/0x90 [ 99.570185][ T1863] x64_sys_call+0x58b/0x9a0 [ 99.574717][ T1863] do_syscall_64+0x4c/0xa0 [ 99.579170][ T1863] ? clear_bhb_loop+0x30/0x80 [ 99.583875][ T1863] ? clear_bhb_loop+0x30/0x80 [ 99.588567][ T1863] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 99.594471][ T1863] RIP: 0033:0x7f08ed78ebe9 [ 99.598896][ T1863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.618519][ T1863] RSP: 002b:00007f08ee589038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 99.626949][ T1863] RAX: ffffffffffffffda RBX: 00007f08ed9b5fa0 RCX: 00007f08ed78ebe9 [ 99.634934][ T1863] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000008 [ 99.642916][ T1863] RBP: 00007f08ee589090 R08: 0000000000000000 R09: 0000000000000000 [ 99.650897][ T1863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.658883][ T1863] R13: 00007f08ed9b6038 R14: 00007f08ed9b5fa0 R15: 00007fff99728a68 [ 99.666905][ T1863] [ 100.115174][ T1882] device pim6reg1 entered promiscuous mode [ 100.863773][ T28] audit: type=1400 audit(1754979524.676:118): avc: denied { create } for pid=1902 comm="syz.4.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 102.415899][ T1920] device pim6reg1 entered promiscuous mode [ 102.626358][ T1927] Driver unsupported XDP return value 0 on prog (id 609) dev N/A, expect packet loss! [ 102.687946][ T1933] FAULT_INJECTION: forcing a failure. [ 102.687946][ T1933] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.770938][ T1933] CPU: 0 PID: 1933 Comm: syz.2.537 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 102.780732][ T1933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 102.790819][ T1933] Call Trace: [ 102.794123][ T1933] [ 102.797076][ T1933] __dump_stack+0x21/0x24 [ 102.801447][ T1933] dump_stack_lvl+0xee/0x150 [ 102.806089][ T1933] ? __cfi_dump_stack_lvl+0x8/0x8 [ 102.811155][ T1933] ? format_decode+0x1bb/0x1520 [ 102.816041][ T1933] dump_stack+0x15/0x24 [ 102.820212][ T1933] should_fail_ex+0x3d4/0x520 [ 102.824901][ T1933] should_fail+0xb/0x10 [ 102.829069][ T1933] should_fail_usercopy+0x1a/0x20 [ 102.834108][ T1933] _copy_from_user+0x1e/0xc0 [ 102.838709][ T1933] kstrtouint_from_user+0xbe/0x150 [ 102.843849][ T1933] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 102.849582][ T1933] ? __kasan_check_read+0x11/0x20 [ 102.854617][ T1933] ? _copy_to_user+0x72/0x90 [ 102.859218][ T1933] ? simple_read_from_buffer+0x10f/0x160 [ 102.864872][ T1933] proc_fail_nth_write+0x85/0x1f0 [ 102.869908][ T1933] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 102.875550][ T1933] ? security_file_permission+0x8a/0xb0 [ 102.881108][ T1933] ? security_file_permission+0x94/0xb0 [ 102.886662][ T1933] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 102.892301][ T1933] vfs_write+0x40c/0xca0 [ 102.896557][ T1933] ? __kasan_check_read+0x11/0x20 [ 102.901600][ T1933] ? __cfi_vfs_write+0x10/0x10 [ 102.906377][ T1933] ? __kasan_check_write+0x14/0x20 [ 102.911501][ T1933] ? mutex_lock+0x8d/0x1a0 [ 102.915922][ T1933] ? __cfi_mutex_lock+0x10/0x10 [ 102.920794][ T1933] ? __fdget_pos+0x2cd/0x380 [ 102.925397][ T1933] ? ksys_write+0x71/0x240 [ 102.929843][ T1933] ksys_write+0x140/0x240 [ 102.934191][ T1933] ? __cfi_ksys_write+0x10/0x10 [ 102.939054][ T1933] ? debug_smp_processor_id+0x17/0x20 [ 102.944446][ T1933] __x64_sys_write+0x7b/0x90 [ 102.949050][ T1933] x64_sys_call+0x27b/0x9a0 [ 102.953560][ T1933] do_syscall_64+0x4c/0xa0 [ 102.957986][ T1933] ? clear_bhb_loop+0x30/0x80 [ 102.962754][ T1933] ? clear_bhb_loop+0x30/0x80 [ 102.967440][ T1933] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 102.973335][ T1933] RIP: 0033:0x7f47ce78d69f [ 102.977752][ T1933] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 102.997360][ T1933] RSP: 002b:00007f47cf5d0030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 103.005783][ T1933] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f47ce78d69f [ 103.013763][ T1933] RDX: 0000000000000001 RSI: 00007f47cf5d00a0 RDI: 0000000000000006 [ 103.021751][ T1933] RBP: 00007f47cf5d0090 R08: 0000000000000000 R09: 0000000000000000 [ 103.029720][ T1933] R10: ffffffffffffffff R11: 0000000000000293 R12: 0000000000000002 [ 103.037695][ T1933] R13: 00007f47ce9b6038 R14: 00007f47ce9b5fa0 R15: 00007fff5bd31318 [ 103.045696][ T1933] [ 104.201769][ T1954] device pim6reg1 entered promiscuous mode [ 105.122926][ T1980] device veth0_vlan left promiscuous mode [ 105.179039][ T1980] device veth0_vlan entered promiscuous mode [ 105.383326][ T1987] device pim6reg1 entered promiscuous mode [ 105.819838][ T28] audit: type=1400 audit(1754979529.626:119): avc: denied { create } for pid=2011 comm="syz.0.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 105.943526][ T2022] device pim6reg1 entered promiscuous mode [ 106.017102][ T2024] device veth0_vlan left promiscuous mode [ 106.126294][ T2024] device veth0_vlan entered promiscuous mode [ 106.282306][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.290743][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.342078][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.796524][ T2046] device veth1_macvtap entered promiscuous mode [ 106.850630][ T2046] device macsec0 entered promiscuous mode [ 106.977886][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.907369][ T28] audit: type=1400 audit(1754979531.716:120): avc: denied { ioctl } for pid=2058 comm="syz.3.581" path="uts:[4026532389]" dev="nsfs" ino=4026532389 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 107.937223][ T2057] device pim6reg1 entered promiscuous mode [ 108.537594][ T2068] syz.2.585[2068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.537705][ T2068] syz.2.585[2068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.245567][ T2074] device pim6reg1 entered promiscuous mode [ 109.402027][ T2076] device veth0_vlan left promiscuous mode [ 109.428470][ T2076] device veth0_vlan entered promiscuous mode [ 111.157713][ T2104] device pim6reg1 entered promiscuous mode [ 111.222549][ T2110] syz.2.600[2110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.222659][ T2110] syz.2.600[2110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.271350][ T2142] device pim6reg1 entered promiscuous mode [ 113.200674][ T2153] FAULT_INJECTION: forcing a failure. [ 113.200674][ T2153] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.275504][ T2153] CPU: 1 PID: 2153 Comm: syz.4.617 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 113.285287][ T2153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 113.295403][ T2153] Call Trace: [ 113.298708][ T2153] [ 113.301656][ T2153] __dump_stack+0x21/0x24 [ 113.306019][ T2153] dump_stack_lvl+0xee/0x150 [ 113.310640][ T2153] ? __cfi_dump_stack_lvl+0x8/0x8 [ 113.315697][ T2153] dump_stack+0x15/0x24 [ 113.319886][ T2153] should_fail_ex+0x3d4/0x520 [ 113.324587][ T2153] should_fail+0xb/0x10 [ 113.328771][ T2153] should_fail_usercopy+0x1a/0x20 [ 113.333819][ T2153] copyin+0x20/0xa0 [ 113.337647][ T2153] _copy_from_iter+0x3e2/0xfd0 [ 113.342432][ T2153] ? copyin+0x82/0xa0 [ 113.346449][ T2153] ? _copy_from_iter+0x420/0xfd0 [ 113.351421][ T2153] ? __cfi__copy_from_iter+0x10/0x10 [ 113.356751][ T2153] ? __cfi__copy_from_iter+0x10/0x10 [ 113.362068][ T2153] ? check_stack_object+0x81/0x140 [ 113.367211][ T2153] copy_page_from_iter+0x1d2/0x2b0 [ 113.372350][ T2153] skb_copy_datagram_from_iter+0x2cd/0x6b0 [ 113.378193][ T2153] unix_stream_sendmsg+0x4c8/0xa70 [ 113.383332][ T2153] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 113.388994][ T2153] ? security_socket_sendmsg+0x93/0xb0 [ 113.394494][ T2153] ? __cfi_unix_stream_sendmsg+0x10/0x10 [ 113.400154][ T2153] ____sys_sendmsg+0x5a9/0x990 [ 113.405028][ T2153] ? __sys_sendmsg_sock+0x40/0x40 [ 113.410076][ T2153] ? import_iovec+0x7c/0xb0 [ 113.414605][ T2153] ___sys_sendmsg+0x21c/0x290 [ 113.419302][ T2153] ? __sys_sendmsg+0x270/0x270 [ 113.424172][ T2153] ? timerqueue_add+0x20e/0x230 [ 113.429061][ T2153] ? __fdget+0x19c/0x220 [ 113.433333][ T2153] __x64_sys_sendmsg+0x1f0/0x2c0 [ 113.438301][ T2153] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 113.443778][ T2153] ? sched_clock_cpu+0x6e/0x250 [ 113.448704][ T2153] ? debug_smp_processor_id+0x17/0x20 [ 113.454100][ T2153] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 113.460192][ T2153] x64_sys_call+0x171/0x9a0 [ 113.464718][ T2153] do_syscall_64+0x4c/0xa0 [ 113.469168][ T2153] ? clear_bhb_loop+0x30/0x80 [ 113.473876][ T2153] ? clear_bhb_loop+0x30/0x80 [ 113.478574][ T2153] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 113.484504][ T2153] RIP: 0033:0x7fc8db58ebe9 [ 113.488949][ T2153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.508571][ T2153] RSP: 002b:00007fc8dc3cc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 113.516988][ T2153] RAX: ffffffffffffffda RBX: 00007fc8db7b5fa0 RCX: 00007fc8db58ebe9 [ 113.524956][ T2153] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000003 [ 113.532923][ T2153] RBP: 00007fc8dc3cc090 R08: 0000000000000000 R09: 0000000000000000 [ 113.540887][ T2153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 113.548851][ T2153] R13: 00007fc8db7b6038 R14: 00007fc8db7b5fa0 R15: 00007fff3a7b5f68 [ 113.556823][ T2153] [ 113.574010][ T2157] syz.0.619[2157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.574110][ T2157] syz.0.619[2157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.119087][ T2176] device pim6reg1 entered promiscuous mode [ 114.807780][ T2196] device veth0_vlan left promiscuous mode [ 114.904775][ T2196] device veth0_vlan entered promiscuous mode [ 116.872191][ C1] sched: RT throttling activated [ 117.079862][ T2219] device veth1_macvtap left promiscuous mode [ 117.112462][ T2219] device macsec0 left promiscuous mode [ 117.266109][ T2223] syz.4.640[2223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.266224][ T2223] syz.4.640[2223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.426527][ T2226] FAULT_INJECTION: forcing a failure. [ 117.426527][ T2226] name failslab, interval 1, probability 0, space 0, times 0 [ 117.542161][ T2226] CPU: 0 PID: 2226 Comm: syz.3.641 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 117.551951][ T2226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 117.562024][ T2226] Call Trace: [ 117.565324][ T2226] [ 117.568276][ T2226] __dump_stack+0x21/0x24 [ 117.572633][ T2226] dump_stack_lvl+0xee/0x150 [ 117.577250][ T2226] ? __cfi_dump_stack_lvl+0x8/0x8 [ 117.582309][ T2226] ? do_syscall_64+0x4c/0xa0 [ 117.586936][ T2226] dump_stack+0x15/0x24 [ 117.591119][ T2226] should_fail_ex+0x3d4/0x520 [ 117.595819][ T2226] __should_failslab+0xac/0xf0 [ 117.600601][ T2226] ? sk_prot_alloc+0xed/0x320 [ 117.605310][ T2226] should_failslab+0x9/0x20 [ 117.609852][ T2226] __kmem_cache_alloc_node+0x3d/0x2c0 [ 117.615256][ T2226] ? sk_prot_alloc+0xed/0x320 [ 117.619959][ T2226] __kmalloc+0xa1/0x1e0 [ 117.624146][ T2226] sk_prot_alloc+0xed/0x320 [ 117.628677][ T2226] sk_alloc+0x3b/0x460 [ 117.632773][ T2226] ? __kasan_check_write+0x14/0x20 [ 117.637917][ T2226] bpf_prog_test_run_skb+0x37e/0x1290 [ 117.643311][ T2226] ? __fget_files+0x2d5/0x330 [ 117.648027][ T2226] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 117.653857][ T2226] bpf_prog_test_run+0x3e3/0x630 [ 117.658815][ T2226] ? bpf_prog_query+0x270/0x270 [ 117.663688][ T2226] ? __sys_bpf+0x2ed/0x780 [ 117.668126][ T2226] __sys_bpf+0x56d/0x780 [ 117.672383][ T2226] ? bpf_link_show_fdinfo+0x320/0x320 [ 117.677774][ T2226] ? __cfi_sched_clock_cpu+0x10/0x10 [ 117.683083][ T2226] __x64_sys_bpf+0x7c/0x90 [ 117.687530][ T2226] x64_sys_call+0x488/0x9a0 [ 117.692060][ T2226] do_syscall_64+0x4c/0xa0 [ 117.696507][ T2226] ? clear_bhb_loop+0x30/0x80 [ 117.701207][ T2226] ? clear_bhb_loop+0x30/0x80 [ 117.705912][ T2226] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 117.711825][ T2226] RIP: 0033:0x7fc98758ebe9 [ 117.716252][ T2226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.735879][ T2226] RSP: 002b:00007fc9883f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 117.744311][ T2226] RAX: ffffffffffffffda RBX: 00007fc9877b5fa0 RCX: 00007fc98758ebe9 [ 117.752314][ T2226] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 117.760306][ T2226] RBP: 00007fc9883f4090 R08: 0000000000000000 R09: 0000000000000000 [ 117.768301][ T2226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.776294][ T2226] R13: 00007fc9877b6038 R14: 00007fc9877b5fa0 R15: 00007ffe629734d8 [ 117.784294][ T2226] [ 120.060340][ T2264] syz.2.654[2264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.060444][ T2264] syz.2.654[2264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.681246][ T28] audit: type=1400 audit(1754979544.486:121): avc: denied { create } for pid=2270 comm="syz.3.656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 120.714255][ T2273] syz.1.657[2273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.714359][ T2273] syz.1.657[2273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.964432][ T2281] FAULT_INJECTION: forcing a failure. [ 120.964432][ T2281] name failslab, interval 1, probability 0, space 0, times 0 [ 121.152905][ T2290] FAULT_INJECTION: forcing a failure. [ 121.152905][ T2290] name failslab, interval 1, probability 0, space 0, times 0 [ 121.172282][ T2290] CPU: 1 PID: 2290 Comm: syz.4.665 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 121.182053][ T2290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 121.192129][ T2290] Call Trace: [ 121.195423][ T2290] [ 121.198356][ T2290] __dump_stack+0x21/0x24 [ 121.202708][ T2290] dump_stack_lvl+0xee/0x150 [ 121.207327][ T2290] ? __cfi_dump_stack_lvl+0x8/0x8 [ 121.212383][ T2290] ? stack_trace_save+0x98/0xe0 [ 121.217256][ T2290] dump_stack+0x15/0x24 [ 121.221446][ T2290] should_fail_ex+0x3d4/0x520 [ 121.226159][ T2290] __should_failslab+0xac/0xf0 [ 121.230954][ T2290] should_failslab+0x9/0x20 [ 121.235491][ T2290] kmem_cache_alloc_node+0x42/0x340 [ 121.240699][ T2290] ? dup_task_struct+0x5a/0x770 [ 121.245571][ T2290] dup_task_struct+0x5a/0x770 [ 121.250284][ T2290] ? __kasan_check_write+0x14/0x20 [ 121.255440][ T2290] ? recalc_sigpending+0x168/0x1c0 [ 121.260576][ T2290] copy_process+0x5b8/0x3470 [ 121.265194][ T2290] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 121.270950][ T2290] ? __kasan_check_write+0x14/0x20 [ 121.276102][ T2290] ? idle_dummy+0x10/0x10 [ 121.280464][ T2290] kernel_clone+0x23a/0x810 [ 121.284996][ T2290] ? __cfi_kernel_clone+0x10/0x10 [ 121.290044][ T2290] ? __kasan_check_write+0x14/0x20 [ 121.295194][ T2290] ? mutex_unlock+0x89/0x220 [ 121.299810][ T2290] __x64_sys_clone+0x168/0x1b0 [ 121.304603][ T2290] ? __cfi___x64_sys_clone+0x10/0x10 [ 121.309922][ T2290] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 121.316016][ T2290] x64_sys_call+0x990/0x9a0 [ 121.320551][ T2290] do_syscall_64+0x4c/0xa0 [ 121.324990][ T2290] ? clear_bhb_loop+0x30/0x80 [ 121.329676][ T2290] ? clear_bhb_loop+0x30/0x80 [ 121.334365][ T2290] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 121.340277][ T2290] RIP: 0033:0x7fc8db58ebe9 [ 121.344706][ T2290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.364363][ T2290] RSP: 002b:00007fc8dc3cbfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 121.372823][ T2290] RAX: ffffffffffffffda RBX: 00007fc8db7b5fa0 RCX: 00007fc8db58ebe9 [ 121.380843][ T2290] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 121.388831][ T2290] RBP: 00007fc8dc3cc090 R08: 0000000000000000 R09: 0000000000000000 [ 121.396839][ T2290] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 121.404835][ T2290] R13: 00007fc8db7b6038 R14: 00007fc8db7b5fa0 R15: 00007fff3a7b5f68 [ 121.412830][ T2290] [ 121.422547][ T2281] CPU: 0 PID: 2281 Comm: syz.3.661 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 121.432319][ T2281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 121.442400][ T2281] Call Trace: [ 121.445692][ T2281] [ 121.448638][ T2281] __dump_stack+0x21/0x24 [ 121.453001][ T2281] dump_stack_lvl+0xee/0x150 [ 121.457624][ T2281] ? __cfi_dump_stack_lvl+0x8/0x8 [ 121.462686][ T2281] dump_stack+0x15/0x24 [ 121.466873][ T2281] should_fail_ex+0x3d4/0x520 [ 121.471574][ T2281] __should_failslab+0xac/0xf0 [ 121.476361][ T2281] ? kvmalloc_node+0x294/0x480 [ 121.481158][ T2281] should_failslab+0x9/0x20 [ 121.485698][ T2281] __kmem_cache_alloc_node+0x3d/0x2c0 [ 121.491092][ T2281] ? kasan_save_alloc_info+0x25/0x30 [ 121.496387][ T2281] ? kvmalloc_node+0x294/0x480 [ 121.501161][ T2281] __kmalloc_node+0xa1/0x1e0 [ 121.505757][ T2281] ? __cfi_mutex_unlock+0x10/0x10 [ 121.510779][ T2281] kvmalloc_node+0x294/0x480 [ 121.515382][ T2281] ? __cfi_kvmalloc_node+0x10/0x10 [ 121.520500][ T2281] ? synchronize_rcu+0x93/0x3a0 [ 121.525353][ T2281] ? schedule_delayed_monitor_work+0x100/0x160 [ 121.531515][ T2281] bpf_test_run_xdp_live+0x1a9/0x19e0 [ 121.536893][ T2281] ? __cfi_mutex_unlock+0x10/0x10 [ 121.541920][ T2281] ? text_poke_copy+0x7b/0x90 [ 121.546601][ T2281] ? 0xffffffffa0004440 [ 121.550753][ T2281] ? 0xffffffffa0004440 [ 121.554900][ T2281] ? 0xffffffffa0004440 [ 121.559054][ T2281] ? xdp_convert_md_to_buff+0x370/0x370 [ 121.564609][ T2281] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 121.570507][ T2281] ? __kasan_check_write+0x14/0x20 [ 121.575625][ T2281] ? _copy_from_user+0x8f/0xc0 [ 121.580390][ T2281] bpf_prog_test_run_xdp+0x6f1/0xe50 [ 121.585675][ T2281] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 121.591481][ T2281] ? __kasan_check_write+0x14/0x20 [ 121.596597][ T2281] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 121.602403][ T2281] bpf_prog_test_run+0x3e3/0x630 [ 121.607337][ T2281] ? slab_free_freelist_hook+0xc2/0x190 [ 121.612888][ T2281] ? bpf_prog_query+0x270/0x270 [ 121.617730][ T2281] ? selinux_bpf+0xce/0xf0 [ 121.622142][ T2281] ? security_bpf+0x93/0xb0 [ 121.626651][ T2281] __sys_bpf+0x56d/0x780 [ 121.630891][ T2281] ? bpf_link_show_fdinfo+0x320/0x320 [ 121.636264][ T2281] ? __cfi_ksys_write+0x10/0x10 [ 121.641121][ T2281] ? debug_smp_processor_id+0x17/0x20 [ 121.646499][ T2281] __x64_sys_bpf+0x7c/0x90 [ 121.650919][ T2281] x64_sys_call+0x488/0x9a0 [ 121.655424][ T2281] do_syscall_64+0x4c/0xa0 [ 121.659847][ T2281] ? clear_bhb_loop+0x30/0x80 [ 121.664525][ T2281] ? clear_bhb_loop+0x30/0x80 [ 121.669205][ T2281] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 121.675097][ T2281] RIP: 0033:0x7fc98758ebe9 [ 121.679509][ T2281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.699116][ T2281] RSP: 002b:00007fc9883f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 121.707529][ T2281] RAX: ffffffffffffffda RBX: 00007fc9877b5fa0 RCX: 00007fc98758ebe9 [ 121.715498][ T2281] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 000000000000000a [ 121.723468][ T2281] RBP: 00007fc9883f4090 R08: 0000000000000000 R09: 0000000000000000 [ 121.731437][ T2281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.739404][ T2281] R13: 00007fc9877b6038 R14: 00007fc9877b5fa0 R15: 00007ffe629734d8 [ 121.747379][ T2281] [ 122.229436][ T2312] syz.3.674[2312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.229544][ T2312] syz.3.674[2312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.839867][ T28] audit: type=1400 audit(1754979546.646:122): avc: denied { create } for pid=2319 comm="syz.0.677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 125.669604][ T2382] device pim6reg1 entered promiscuous mode [ 125.978275][ T2390] syz.1.701[2390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.978378][ T2390] syz.1.701[2390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.027244][ T2403] bridge0: port 3(veth0) entered disabled state [ 127.045882][ T2403] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.054183][ T2403] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.140472][ T2409] device veth0 left promiscuous mode [ 127.147170][ T2409] bridge0: port 3(veth0) entered disabled state [ 127.161318][ T2409] device bridge_slave_1 left promiscuous mode [ 127.168188][ T2409] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.177267][ T2413] syz.0.709[2413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.177363][ T2413] syz.0.709[2413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.242545][ T2409] device bridge_slave_0 left promiscuous mode [ 127.293635][ T2409] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.518673][ T2421] device pim6reg1 entered promiscuous mode [ 127.691222][ T2426] syz.4.714[2426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.691342][ T2426] syz.4.714[2426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.967815][ T2436] syz.3.717[2436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.054047][ T2436] syz.3.717[2436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.609339][ T2453] FAULT_INJECTION: forcing a failure. [ 128.609339][ T2453] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.732405][ T2453] CPU: 1 PID: 2453 Comm: syz.4.721 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 128.742188][ T2453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 128.752270][ T2453] Call Trace: [ 128.755570][ T2453] [ 128.758520][ T2453] __dump_stack+0x21/0x24 [ 128.762889][ T2453] dump_stack_lvl+0xee/0x150 [ 128.767513][ T2453] ? __cfi_dump_stack_lvl+0x8/0x8 [ 128.772574][ T2453] dump_stack+0x15/0x24 [ 128.776758][ T2453] should_fail_ex+0x3d4/0x520 [ 128.781457][ T2453] should_fail+0xb/0x10 [ 128.785630][ T2453] should_fail_usercopy+0x1a/0x20 [ 128.790671][ T2453] _copy_from_user+0x1e/0xc0 [ 128.795278][ T2453] bpf_prog_test_run_skb+0x286/0x1290 [ 128.800672][ T2453] ? __fget_files+0x2d5/0x330 [ 128.805374][ T2453] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 128.811192][ T2453] bpf_prog_test_run+0x3e3/0x630 [ 128.816140][ T2453] ? bpf_prog_query+0x270/0x270 [ 128.821004][ T2453] ? selinux_bpf+0xce/0xf0 [ 128.825434][ T2453] ? security_bpf+0x93/0xb0 [ 128.829954][ T2453] __sys_bpf+0x56d/0x780 [ 128.834211][ T2453] ? bpf_link_show_fdinfo+0x320/0x320 [ 128.839594][ T2453] ? irqentry_exit+0x37/0x40 [ 128.844199][ T2453] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 128.850021][ T2453] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 128.856192][ T2453] __x64_sys_bpf+0x7c/0x90 [ 128.860632][ T2453] x64_sys_call+0x488/0x9a0 [ 128.865151][ T2453] do_syscall_64+0x4c/0xa0 [ 128.869588][ T2453] ? clear_bhb_loop+0x30/0x80 [ 128.874278][ T2453] ? clear_bhb_loop+0x30/0x80 [ 128.878974][ T2453] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 128.884877][ T2453] RIP: 0033:0x7fc8db58ebe9 [ 128.889304][ T2453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.908924][ T2453] RSP: 002b:00007fc8dc3cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 128.917353][ T2453] RAX: ffffffffffffffda RBX: 00007fc8db7b5fa0 RCX: 00007fc8db58ebe9 [ 128.925342][ T2453] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 128.933324][ T2453] RBP: 00007fc8dc3cc090 R08: 0000000000000000 R09: 0000000000000000 [ 128.941387][ T2453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.949376][ T2453] R13: 00007fc8db7b6038 R14: 00007fc8db7b5fa0 R15: 00007fff3a7b5f68 [ 128.957630][ T2453] [ 129.112941][ T2463] syz.1.725[2463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.113042][ T2463] syz.1.725[2463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.186201][ T2456] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.205972][ T2456] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.233461][ T2464] device pim6reg1 entered promiscuous mode [ 129.355432][ T2461] device bridge_slave_1 left promiscuous mode [ 129.391775][ T2461] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.402331][ T2461] device bridge_slave_0 left promiscuous mode [ 129.408658][ T2461] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.422689][ T2491] FAULT_INJECTION: forcing a failure. [ 130.422689][ T2491] name failslab, interval 1, probability 0, space 0, times 0 [ 130.464735][ T2491] CPU: 0 PID: 2491 Comm: syz.2.732 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 130.474511][ T2491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 130.484588][ T2491] Call Trace: [ 130.487880][ T2491] [ 130.490834][ T2491] __dump_stack+0x21/0x24 [ 130.495208][ T2491] dump_stack_lvl+0xee/0x150 [ 130.499818][ T2491] ? __cfi_dump_stack_lvl+0x8/0x8 [ 130.504862][ T2491] ? __kasan_kmalloc+0x95/0xb0 [ 130.509644][ T2491] dump_stack+0x15/0x24 [ 130.513817][ T2491] should_fail_ex+0x3d4/0x520 [ 130.518512][ T2491] ? build_skb+0x2a/0x220 [ 130.522871][ T2491] __should_failslab+0xac/0xf0 [ 130.527656][ T2491] should_failslab+0x9/0x20 [ 130.532182][ T2491] kmem_cache_alloc+0x3b/0x330 [ 130.536966][ T2491] build_skb+0x2a/0x220 [ 130.541145][ T2491] bpf_prog_test_run_skb+0x39f/0x1290 [ 130.546547][ T2491] ? __fget_files+0x2d5/0x330 [ 130.551292][ T2491] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 130.557204][ T2491] bpf_prog_test_run+0x3e3/0x630 [ 130.562157][ T2491] ? slab_free_freelist_hook+0xc2/0x190 [ 130.567739][ T2491] ? bpf_prog_query+0x270/0x270 [ 130.572614][ T2491] ? selinux_bpf+0xce/0xf0 [ 130.577049][ T2491] ? security_bpf+0x93/0xb0 [ 130.581575][ T2491] __sys_bpf+0x56d/0x780 [ 130.585839][ T2491] ? bpf_link_show_fdinfo+0x320/0x320 [ 130.591234][ T2491] ? __cfi_ksys_write+0x10/0x10 [ 130.596117][ T2491] ? debug_smp_processor_id+0x17/0x20 [ 130.601522][ T2491] __x64_sys_bpf+0x7c/0x90 [ 130.605971][ T2491] x64_sys_call+0x488/0x9a0 [ 130.610491][ T2491] do_syscall_64+0x4c/0xa0 [ 130.614952][ T2491] ? clear_bhb_loop+0x30/0x80 [ 130.619645][ T2491] ? clear_bhb_loop+0x30/0x80 [ 130.624345][ T2491] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 130.630263][ T2491] RIP: 0033:0x7f47ce78ebe9 [ 130.634693][ T2491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.654324][ T2491] RSP: 002b:00007f47cf5d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 130.662764][ T2491] RAX: ffffffffffffffda RBX: 00007f47ce9b5fa0 RCX: 00007f47ce78ebe9 [ 130.670752][ T2491] RDX: 0000000000000050 RSI: 0000200000000d80 RDI: 000000000000000a [ 130.678733][ T2491] RBP: 00007f47cf5d0090 R08: 0000000000000000 R09: 0000000000000000 [ 130.686713][ T2491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.694696][ T2491] R13: 00007f47ce9b6038 R14: 00007f47ce9b5fa0 R15: 00007fff5bd31318 [ 130.702688][ T2491] [ 131.527599][ T2516] device sit0 left promiscuous mode [ 131.687973][ T2517] device sit0 entered promiscuous mode [ 132.821311][ T2537] bpf_get_probe_write_proto: 2 callbacks suppressed [ 132.821331][ T2537] syz.3.749[2537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.863719][ T2537] syz.3.749[2537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.177322][ T2539] device syzkaller0 entered promiscuous mode [ 133.691167][ T2553] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.699459][ T2553] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.844433][ T2556] device bridge_slave_1 left promiscuous mode [ 133.850634][ T2556] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.961120][ T2556] device bridge_slave_0 left promiscuous mode [ 134.023298][ T2556] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.405851][ T2568] @ÿ: renamed from bond_slave_0 [ 134.554660][ T2572] device pim6reg1 entered promiscuous mode [ 134.614985][ T2585] syz.1.765[2585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.615100][ T2585] syz.1.765[2585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.878316][ T2572] device syzkaller0 entered promiscuous mode [ 135.048920][ T28] audit: type=1400 audit(1754979558.856:123): avc: denied { write } for pid=2600 comm="syz.0.771" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 135.606716][ T2602] device syzkaller0 entered promiscuous mode [ 135.923345][ T2616] syz.2.785[2616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.923450][ T2616] syz.2.785[2616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.010399][ T2620] FAULT_INJECTION: forcing a failure. [ 136.010399][ T2620] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.035943][ T2616] syz.2.785[2616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.036052][ T2616] syz.2.785[2616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.090524][ T2620] CPU: 1 PID: 2620 Comm: syz.1.776 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 136.111496][ T2620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 136.121567][ T2620] Call Trace: [ 136.124859][ T2620] [ 136.127821][ T2620] __dump_stack+0x21/0x24 [ 136.132184][ T2620] dump_stack_lvl+0xee/0x150 [ 136.136803][ T2620] ? __cfi_dump_stack_lvl+0x8/0x8 [ 136.141862][ T2620] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 136.147616][ T2620] dump_stack+0x15/0x24 [ 136.151804][ T2620] should_fail_ex+0x3d4/0x520 [ 136.156507][ T2620] should_fail+0xb/0x10 [ 136.160693][ T2620] should_fail_usercopy+0x1a/0x20 [ 136.165744][ T2620] _copy_from_user+0x1e/0xc0 [ 136.170508][ T2620] sk_setsockopt+0x294/0x2590 [ 136.175225][ T2620] ? __cfi_sk_setsockopt+0x10/0x10 [ 136.180370][ T2620] ? proc_fail_nth_write+0x17a/0x1f0 [ 136.185678][ T2620] ? selinux_socket_setsockopt+0x21c/0x300 [ 136.191519][ T2620] ? slab_free_freelist_hook+0xc2/0x190 [ 136.197096][ T2620] ? __fget_files+0x2d5/0x330 [ 136.201809][ T2620] sock_setsockopt+0x5a/0x70 [ 136.206519][ T2620] __sys_setsockopt+0x270/0x4e0 [ 136.211399][ T2620] ? __cfi___sys_setsockopt+0x10/0x10 [ 136.216798][ T2620] ? ksys_write+0x1eb/0x240 [ 136.221328][ T2620] ? __cfi_ksys_write+0x10/0x10 [ 136.226207][ T2620] __x64_sys_setsockopt+0xbf/0xd0 [ 136.231248][ T2620] x64_sys_call+0x124/0x9a0 [ 136.235774][ T2620] do_syscall_64+0x4c/0xa0 [ 136.240218][ T2620] ? clear_bhb_loop+0x30/0x80 [ 136.244914][ T2620] ? clear_bhb_loop+0x30/0x80 [ 136.249612][ T2620] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 136.255516][ T2620] RIP: 0033:0x7f9422f8ebe9 [ 136.259943][ T2620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.279595][ T2620] RSP: 002b:00007f9423ed0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 136.288034][ T2620] RAX: ffffffffffffffda RBX: 00007f94231b5fa0 RCX: 00007f9422f8ebe9 [ 136.296030][ T2620] RDX: 000000000000001d RSI: 0000000000000001 RDI: 0000000000000007 [ 136.304021][ T2620] RBP: 00007f9423ed0090 R08: 0000000000000004 R09: 0000000000000000 [ 136.312015][ T2620] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 136.320006][ T2620] R13: 00007f94231b6038 R14: 00007f94231b5fa0 R15: 00007fffef6c98c8 [ 136.328007][ T2620] [ 136.438543][ T2623] device bridge_slave_1 left promiscuous mode [ 136.457107][ T2623] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.484729][ T2631] syz.1.780[2631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.484822][ T2631] syz.1.780[2631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.497471][ T2623] device bridge_slave_0 left promiscuous mode [ 136.516980][ T2623] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.840683][ T2647] device veth0_vlan left promiscuous mode [ 136.890863][ T2647] device veth0_vlan entered promiscuous mode [ 136.961507][ T2657] device pim6reg1 entered promiscuous mode [ 137.313999][ T2667] FAULT_INJECTION: forcing a failure. [ 137.313999][ T2667] name failslab, interval 1, probability 0, space 0, times 0 [ 137.362905][ T2667] CPU: 1 PID: 2667 Comm: syz.4.794 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 137.372739][ T2667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 137.382821][ T2667] Call Trace: [ 137.386122][ T2667] [ 137.389069][ T2667] __dump_stack+0x21/0x24 [ 137.393431][ T2667] dump_stack_lvl+0xee/0x150 [ 137.398060][ T2667] ? __cfi_dump_stack_lvl+0x8/0x8 [ 137.403122][ T2667] ? skb_release_data+0x1d2/0x890 [ 137.408184][ T2667] ? skb_ensure_writable+0x2f8/0x470 [ 137.413509][ T2667] dump_stack+0x15/0x24 [ 137.417699][ T2667] should_fail_ex+0x3d4/0x520 [ 137.422405][ T2667] ? skb_clone+0x1f5/0x380 [ 137.426851][ T2667] __should_failslab+0xac/0xf0 [ 137.431691][ T2667] should_failslab+0x9/0x20 [ 137.436311][ T2667] kmem_cache_alloc+0x3b/0x330 [ 137.441103][ T2667] skb_clone+0x1f5/0x380 [ 137.445374][ T2667] bpf_clone_redirect+0xa7/0x3c0 [ 137.450343][ T2667] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 137.455822][ T2667] ? kasan_set_track+0x60/0x70 [ 137.460610][ T2667] ? kasan_set_track+0x4b/0x70 [ 137.465402][ T2667] ? kasan_save_alloc_info+0x25/0x30 [ 137.470721][ T2667] ? __kasan_slab_alloc+0x72/0x80 [ 137.475767][ T2667] ? slab_post_alloc_hook+0x4f/0x2d0 [ 137.481080][ T2667] ? kmem_cache_alloc+0x16e/0x330 [ 137.486138][ T2667] ? build_skb+0x2a/0x220 [ 137.490499][ T2667] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 137.496087][ T2667] ? bpf_prog_test_run+0x3e3/0x630 [ 137.501217][ T2667] ? __sys_bpf+0x56d/0x780 [ 137.505648][ T2667] ? __x64_sys_bpf+0x7c/0x90 [ 137.510261][ T2667] ? x64_sys_call+0x488/0x9a0 [ 137.514991][ T2667] ? do_syscall_64+0x4c/0xa0 [ 137.519642][ T2667] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 137.525763][ T2667] ? __kasan_check_read+0x11/0x20 [ 137.530825][ T2667] ? bpf_test_timer_continue+0x147/0x4a0 [ 137.536502][ T2667] bpf_test_run+0x349/0x8d0 [ 137.541036][ T2667] ? __kasan_slab_alloc+0x72/0x80 [ 137.546089][ T2667] ? convert___skb_to_skb+0x5b0/0x5b0 [ 137.551493][ T2667] ? __cfi_eth_type_trans+0x10/0x10 [ 137.556723][ T2667] ? convert___skb_to_skb+0x40/0x5b0 [ 137.562038][ T2667] bpf_prog_test_run_skb+0xaec/0x1290 [ 137.567440][ T2667] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 137.573271][ T2667] bpf_prog_test_run+0x3e3/0x630 [ 137.578227][ T2667] ? slab_free_freelist_hook+0xc2/0x190 [ 137.583805][ T2667] ? bpf_prog_query+0x270/0x270 [ 137.588682][ T2667] ? selinux_bpf+0xce/0xf0 [ 137.593116][ T2667] ? security_bpf+0x93/0xb0 [ 137.597638][ T2667] __sys_bpf+0x56d/0x780 [ 137.601901][ T2667] ? bpf_link_show_fdinfo+0x320/0x320 [ 137.607299][ T2667] ? __cfi_ksys_write+0x10/0x10 [ 137.612178][ T2667] ? debug_smp_processor_id+0x17/0x20 [ 137.617575][ T2667] __x64_sys_bpf+0x7c/0x90 [ 137.622021][ T2667] x64_sys_call+0x488/0x9a0 [ 137.626546][ T2667] do_syscall_64+0x4c/0xa0 [ 137.630999][ T2667] ? clear_bhb_loop+0x30/0x80 [ 137.635714][ T2667] ? clear_bhb_loop+0x30/0x80 [ 137.640423][ T2667] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 137.646340][ T2667] RIP: 0033:0x7fc8db58ebe9 [ 137.650774][ T2667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.670401][ T2667] RSP: 002b:00007fc8dc3cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.678848][ T2667] RAX: ffffffffffffffda RBX: 00007fc8db7b5fa0 RCX: 00007fc8db58ebe9 [ 137.686856][ T2667] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 137.694861][ T2667] RBP: 00007fc8dc3cc090 R08: 0000000000000000 R09: 0000000000000000 [ 137.702859][ T2667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.710854][ T2667] R13: 00007fc8db7b6038 R14: 00007fc8db7b5fa0 R15: 00007fff3a7b5f68 [ 137.718852][ T2667] [ 137.954117][ T2673] syz.3.797[2673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.954221][ T2673] syz.3.797[2673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.168305][ T28] audit: type=1400 audit(1754979561.976:124): avc: denied { create } for pid=2681 comm="syz.2.800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 141.941870][ T2691] device pim6reg1 entered promiscuous mode [ 142.927035][ T2727] syz.4.814[2727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.927134][ T2727] syz.4.814[2727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.325895][ T2742] device pim6reg1 entered promiscuous mode [ 143.649931][ T2748] device syzkaller0 entered promiscuous mode [ 144.366254][ T2774] FAULT_INJECTION: forcing a failure. [ 144.366254][ T2774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.410724][ T2774] CPU: 0 PID: 2774 Comm: syz.3.831 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 144.420525][ T2774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 144.430611][ T2774] Call Trace: [ 144.433905][ T2774] [ 144.436858][ T2774] __dump_stack+0x21/0x24 [ 144.441225][ T2774] dump_stack_lvl+0xee/0x150 [ 144.445847][ T2774] ? __cfi_dump_stack_lvl+0x8/0x8 [ 144.450903][ T2774] ? migrate_enable+0x19c/0x280 [ 144.455785][ T2774] dump_stack+0x15/0x24 [ 144.459970][ T2774] should_fail_ex+0x3d4/0x520 [ 144.464675][ T2774] should_fail+0xb/0x10 [ 144.468863][ T2774] should_fail_usercopy+0x1a/0x20 [ 144.473907][ T2774] _copy_from_user+0x1e/0xc0 [ 144.478524][ T2774] generic_map_update_batch+0x4b1/0x780 [ 144.484100][ T2774] ? __cfi_generic_map_update_batch+0x10/0x10 [ 144.490193][ T2774] ? __fdget+0x19c/0x220 [ 144.494463][ T2774] ? __cfi_generic_map_update_batch+0x10/0x10 [ 144.500551][ T2774] bpf_map_do_batch+0x48c/0x620 [ 144.505421][ T2774] __sys_bpf+0x624/0x780 [ 144.509690][ T2774] ? bpf_link_show_fdinfo+0x320/0x320 [ 144.515083][ T2774] ? __cfi_ksys_write+0x10/0x10 [ 144.519964][ T2774] ? debug_smp_processor_id+0x17/0x20 [ 144.525370][ T2774] __x64_sys_bpf+0x7c/0x90 [ 144.529824][ T2774] x64_sys_call+0x488/0x9a0 [ 144.534346][ T2774] do_syscall_64+0x4c/0xa0 [ 144.538798][ T2774] ? clear_bhb_loop+0x30/0x80 [ 144.543509][ T2774] ? clear_bhb_loop+0x30/0x80 [ 144.548214][ T2774] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 144.554138][ T2774] RIP: 0033:0x7fc98758ebe9 [ 144.558574][ T2774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.578219][ T2774] RSP: 002b:00007fc9883f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 144.586667][ T2774] RAX: ffffffffffffffda RBX: 00007fc9877b5fa0 RCX: 00007fc98758ebe9 [ 144.594659][ T2774] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 144.602649][ T2774] RBP: 00007fc9883f4090 R08: 0000000000000000 R09: 0000000000000000 [ 144.610643][ T2774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 144.618634][ T2774] R13: 00007fc9877b6038 R14: 00007fc9877b5fa0 R15: 00007ffe629734d8 [ 144.626637][ T2774] [ 144.683212][ T2783] syz.1.844[2783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.683332][ T2783] syz.1.844[2783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.714311][ T2787] syz.3.835[2787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.735968][ T2787] syz.3.835[2787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.808096][ T2785] device veth0_vlan left promiscuous mode [ 144.863331][ T2785] device veth0_vlan entered promiscuous mode [ 145.802995][ T2834] syz.2.853[2834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.803101][ T2834] syz.2.853[2834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.863862][ T2838] syz.1.852[2838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.902081][ T2838] syz.1.852[2838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.980377][ T2836] syz.1.852[2836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.005452][ T2836] syz.1.852[2836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.262338][ T28] audit: type=1400 audit(1754979570.076:125): avc: denied { relabelfrom } for pid=2850 comm="syz.3.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 146.312461][ T28] audit: type=1400 audit(1754979570.076:126): avc: denied { relabelto } for pid=2850 comm="syz.3.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 147.589519][ T2904] ÿ: renamed from bond_slave_0 [ 148.985704][ T2937] FAULT_INJECTION: forcing a failure. [ 148.985704][ T2937] name failslab, interval 1, probability 0, space 0, times 0 [ 149.002207][ T2937] CPU: 0 PID: 2937 Comm: syz.3.881 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 149.011978][ T2937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 149.022052][ T2937] Call Trace: [ 149.025351][ T2937] [ 149.028303][ T2937] __dump_stack+0x21/0x24 [ 149.032679][ T2937] dump_stack_lvl+0xee/0x150 [ 149.037318][ T2937] ? __cfi_dump_stack_lvl+0x8/0x8 [ 149.042382][ T2937] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 149.048483][ T2937] dump_stack+0x15/0x24 [ 149.052681][ T2937] should_fail_ex+0x3d4/0x520 [ 149.057390][ T2937] ? copy_mm+0x15b/0x1a10 [ 149.061755][ T2937] __should_failslab+0xac/0xf0 [ 149.066590][ T2937] should_failslab+0x9/0x20 [ 149.071131][ T2937] kmem_cache_alloc+0x3b/0x330 [ 149.075950][ T2937] copy_mm+0x15b/0x1a10 [ 149.080137][ T2937] ? __kasan_slab_alloc+0x72/0x80 [ 149.085189][ T2937] ? copy_signal+0x630/0x630 [ 149.089812][ T2937] ? _raw_spin_lock+0x8e/0xe0 [ 149.094526][ T2937] ? __cfi__raw_spin_lock+0x10/0x10 [ 149.099756][ T2937] ? memset+0x35/0x40 [ 149.103782][ T2937] ? __init_rwsem+0x12c/0x240 [ 149.108476][ T2937] ? copy_signal+0x4ea/0x630 [ 149.113086][ T2937] copy_process+0x12ef/0x3470 [ 149.117783][ T2937] ? idle_dummy+0x10/0x10 [ 149.122142][ T2937] kernel_clone+0x23a/0x810 [ 149.126665][ T2937] ? __cfi_kernel_clone+0x10/0x10 [ 149.131702][ T2937] ? __kasan_check_write+0x14/0x20 [ 149.136828][ T2937] ? mutex_unlock+0x89/0x220 [ 149.141424][ T2937] __x64_sys_clone+0x168/0x1b0 [ 149.146198][ T2937] ? __cfi___x64_sys_clone+0x10/0x10 [ 149.151498][ T2937] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 149.157571][ T2937] x64_sys_call+0x990/0x9a0 [ 149.162077][ T2937] do_syscall_64+0x4c/0xa0 [ 149.166503][ T2937] ? clear_bhb_loop+0x30/0x80 [ 149.171184][ T2937] ? clear_bhb_loop+0x30/0x80 [ 149.175864][ T2937] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 149.181765][ T2937] RIP: 0033:0x7fc98758ebe9 [ 149.186185][ T2937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.205909][ T2937] RSP: 002b:00007fc9883f3fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 149.214339][ T2937] RAX: ffffffffffffffda RBX: 00007fc9877b5fa0 RCX: 00007fc98758ebe9 [ 149.222314][ T2937] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000005000000 [ 149.230286][ T2937] RBP: 00007fc9883f4090 R08: 0000000000000000 R09: 0000000000000000 [ 149.238260][ T2937] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 149.246232][ T2937] R13: 00007fc9877b6038 R14: 00007fc9877b5fa0 R15: 00007ffe629734d8 [ 149.254217][ T2937] [ 149.782110][ T2961] device pim6reg1 entered promiscuous mode [ 150.566671][ T2974] ÿ: renamed from bond_slave_0 [ 151.732899][ T2996] device pim6reg1 entered promiscuous mode [ 151.923209][ T2965] syz.3.891 (2965) used greatest stack depth: 21408 bytes left [ 153.288153][ T3024] ÿ: renamed from bond_slave_0 [ 154.094867][ T3039] device pim6reg1 entered promiscuous mode [ 156.169270][ T3080] device wg2 left promiscuous mode [ 156.531989][ T3100] device veth0_vlan left promiscuous mode [ 156.564117][ T3100] device veth0_vlan entered promiscuous mode [ 158.209395][ T3129] device pim6reg1 entered promiscuous mode [ 158.718054][ T3151] device veth0_vlan left promiscuous mode [ 158.761407][ T3151] device veth0_vlan entered promiscuous mode [ 159.862797][ T3180] device pim6reg1 entered promiscuous mode [ 160.252490][ T3192] bpf_get_probe_write_proto: 4 callbacks suppressed [ 160.252508][ T3192] syz.2.962[3192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.269407][ T3192] syz.2.962[3192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.494577][ T28] audit: type=1400 audit(1754979584.306:127): avc: denied { append } for pid=3203 comm="syz.4.967" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 160.556204][ T3207] device pim6reg1 entered promiscuous mode [ 160.821213][ T3217] device pim6reg1 entered promiscuous mode [ 161.805512][ T3261] syz.3.983[3261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.805615][ T3261] syz.3.983[3261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.824071][ T3257] device pim6reg1 entered promiscuous mode [ 162.071387][ T28] audit: type=1400 audit(1754979585.876:128): avc: denied { create } for pid=3262 comm="syz.4.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 164.153724][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 164.181541][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 167.293162][ T3406] syz.3.1029[3406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.293262][ T3406] syz.3.1029[3406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.495664][ T3416] syz.1.1043[3416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.581643][ T3416] syz.1.1043[3416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.654379][ T3421] device sit0 left promiscuous mode [ 168.075480][ T3421] device syzkaller0 entered promiscuous mode [ 168.193730][ T3421] device sit0 entered promiscuous mode [ 168.581379][ T3452] syz.4.1045[3452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.582288][ T3452] syz.4.1045[3452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.867319][ T3460] syz.3.1057[3460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.955263][ T3460] syz.3.1057[3460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.906745][ T3478] device pim6reg1 entered promiscuous mode [ 170.051153][ T3480] device sit0 left promiscuous mode [ 170.235544][ T3480] device syzkaller0 entered promiscuous mode [ 170.482378][ T3480] device sit0 entered promiscuous mode [ 170.971868][ T3501] syz.2.1062[3501] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.971970][ T3501] syz.2.1062[3501] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.886324][ T3517] device pim6reg1 entered promiscuous mode [ 172.201923][ T3528] device pim6reg1 entered promiscuous mode [ 172.256753][ T3530] device sit0 left promiscuous mode [ 172.468026][ T3530] device syzkaller0 entered promiscuous mode [ 172.522279][ T3532] device sit0 entered promiscuous mode [ 173.968503][ T3574] device pim6reg1 entered promiscuous mode [ 175.361466][ T3612] device pim6reg1 entered promiscuous mode [ 177.162766][ T3672] device pim6reg1 entered promiscuous mode [ 177.719135][ T3686] device wg2 entered promiscuous mode [ 177.771445][ T28] audit: type=1400 audit(1754979601.576:129): avc: denied { create } for pid=3685 comm="syz.2.1122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 177.986080][ T3686] device sit0 left promiscuous mode [ 178.313521][ T3689] device sit0 entered promiscuous mode [ 178.628331][ T3705] bond_slave_1: mtu less than device minimum [ 179.452934][ T3724] device pim6reg1 entered promiscuous mode [ 179.746725][ T28] audit: type=1400 audit(1754979603.546:130): avc: denied { create } for pid=3734 comm="syz.4.1136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 181.537615][ T3775] device pim6reg1 entered promiscuous mode [ 182.013380][ T28] audit: type=1400 audit(1754979605.816:131): avc: denied { create } for pid=3783 comm="syz.0.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 183.728462][ T3812] device veth1_macvtap entered promiscuous mode [ 183.742624][ T3812] device macsec0 entered promiscuous mode [ 183.790168][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.546064][ T3835] device veth1_macvtap left promiscuous mode [ 184.562940][ T3835] device macsec0 left promiscuous mode [ 184.678164][ T3835] device wg2 entered promiscuous mode [ 184.757576][ T3835] device sit0 left promiscuous mode [ 184.878779][ T3836] device sit0 entered promiscuous mode [ 186.854914][ T3883] syz.0.1184[3883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.855054][ T3883] syz.0.1184[3883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.149713][ T3900] device pim6reg1 entered promiscuous mode [ 189.602096][ T3925] syz.1.1191[3925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.602865][ T3925] syz.1.1191[3925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.468619][ T3941] device pim6reg1 entered promiscuous mode [ 192.383943][ T3983] device pim6reg1 entered promiscuous mode [ 193.550594][ T4010] FAULT_INJECTION: forcing a failure. [ 193.550594][ T4010] name failslab, interval 1, probability 0, space 0, times 0 [ 193.555193][ T3996] device syzkaller0 entered promiscuous mode [ 193.566399][ T4010] CPU: 1 PID: 4010 Comm: syz.2.1216 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 193.579312][ T4010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 193.589398][ T4010] Call Trace: [ 193.592690][ T4010] [ 193.595621][ T4010] __dump_stack+0x21/0x24 [ 193.599974][ T4010] dump_stack_lvl+0xee/0x150 [ 193.604576][ T4010] ? __cfi_dump_stack_lvl+0x8/0x8 [ 193.609606][ T4010] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 193.615681][ T4010] dump_stack+0x15/0x24 [ 193.619944][ T4010] should_fail_ex+0x3d4/0x520 [ 193.624620][ T4010] ? copy_mm+0x15b/0x1a10 [ 193.628962][ T4010] __should_failslab+0xac/0xf0 [ 193.633736][ T4010] should_failslab+0x9/0x20 [ 193.638249][ T4010] kmem_cache_alloc+0x3b/0x330 [ 193.643044][ T4010] copy_mm+0x15b/0x1a10 [ 193.647218][ T4010] ? __kasan_slab_alloc+0x72/0x80 [ 193.652258][ T4010] ? copy_signal+0x630/0x630 [ 193.656887][ T4010] ? _raw_spin_lock+0x8e/0xe0 [ 193.661584][ T4010] ? __cfi__raw_spin_lock+0x10/0x10 [ 193.666803][ T4010] ? memset+0x35/0x40 [ 193.670807][ T4010] ? __init_rwsem+0x12c/0x240 [ 193.675507][ T4010] ? copy_signal+0x4ea/0x630 [ 193.680119][ T4010] copy_process+0x12ef/0x3470 [ 193.684834][ T4010] ? idle_dummy+0x10/0x10 [ 193.689175][ T4010] kernel_clone+0x23a/0x810 [ 193.693695][ T4010] ? __cfi_kernel_clone+0x10/0x10 [ 193.698820][ T4010] ? __kasan_check_write+0x14/0x20 [ 193.703938][ T4010] ? mutex_unlock+0x89/0x220 [ 193.708532][ T4010] __x64_sys_clone+0x168/0x1b0 [ 193.713321][ T4010] ? __cfi___x64_sys_clone+0x10/0x10 [ 193.718633][ T4010] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 193.724732][ T4010] x64_sys_call+0x990/0x9a0 [ 193.729236][ T4010] do_syscall_64+0x4c/0xa0 [ 193.733664][ T4010] ? clear_bhb_loop+0x30/0x80 [ 193.738355][ T4010] ? clear_bhb_loop+0x30/0x80 [ 193.743049][ T4010] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 193.748950][ T4010] RIP: 0033:0x7f47ce78ebe9 [ 193.753371][ T4010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.772995][ T4010] RSP: 002b:00007f47cf5aefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 193.781416][ T4010] RAX: ffffffffffffffda RBX: 00007f47ce9b6090 RCX: 00007f47ce78ebe9 [ 193.789395][ T4010] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 193.797373][ T4010] RBP: 00007f47cf5af090 R08: 0000000000000000 R09: 0000000000000000 [ 193.805349][ T4010] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 193.813323][ T4010] R13: 00007f47ce9b6128 R14: 00007f47ce9b6090 R15: 00007fff5bd31318 [ 193.821307][ T4010] [ 194.618266][ T4024] device pim6reg1 entered promiscuous mode [ 194.712788][ T4027] syz.4.1221[4027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.712896][ T4027] syz.4.1221[4027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.041430][ T4057] device pim6reg1 entered promiscuous mode [ 196.951813][ T4081] syz.2.1239[4081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.951909][ T4081] syz.2.1239[4081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.292885][ T4096] device pim6reg1 entered promiscuous mode [ 199.121750][ T4137] syz.0.1260[4137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.121852][ T4137] syz.0.1260[4137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.343330][ T4192] syz.0.1274[4192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.355095][ T4192] syz.0.1274[4192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.249857][ T4202] device pim6reg1 entered promiscuous mode [ 202.781509][ T4215] device pim6reg1 entered promiscuous mode [ 205.518830][ T4255] device pim6reg1 entered promiscuous mode [ 206.095914][ T4270] FAULT_INJECTION: forcing a failure. [ 206.095914][ T4270] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 206.168176][ T4270] CPU: 1 PID: 4270 Comm: syz.0.1299 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 206.178038][ T4270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 206.188116][ T4270] Call Trace: [ 206.191401][ T4270] [ 206.194345][ T4270] __dump_stack+0x21/0x24 [ 206.198711][ T4270] dump_stack_lvl+0xee/0x150 [ 206.203335][ T4270] ? __cfi_dump_stack_lvl+0x8/0x8 [ 206.208392][ T4270] dump_stack+0x15/0x24 [ 206.212598][ T4270] should_fail_ex+0x3d4/0x520 [ 206.217308][ T4270] should_fail+0xb/0x10 [ 206.221499][ T4270] should_fail_usercopy+0x1a/0x20 [ 206.226551][ T4270] _copy_to_user+0x1e/0x90 [ 206.230993][ T4270] simple_read_from_buffer+0xe9/0x160 [ 206.236403][ T4270] proc_fail_nth_read+0x19a/0x210 [ 206.241490][ T4270] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 206.247072][ T4270] ? security_file_permission+0x94/0xb0 [ 206.252651][ T4270] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 206.258246][ T4270] vfs_read+0x26e/0x8c0 [ 206.262443][ T4270] ? __cfi_vfs_read+0x10/0x10 [ 206.267155][ T4270] ? __kasan_check_write+0x14/0x20 [ 206.272295][ T4270] ? mutex_lock+0x8d/0x1a0 [ 206.276734][ T4270] ? __cfi_mutex_lock+0x10/0x10 [ 206.281608][ T4270] ? __fdget_pos+0x2cd/0x380 [ 206.286211][ T4270] ? ksys_read+0x71/0x240 [ 206.290576][ T4270] ksys_read+0x140/0x240 [ 206.294846][ T4270] ? __cfi_ksys_read+0x10/0x10 [ 206.299640][ T4270] ? debug_smp_processor_id+0x17/0x20 [ 206.305042][ T4270] __x64_sys_read+0x7b/0x90 [ 206.309627][ T4270] x64_sys_call+0x2f/0x9a0 [ 206.314067][ T4270] do_syscall_64+0x4c/0xa0 [ 206.318520][ T4270] ? clear_bhb_loop+0x30/0x80 [ 206.323220][ T4270] ? clear_bhb_loop+0x30/0x80 [ 206.327927][ T4270] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 206.333845][ T4270] RIP: 0033:0x7f08ed78d5fc [ 206.338295][ T4270] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 206.357927][ T4270] RSP: 002b:00007f08ee547030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 206.366368][ T4270] RAX: ffffffffffffffda RBX: 00007f08ed9b6180 RCX: 00007f08ed78d5fc [ 206.374365][ T4270] RDX: 000000000000000f RSI: 00007f08ee5470a0 RDI: 0000000000000009 [ 206.382356][ T4270] RBP: 00007f08ee547090 R08: 0000000000000000 R09: 0000000000000000 [ 206.390349][ T4270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.398343][ T4270] R13: 00007f08ed9b6218 R14: 00007f08ed9b6180 R15: 00007fff99728a68 [ 206.406515][ T4270] [ 206.746015][ T4281] syz.4.1303[4281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.746119][ T4281] syz.4.1303[4281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.177857][ T4293] device pim6reg1 entered promiscuous mode [ 208.048306][ T4315] device pim6reg1 entered promiscuous mode [ 208.564218][ T4333] syz.0.1320[4333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.564319][ T4333] syz.0.1320[4333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.231009][ T4353] device pim6reg1 entered promiscuous mode [ 209.478964][ T4358] syz.0.1337[4358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.479069][ T4358] syz.0.1337[4358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.084761][ T4403] device pim6reg1 entered promiscuous mode [ 211.866883][ T4424] syz.1.1345[4424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.866987][ T4424] syz.1.1345[4424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.604855][ T4441] device pim6reg1 entered promiscuous mode [ 213.734840][ T4479] syz.1.1363[4479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.735031][ T4479] syz.1.1363[4479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.168841][ T4486] device pim6reg1 entered promiscuous mode [ 214.723809][ T4492] syz.1.1367[4492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.723904][ T4492] syz.1.1367[4492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.517530][ T4526] syz.4.1375[4526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.617430][ T4526] syz.4.1375[4526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.686343][ T4531] device pim6reg1 entered promiscuous mode [ 217.030773][ T4536] syz.1.1378[4536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.030929][ T4536] syz.1.1378[4536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.986585][ T4556] syz.1.1383[4556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.033717][ T4556] syz.1.1383[4556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.508574][ T4565] syz.2.1387[4565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.571612][ T4565] syz.2.1387[4565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.718793][ T4585] syz.4.1394[4585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.730902][ T4585] syz.4.1394[4585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.868815][ T4581] device pim6reg1 entered promiscuous mode [ 221.103569][ T4619] device pim6reg1 entered promiscuous mode [ 222.804785][ T4659] device pim6reg1 entered promiscuous mode [ 227.592529][ T4761] device pim6reg1 entered promiscuous mode [ 229.074883][ T4800] FAULT_INJECTION: forcing a failure. [ 229.074883][ T4800] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 229.093443][ T4800] CPU: 1 PID: 4800 Comm: syz.0.1469 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 229.103300][ T4800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 229.113372][ T4800] Call Trace: [ 229.116665][ T4800] [ 229.119607][ T4800] __dump_stack+0x21/0x24 [ 229.123971][ T4800] dump_stack_lvl+0xee/0x150 [ 229.128587][ T4800] ? __cfi_dump_stack_lvl+0x8/0x8 [ 229.133643][ T4800] ? __kmalloc_node+0xb2/0x1e0 [ 229.138436][ T4800] dump_stack+0x15/0x24 [ 229.142615][ T4800] should_fail_ex+0x3d4/0x520 [ 229.147328][ T4800] should_fail+0xb/0x10 [ 229.151509][ T4800] should_fail_usercopy+0x1a/0x20 [ 229.156562][ T4800] _copy_from_user+0x1e/0xc0 [ 229.161183][ T4800] generic_map_update_batch+0x458/0x780 [ 229.166760][ T4800] ? __cfi_generic_map_update_batch+0x10/0x10 [ 229.172862][ T4800] ? __fdget+0x19c/0x220 [ 229.177141][ T4800] ? __cfi_generic_map_update_batch+0x10/0x10 [ 229.183237][ T4800] bpf_map_do_batch+0x48c/0x620 [ 229.188115][ T4800] __sys_bpf+0x624/0x780 [ 229.192383][ T4800] ? bpf_link_show_fdinfo+0x320/0x320 [ 229.197781][ T4800] ? __cfi_ksys_write+0x10/0x10 [ 229.202672][ T4800] ? debug_smp_processor_id+0x17/0x20 [ 229.208083][ T4800] __x64_sys_bpf+0x7c/0x90 [ 229.212538][ T4800] x64_sys_call+0x488/0x9a0 [ 229.217079][ T4800] do_syscall_64+0x4c/0xa0 [ 229.221522][ T4800] ? clear_bhb_loop+0x30/0x80 [ 229.226227][ T4800] ? clear_bhb_loop+0x30/0x80 [ 229.230939][ T4800] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 229.236859][ T4800] RIP: 0033:0x7f08ed78ebe9 [ 229.241276][ T4800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 229.260882][ T4800] RSP: 002b:00007f08ee589038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 229.269307][ T4800] RAX: ffffffffffffffda RBX: 00007f08ed9b5fa0 RCX: 00007f08ed78ebe9 [ 229.277286][ T4800] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 229.285448][ T4800] RBP: 00007f08ee589090 R08: 0000000000000000 R09: 0000000000000000 [ 229.293443][ T4800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 229.301444][ T4800] R13: 00007f08ed9b6038 R14: 00007f08ed9b5fa0 R15: 00007fff99728a68 [ 229.309417][ T4800] [ 229.652033][ T4808] FAULT_INJECTION: forcing a failure. [ 229.652033][ T4808] name failslab, interval 1, probability 0, space 0, times 0 [ 229.822360][ T4808] CPU: 1 PID: 4808 Comm: syz.0.1471 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 229.832231][ T4808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 229.842311][ T4808] Call Trace: [ 229.845608][ T4808] [ 229.848554][ T4808] __dump_stack+0x21/0x24 [ 229.852924][ T4808] dump_stack_lvl+0xee/0x150 [ 229.857541][ T4808] ? __cfi_dump_stack_lvl+0x8/0x8 [ 229.862597][ T4808] dump_stack+0x15/0x24 [ 229.866788][ T4808] should_fail_ex+0x3d4/0x520 [ 229.871492][ T4808] ? prepare_creds+0x2f/0x640 [ 229.876195][ T4808] __should_failslab+0xac/0xf0 [ 229.880983][ T4808] should_failslab+0x9/0x20 [ 229.885537][ T4808] kmem_cache_alloc+0x3b/0x330 [ 229.890338][ T4808] prepare_creds+0x2f/0x640 [ 229.894867][ T4808] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 229.901054][ T4808] copy_creds+0xe4/0x640 [ 229.905339][ T4808] copy_process+0x828/0x3470 [ 229.909960][ T4808] ? timerqueue_add+0x20e/0x230 [ 229.914840][ T4808] ? idle_dummy+0x10/0x10 [ 229.919197][ T4808] ? enqueue_hrtimer+0xc9/0x240 [ 229.924082][ T4808] kernel_clone+0x23a/0x810 [ 229.928619][ T4808] ? __cfi_kernel_clone+0x10/0x10 [ 229.933671][ T4808] __x64_sys_clone+0x168/0x1b0 [ 229.938468][ T4808] ? __cfi___x64_sys_clone+0x10/0x10 [ 229.943780][ T4808] ? 0xffffffffff600000 [ 229.947953][ T4808] x64_sys_call+0x990/0x9a0 [ 229.952486][ T4808] do_syscall_64+0x4c/0xa0 [ 229.956938][ T4808] ? clear_bhb_loop+0x30/0x80 [ 229.961648][ T4808] ? clear_bhb_loop+0x30/0x80 [ 229.966367][ T4808] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 229.972290][ T4808] RIP: 0033:0x7f08ed78ebe9 [ 229.976734][ T4808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 229.996373][ T4808] RSP: 002b:00007f08ee588fe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 230.004814][ T4808] RAX: ffffffffffffffda RBX: 00007f08ed9b5fa0 RCX: 00007f08ed78ebe9 [ 230.012817][ T4808] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002c9a4080 [ 230.020806][ T4808] RBP: 00007f08ee589090 R08: ffffffffff600000 R09: ffffffffff600000 [ 230.028798][ T4808] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 230.036788][ T4808] R13: 00007f08ed9b6038 R14: 00007f08ed9b5fa0 R15: 00007fff99728a68 [ 230.044785][ T4808] ? 0xffffffffff600000 [ 230.048956][ T4808] ? 0xffffffffff600000 [ 230.053128][ T4808] [ 232.943420][ T28] audit: type=1400 audit(1754979656.756:132): avc: denied { create } for pid=4874 comm="syz.0.1476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 236.141955][ T4942] device pim6reg1 entered promiscuous mode [ 238.260523][ T4981] device wg2 entered promiscuous mode [ 238.960280][ T5015] device pim6reg1 entered promiscuous mode [ 240.633585][ T5057] device pim6reg1 entered promiscuous mode [ 243.498540][ T5106] device pim6reg1 entered promiscuous mode [ 244.792465][ T5136] device wg2 left promiscuous mode [ 244.842480][ T5136] FAULT_INJECTION: forcing a failure. [ 244.842480][ T5136] name failslab, interval 1, probability 0, space 0, times 0 [ 244.863047][ T5136] CPU: 0 PID: 5136 Comm: syz.2.1553 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 244.872911][ T5136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 244.883089][ T5136] Call Trace: [ 244.886387][ T5136] [ 244.889337][ T5136] __dump_stack+0x21/0x24 [ 244.893714][ T5136] dump_stack_lvl+0xee/0x150 [ 244.898339][ T5136] ? __cfi_dump_stack_lvl+0x8/0x8 [ 244.903398][ T5136] dump_stack+0x15/0x24 [ 244.907577][ T5136] should_fail_ex+0x3d4/0x520 [ 244.912261][ T5136] __should_failslab+0xac/0xf0 [ 244.917020][ T5136] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 244.922735][ T5136] should_failslab+0x9/0x20 [ 244.927246][ T5136] __kmem_cache_alloc_node+0x3d/0x2c0 [ 244.932618][ T5136] ? __kasan_slab_alloc+0x72/0x80 [ 244.937642][ T5136] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 244.943356][ T5136] kmalloc_trace+0x29/0xb0 [ 244.947770][ T5136] selinux_sk_alloc_security+0x7e/0x1a0 [ 244.953318][ T5136] security_sk_alloc+0x83/0xb0 [ 244.958109][ T5136] sk_prot_alloc+0x108/0x320 [ 244.962721][ T5136] sk_alloc+0x3b/0x460 [ 244.966803][ T5136] ? __cfi__raw_spin_lock+0x10/0x10 [ 244.972002][ T5136] inet_create+0x5dd/0xf70 [ 244.976412][ T5136] __sock_create+0x39e/0x7c0 [ 244.981003][ T5136] sock_create_kern+0x3b/0x50 [ 244.985678][ T5136] udp_sock_create4+0xbb/0x4b0 [ 244.990438][ T5136] ? __cfi_udp_sock_create4+0x10/0x10 [ 244.995802][ T5136] ? __schedule+0xb8f/0x14e0 [ 245.000400][ T5136] wg_socket_init+0x2ce/0x7f0 [ 245.005084][ T5136] ? __cfi_wg_socket_init+0x10/0x10 [ 245.010288][ T5136] ? __cfi_wg_receive+0x10/0x10 [ 245.015139][ T5136] ? __cfi_preempt_schedule_irq+0x10/0x10 [ 245.020853][ T5136] ? __kasan_check_write+0x14/0x20 [ 245.025988][ T5136] ? vlan_device_event+0x49e/0x1ba0 [ 245.031186][ T5136] ? __cfi_mutex_lock+0x10/0x10 [ 245.036034][ T5136] ? udp_tunnel_nic_netdevice_event+0x1b4/0x1390 [ 245.042358][ T5136] ? ndisc_netdev_event+0x8e/0x620 [ 245.047469][ T5136] wg_open+0x18a/0x300 [ 245.051546][ T5136] __dev_open+0x363/0x4f0 [ 245.055947][ T5136] ? dev_open+0x230/0x230 [ 245.060281][ T5136] ? _raw_spin_unlock_bh+0x50/0x60 [ 245.065398][ T5136] ? dev_set_rx_mode+0x223/0x2c0 [ 245.070331][ T5136] ? __kasan_check_read+0x11/0x20 [ 245.075360][ T5136] __dev_change_flags+0x21b/0x6b0 [ 245.080380][ T5136] ? __cfi___dev_change_flags+0x10/0x10 [ 245.085922][ T5136] dev_change_flags+0x88/0x1a0 [ 245.090683][ T5136] dev_ifsioc+0x159/0xed0 [ 245.095024][ T5136] ? dev_ioctl+0xd10/0xd10 [ 245.099459][ T5136] ? __mutex_lock_slowpath+0xe/0x10 [ 245.104670][ T5136] ? mutex_lock+0xf8/0x1a0 [ 245.109081][ T5136] ? __cfi_mutex_lock+0x10/0x10 [ 245.113953][ T5136] ? dev_get_by_name_rcu+0xe5/0x130 [ 245.119165][ T5136] dev_ioctl+0x556/0xd10 [ 245.123406][ T5136] sock_do_ioctl+0x23f/0x310 [ 245.127996][ T5136] ? sock_show_fdinfo+0xb0/0xb0 [ 245.132848][ T5136] ? selinux_file_ioctl+0x377/0x480 [ 245.138045][ T5136] sock_ioctl+0x4d8/0x6e0 [ 245.142370][ T5136] ? __cfi_sock_ioctl+0x10/0x10 [ 245.147216][ T5136] ? __fget_files+0x2d5/0x330 [ 245.151900][ T5136] ? security_file_ioctl+0x95/0xc0 [ 245.157013][ T5136] ? __cfi_sock_ioctl+0x10/0x10 [ 245.161859][ T5136] __se_sys_ioctl+0x12f/0x1b0 [ 245.166534][ T5136] __x64_sys_ioctl+0x7b/0x90 [ 245.171118][ T5136] x64_sys_call+0x58b/0x9a0 [ 245.175634][ T5136] do_syscall_64+0x4c/0xa0 [ 245.180054][ T5136] ? clear_bhb_loop+0x30/0x80 [ 245.184779][ T5136] ? clear_bhb_loop+0x30/0x80 [ 245.189473][ T5136] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 245.195363][ T5136] RIP: 0033:0x7f47ce78ebe9 [ 245.199794][ T5136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.219404][ T5136] RSP: 002b:00007f47cf5d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 245.227823][ T5136] RAX: ffffffffffffffda RBX: 00007f47ce9b5fa0 RCX: 00007f47ce78ebe9 [ 245.235800][ T5136] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000a [ 245.243778][ T5136] RBP: 00007f47cf5d0090 R08: 0000000000000000 R09: 0000000000000000 [ 245.251748][ T5136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.259713][ T5136] R13: 00007f47ce9b6038 R14: 00007f47ce9b5fa0 R15: 00007fff5bd31318 [ 245.267707][ T5136] [ 245.271026][ T5136] wireguard: wg2: Could not create IPv4 socket [ 245.282199][ T5136] device wg2 entered promiscuous mode [ 245.376214][ T5150] device pim6reg1 entered promiscuous mode [ 245.964504][ T5162] device wg2 entered promiscuous mode [ 247.003075][ T5185] FAULT_INJECTION: forcing a failure. [ 247.003075][ T5185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 247.016708][ T5185] CPU: 0 PID: 5185 Comm: syz.3.1568 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 247.026552][ T5185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 247.036627][ T5185] Call Trace: [ 247.039920][ T5185] [ 247.042866][ T5185] __dump_stack+0x21/0x24 [ 247.047231][ T5185] dump_stack_lvl+0xee/0x150 [ 247.051852][ T5185] ? __cfi_dump_stack_lvl+0x8/0x8 [ 247.056910][ T5185] dump_stack+0x15/0x24 [ 247.061102][ T5185] should_fail_ex+0x3d4/0x520 [ 247.065808][ T5185] should_fail+0xb/0x10 [ 247.069993][ T5185] should_fail_usercopy+0x1a/0x20 [ 247.075042][ T5185] _copy_from_user+0x1e/0xc0 [ 247.079657][ T5185] __sys_bpf+0x277/0x780 [ 247.083923][ T5185] ? bpf_link_show_fdinfo+0x320/0x320 [ 247.089317][ T5185] ? preempt_schedule_irq+0xbb/0x110 [ 247.094629][ T5185] ? irqentry_exit+0x37/0x40 [ 247.099248][ T5185] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 247.105092][ T5185] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 247.111276][ T5185] __x64_sys_bpf+0x7c/0x90 [ 247.115723][ T5185] x64_sys_call+0x488/0x9a0 [ 247.120253][ T5185] do_syscall_64+0x4c/0xa0 [ 247.124702][ T5185] ? clear_bhb_loop+0x30/0x80 [ 247.129412][ T5185] ? clear_bhb_loop+0x30/0x80 [ 247.134126][ T5185] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 247.140040][ T5185] RIP: 0033:0x7fc98758ebe9 [ 247.144472][ T5185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.164106][ T5185] RSP: 002b:00007fc9883f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 247.172550][ T5185] RAX: ffffffffffffffda RBX: 00007fc9877b5fa0 RCX: 00007fc98758ebe9 [ 247.180552][ T5185] RDX: 0000000000000050 RSI: 0000200000000040 RDI: 0000000000000000 [ 247.188543][ T5185] RBP: 00007fc9883f4090 R08: 0000000000000000 R09: 0000000000000000 [ 247.196535][ T5185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.204524][ T5185] R13: 00007fc9877b6038 R14: 00007fc9877b5fa0 R15: 00007ffe629734d8 [ 247.212524][ T5185] [ 247.367240][ T5195] device pim6reg1 entered promiscuous mode [ 247.697524][ T5202] device sit0 left promiscuous mode [ 247.840332][ T5203] device sit0 entered promiscuous mode [ 250.644319][ T5233] device veth0_vlan left promiscuous mode [ 250.688459][ T5233] device veth0_vlan entered promiscuous mode [ 250.731051][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.740315][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.748229][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.094180][ T5236] device pim6reg1 entered promiscuous mode [ 255.212757][ T5310] device pim6reg1 entered promiscuous mode [ 256.262720][ T5333] device veth0_vlan left promiscuous mode [ 256.328453][ T5333] device veth0_vlan entered promiscuous mode [ 256.428318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.447079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.487255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.575994][ T28] audit: type=1400 audit(1754979680.386:133): avc: denied { tracepoint } for pid=5345 comm="syz.0.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 256.800191][ T5349] FAULT_INJECTION: forcing a failure. [ 256.800191][ T5349] name failslab, interval 1, probability 0, space 0, times 0 [ 256.843633][ T5349] CPU: 1 PID: 5349 Comm: syz.1.1622 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 256.853499][ T5349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 256.863582][ T5349] Call Trace: [ 256.866886][ T5349] [ 256.869844][ T5349] __dump_stack+0x21/0x24 [ 256.874185][ T5349] dump_stack_lvl+0xee/0x150 [ 256.878794][ T5349] ? __cfi_dump_stack_lvl+0x8/0x8 [ 256.883834][ T5349] dump_stack+0x15/0x24 [ 256.887996][ T5349] should_fail_ex+0x3d4/0x520 [ 256.892679][ T5349] __should_failslab+0xac/0xf0 [ 256.897442][ T5349] ? tipc_group_create+0xa1/0x650 [ 256.902465][ T5349] should_failslab+0x9/0x20 [ 256.906993][ T5349] __kmem_cache_alloc_node+0x3d/0x2c0 [ 256.912370][ T5349] ? tipc_group_create+0xa1/0x650 [ 256.917392][ T5349] kmalloc_trace+0x29/0xb0 [ 256.921809][ T5349] tipc_group_create+0xa1/0x650 [ 256.926652][ T5349] ? __local_bh_enable_ip+0x58/0x80 [ 256.931844][ T5349] tipc_sk_join+0x234/0x6a0 [ 256.936339][ T5349] ? __cfi_lock_sock_nested+0x10/0x10 [ 256.941721][ T5349] ? __tipc_sendstream+0x11a0/0x11a0 [ 256.947002][ T5349] ? __kasan_check_write+0x14/0x20 [ 256.952117][ T5349] tipc_setsockopt+0x684/0x900 [ 256.956895][ T5349] ? __cfi_tipc_setsockopt+0x10/0x10 [ 256.962191][ T5349] ? security_socket_setsockopt+0x93/0xb0 [ 256.967915][ T5349] ? __cfi_tipc_setsockopt+0x10/0x10 [ 256.973209][ T5349] __sys_setsockopt+0x306/0x4e0 [ 256.978057][ T5349] ? __cfi___sys_setsockopt+0x10/0x10 [ 256.983424][ T5349] ? ksys_write+0x1eb/0x240 [ 256.987930][ T5349] ? __cfi_ksys_write+0x10/0x10 [ 256.992787][ T5349] __x64_sys_setsockopt+0xbf/0xd0 [ 256.997812][ T5349] x64_sys_call+0x124/0x9a0 [ 257.002321][ T5349] do_syscall_64+0x4c/0xa0 [ 257.006768][ T5349] ? clear_bhb_loop+0x30/0x80 [ 257.011470][ T5349] ? clear_bhb_loop+0x30/0x80 [ 257.016146][ T5349] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 257.022062][ T5349] RIP: 0033:0x7f9422f8ebe9 [ 257.026482][ T5349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.046087][ T5349] RSP: 002b:00007f9423ed0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 257.054500][ T5349] RAX: ffffffffffffffda RBX: 00007f94231b5fa0 RCX: 00007f9422f8ebe9 [ 257.062471][ T5349] RDX: 0000000000000087 RSI: 000000000000010f RDI: 000000000000000a [ 257.070436][ T5349] RBP: 00007f9423ed0090 R08: 00000000000004bd R09: 0000000000000000 [ 257.078398][ T5349] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 257.086454][ T5349] R13: 00007f94231b6038 R14: 00007f94231b5fa0 R15: 00007fffef6c98c8 [ 257.094432][ T5349] [ 257.109895][ T5352] device pim6reg1 entered promiscuous mode [ 258.350454][ T5393] device pim6reg1 entered promiscuous mode [ 260.983474][ T5460] device pim6reg1 entered promiscuous mode [ 263.106919][ T5493] device veth1_macvtap entered promiscuous mode [ 263.166134][ T5493] device macsec0 entered promiscuous mode [ 263.246734][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 263.312847][ T5499] device pim6reg1 entered promiscuous mode [ 264.602514][ T5517] device veth0_vlan left promiscuous mode [ 264.643655][ T5517] device veth0_vlan entered promiscuous mode [ 264.676629][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.685196][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.695031][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.100978][ T5543] device pim6reg1 entered promiscuous mode [ 267.401232][ T5588] device veth1_macvtap entered promiscuous mode [ 267.414238][ T5588] device macsec0 entered promiscuous mode [ 267.435666][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 268.248457][ T5610] device veth1_macvtap left promiscuous mode [ 268.598934][ T5617] device pim6reg1 entered promiscuous mode [ 270.534575][ T5642] device macsec0 left promiscuous mode [ 270.660687][ T5647] FAULT_INJECTION: forcing a failure. [ 270.660687][ T5647] name failslab, interval 1, probability 0, space 0, times 0 [ 270.692346][ T5647] CPU: 1 PID: 5647 Comm: syz.3.1712 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 270.702218][ T5647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 270.712297][ T5647] Call Trace: [ 270.715588][ T5647] [ 270.718527][ T5647] __dump_stack+0x21/0x24 [ 270.722895][ T5647] dump_stack_lvl+0xee/0x150 [ 270.727521][ T5647] ? __cfi_dump_stack_lvl+0x8/0x8 [ 270.732576][ T5647] dump_stack+0x15/0x24 [ 270.736759][ T5647] should_fail_ex+0x3d4/0x520 [ 270.741455][ T5647] __should_failslab+0xac/0xf0 [ 270.746237][ T5647] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 270.752254][ T5647] should_failslab+0x9/0x20 [ 270.756794][ T5647] __kmem_cache_alloc_node+0x3d/0x2c0 [ 270.762195][ T5647] ? __cfi_mutex_lock+0x10/0x10 [ 270.767072][ T5647] ? delete_node+0x2f4/0xa60 [ 270.771688][ T5647] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 270.777694][ T5647] __kmalloc+0xa1/0x1e0 [ 270.781885][ T5647] ? __cfi___bpf_trace_mmap_lock_acquire_returned+0x10/0x10 [ 270.789204][ T5647] tracepoint_probe_unregister+0x1e6/0x8b0 [ 270.795040][ T5647] bpf_probe_unregister+0x61/0x70 [ 270.800097][ T5647] bpf_raw_tp_link_release+0x63/0x90 [ 270.805411][ T5647] bpf_link_free+0x13a/0x390 [ 270.810035][ T5647] ? bpf_link_put_deferred+0x20/0x20 [ 270.815352][ T5647] bpf_link_release+0x15f/0x170 [ 270.820218][ T5647] ? __cfi_bpf_link_release+0x10/0x10 [ 270.825615][ T5647] __fput+0x1fc/0x8f0 [ 270.829674][ T5647] ____fput+0x15/0x20 [ 270.833682][ T5647] task_work_run+0x1db/0x240 [ 270.838300][ T5647] ? __cfi_task_work_run+0x10/0x10 [ 270.843432][ T5647] ? filp_close+0x111/0x160 [ 270.847967][ T5647] exit_to_user_mode_loop+0x9b/0xb0 [ 270.853190][ T5647] exit_to_user_mode_prepare+0x5a/0xa0 [ 270.858673][ T5647] syscall_exit_to_user_mode+0x1a/0x30 [ 270.864162][ T5647] do_syscall_64+0x58/0xa0 [ 270.868610][ T5647] ? clear_bhb_loop+0x30/0x80 [ 270.873313][ T5647] ? clear_bhb_loop+0x30/0x80 [ 270.878027][ T5647] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 270.883950][ T5647] RIP: 0033:0x7fc98758ebe9 [ 270.888389][ T5647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 270.908022][ T5647] RSP: 002b:00007fc9883f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 270.916464][ T5647] RAX: 0000000000000000 RBX: 00007fc9877b5fa0 RCX: 00007fc98758ebe9 [ 270.924465][ T5647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 270.932465][ T5647] RBP: 00007fc9883f4090 R08: 0000000000000000 R09: 0000000000000000 [ 270.940467][ T5647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 270.948459][ T5647] R13: 00007fc9877b6038 R14: 00007fc9877b5fa0 R15: 00007ffe629734d8 [ 270.956463][ T5647] [ 270.999084][ T5651] CFI failure at __traceiter_mmap_lock_acquire_returned+0x9a/0xf0 (target: tp_stub_func+0x0/0x10; expected type: 0xd59bbc2f) [ 271.012176][ T5651] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 271.018266][ T5651] CPU: 0 PID: 5651 Comm: syz-executor Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 271.028263][ T5651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 271.038334][ T5651] RIP: 0010:__traceiter_mmap_lock_acquire_returned+0x9a/0xf0 [ 271.045745][ T5651] Code: 42 80 3c 30 00 74 05 e8 44 29 0c 00 48 8b 7b 08 48 8b 75 c8 48 8b 55 c0 8b 4d d4 45 89 e0 41 ba d1 43 64 2a 45 03 57 fc 74 02 <0f> 0b 41 ff d7 49 83 c5 18 4c 89 e8 48 c1 e8 03 42 80 3c 30 00 74 [ 271.048597][ T5619] CFI failure at __traceiter_mmap_lock_acquire_returned+0x9a/0xf0 (target: tp_stub_func+0x0/0x10; expected type: 0xd59bbc2f) [ 271.065371][ T5651] RSP: 0000:ffffc9000ec97b30 EFLAGS: 00010286 [ 271.065394][ T5651] RAX: 1ffff11022207ce3 RBX: ffff88811103e710 RCX: 0000000000000000 [ 271.065409][ T5651] RDX: ffffc9000ec97ba0 RSI: ffff888121f52300 RDI: ffffc9000efa1000 [ 271.065423][ T5651] RBP: ffffc9000ec97b70 R08: 0000000000000001 R09: fffffbfff0ee4a7e [ 271.065437][ T5651] R10: 00000000cfa4aadd R11: 1ffffffff0ee4a7d R12: 0000000000000001 [ 271.065451][ T5651] R13: ffff88811103e710 R14: dffffc0000000000 R15: ffffffff81711ed0 [ 271.065468][ T5651] FS: 000055556964d500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 271.065485][ T5651] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.065500][ T5651] CR2: 000055556964d7d0 CR3: 000000013595e000 CR4: 00000000003506b0 [ 271.065518][ T5651] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 271.065531][ T5651] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 271.065544][ T5651] Call Trace: [ 271.065550][ T5651] [ 271.065560][ T5651] __mmap_lock_do_trace_acquire_returned+0x17d/0x1d0 [ 271.065589][ T5651] ? __cfi___mmap_lock_do_trace_acquire_returned+0x10/0x10 [ 271.184008][ T5651] lock_mm_and_find_vma+0x243/0x320 [ 271.189212][ T5651] ? do_user_addr_fault+0x2ee/0x1050 [ 271.194495][ T5651] do_user_addr_fault+0x358/0x1050 [ 271.199619][ T5651] exc_page_fault+0x51/0xb0 [ 271.204127][ T5651] asm_exc_page_fault+0x27/0x30 [ 271.208978][ T5651] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 271.214690][ T5651] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 271.234286][ T5651] RSP: 0000:ffffc9000ec97f20 EFLAGS: 00050293 [ 271.240342][ T5651] RAX: 000000000000040f RBX: 00007fffffffeffd RCX: 000055556964d7d0 [ 271.248303][ T5651] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff88811b63bcc0 [ 271.256348][ T5651] RBP: ffffc9000ec97f48 R08: dffffc0000000000 R09: fffffbfff0ee4b77 [ 271.264317][ T5651] R10: fffffbfff0ee4b77 R11: 1ffffffff0ee4b76 R12: 1ffff110236c7871 [ 271.272300][ T5651] R13: 0000000000000000 R14: ffff88811b63bcc0 R15: dffffc0000000000 [ 271.280274][ T5651] ? schedule_tail+0x83/0xa0 [ 271.284884][ T5651] ret_from_fork+0x8/0x30 [ 271.289212][ T5651] RIP: 0033:0x7f9422f85453 [ 271.293623][ T5651] Code: Unable to access opcode bytes at 0x7f9422f85429. [ 271.300627][ T5651] RSP: 002b:00007fffef6c9b48 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 271.309148][ T5651] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f9422f85453 [ 271.317128][ T5651] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 271.325100][ T5651] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 271.333076][ T5651] R10: 000055556964d7d0 R11: 0000000000000246 R12: 0000000000000001 [ 271.341049][ T5651] R13: 00000000000927c0 R14: 00000000000420cd R15: 00007fffef6c9ce0 [ 271.349022][ T5651] [ 271.352033][ T5651] Modules linked in: [ 271.355977][ T5619] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 271.356144][ T5651] ---[ end trace 0000000000000000 ]--- [ 271.362071][ T5619] CPU: 1 PID: 5619 Comm: syz.4.1701 Tainted: G D 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 271.367796][ T5651] RIP: 0010:__traceiter_mmap_lock_acquire_returned+0x9a/0xf0 [ 271.378788][ T5619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 271.378800][ T5619] RIP: 0010:__traceiter_mmap_lock_acquire_returned+0x9a/0xf0 [ 271.386190][ T5651] Code: 42 80 3c 30 00 74 05 e8 44 29 0c 00 48 8b 7b 08 48 8b 75 c8 48 8b 55 c0 8b 4d d4 45 89 e0 41 ba d1 43 64 2a 45 03 57 fc 74 02 <0f> 0b 41 ff d7 49 83 c5 18 4c 89 e8 48 c1 e8 03 42 80 3c 30 00 74 [ 271.396224][ T5619] Code: 42 80 3c 30 00 74 05 e8 44 29 0c 00 48 8b 7b 08 48 8b 75 c8 48 8b 55 c0 8b 4d d4 45 89 e0 41 ba d1 43 64 2a 45 03 57 fc 74 02 <0f> 0b 41 ff d7 49 83 c5 18 4c 89 e8 48 c1 e8 03 42 80 3c 30 00 74 [ 271.396244][ T5619] RSP: 0018:ffffc9000ebaf6d0 EFLAGS: 00010286 [ 271.403778][ T5651] RSP: 0000:ffffc9000ec97b30 EFLAGS: 00010286 [ 271.423187][ T5619] [ 271.423193][ T5619] RAX: 1ffff11022207ce3 RBX: ffff88811103e710 RCX: 0000000000000001 [ 271.423211][ T5619] RDX: ffffc9000ebaf740 RSI: ffff88811eb11900 RDI: ffffc9000efa1000 [ 271.442839][ T5651] [ 271.448903][ T5619] RBP: ffffc9000ebaf710 R08: 0000000000000001 R09: fffffbfff0ee4a7e [ 271.454986][ T5651] RAX: 1ffff11022207ce3 RBX: ffff88811103e710 RCX: 0000000000000000 [ 271.457294][ T5619] R10: 00000000cfa4aadd R11: 1ffffffff0ee4a7d R12: 0000000000000001 [ 271.465269][ T5651] RDX: ffffc9000ec97ba0 RSI: ffff888121f52300 RDI: ffffc9000efa1000 [ 271.473216][ T5619] R13: ffff88811103e710 R14: dffffc0000000000 R15: ffffffff81711ed0 [ 271.473235][ T5619] FS: 00007fc8dc3cc6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 271.473251][ T5619] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.473264][ T5619] CR2: 00007fffef6c9b48 CR3: 000000012136d000 CR4: 00000000003506a0 [ 271.475583][ T5651] RBP: ffffc9000ec97b70 R08: 0000000000000001 R09: fffffbfff0ee4a7e [ 271.483553][ T5619] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 271.483569][ T5619] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 271.491538][ T5651] R10: 00000000cfa4aadd R11: 1ffffffff0ee4a7d R12: 0000000000000001 [ 271.499540][ T5619] Call Trace: [ 271.499548][ T5619] [ 271.499560][ T5619] __mmap_lock_do_trace_acquire_returned+0x17d/0x1d0 [ 271.507538][ T5651] R13: ffff88811103e710 R14: dffffc0000000000 R15: ffffffff81711ed0 [ 271.515491][ T5619] ? __cfi___mmap_lock_do_trace_acquire_returned+0x10/0x10 [ 271.524462][ T5651] FS: 000055556964d500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 271.530994][ T5619] ? unmap_vmas+0x3c8/0x430 [ 271.538972][ T5651] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.546946][ T5619] ? __kasan_check_write+0x15/0x20 [ 271.554936][ T5651] CR2: 00007f9422f85429 CR3: 000000013595e000 CR4: 00000000003506b0 [ 271.562879][ T5619] exit_mmap+0x9c6/0xb60 [ 271.570867][ T5651] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 271.574140][ T5619] ? __cfi_exit_mmap+0x10/0x10 [ 271.574172][ T5619] ? __cfi_exit_aio+0x10/0x10 [ 271.577102][ T5651] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 271.583766][ T5619] ? uprobe_clear_state+0x2c1/0x320 [ 271.591745][ T5651] Kernel panic - not syncing: Fatal exception [ 271.598922][ T5619] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 271.598948][ T5619] __mmput+0x93/0x320 [ 271.598970][ T5619] ? mmput+0x43/0x150 [ 271.598991][ T5619] mmput+0x4b/0x150 [ 271.599012][ T5619] copy_process+0x22aa/0x3470 [ 271.599035][ T5619] ? wake_up_q+0x105/0x1b0 [ 271.599057][ T5619] ? __cfi_futex_wake+0x10/0x10 [ 271.599075][ T5619] ? idle_dummy+0x10/0x10 [ 271.599101][ T5619] kernel_clone+0x23a/0x810 [ 271.599125][ T5619] ? do_futex+0x2b9/0x420 [ 271.599151][ T5619] ? __cfi_kernel_clone+0x10/0x10 [ 271.599178][ T5619] __x64_sys_clone+0x168/0x1b0 [ 271.599203][ T5619] ? __cfi___x64_sys_clone+0x10/0x10 [ 271.599231][ T5619] ? __kasan_check_write+0x14/0x20 [ 271.599256][ T5619] ? fpregs_restore_userregs+0x128/0x260 [ 271.599278][ T5619] ? switch_fpu_return+0xe/0x10 [ 271.599299][ T5619] x64_sys_call+0x990/0x9a0 [ 271.599320][ T5619] do_syscall_64+0x4c/0xa0 [ 271.599346][ T5619] ? clear_bhb_loop+0x30/0x80 [ 271.599376][ T5619] ? clear_bhb_loop+0x30/0x80 [ 271.599394][ T5619] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 271.599412][ T5619] RIP: 0033:0x7fc8db58ebe9 [ 271.599426][ T5619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.599441][ T5619] RSP: 002b:00007fc8dc3cbfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 271.599459][ T5619] RAX: ffffffffffffffda RBX: 00007fc8db7b5fa0 RCX: 00007fc8db58ebe9 [ 271.599472][ T5619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 271.599482][ T5619] RBP: 00007fc8db611e19 R08: 0000000000000000 R09: 0000000000000000 [ 271.599492][ T5619] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 271.599502][ T5619] R13: 00007fc8db7b6038 R14: 00007fc8db7b5fa0 R15: 00007fff3a7b5f68 [ 271.599519][ T5619] [ 271.599524][ T5619] Modules linked in: [ 271.608807][ T5651] Kernel Offset: disabled [ 271.856612][ T5651] Rebooting in 86400 seconds..