last executing test programs: 22.644353291s ago: executing program 1 (id=12697): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x12, 0x6, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0xb}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000440)="151fd85228ccd4805cab22b9342f709d4556746dabf460f5e596e9d1225785d1c760decff5666464b536ebdba24673be667ccab9caab0c1283434972fad3a157735e7ef508e796ff6c9bdd1d292de4d9ca443609f7a1edf28bb2949cb81ebd4e093d406016ec0ba6e481ff18cce50e70536285054da88ec80318f43aaaf7b80928a9b945184cd71ef126d88487244cda222eecd7bdba42992f348c01dcaf84f325257043cb614eb54c14742a578263b07d595c5fd401525cf261646e01a100", 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1e0000000f000000050000000900000001010000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=r4, @ANYRES32=r1, @ANYBLOB="0101000000000000000000000e00"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000400)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r5}, &(0x7f0000000880), &(0x7f00000008c0)=r3}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x37}, 0x28) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x9, 0x82, 0x42, 0x40, 0xc0, 0xffffffffffffffff, 0x5}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r7}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r7}, 0x38) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfc, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x1000010, 0x0, 0x2, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r9 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) syz_open_procfs$namespace(r9, &(0x7f0000000000)='ns/mnt\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 19.5577095s ago: executing program 2 (id=12864): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x0, 0x34}, 0x28) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000181100"/20, @ANYRES32=r0, @ANYBLOB], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001000000"], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000000000000000181100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) close(0x3) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r4}, 0x38) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x300}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000000}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) (fail_nth: 2) 19.321261332s ago: executing program 2 (id=12865): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0500000006010000400000004000000041000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008c3d588f6c257d06812d09976f024ab537111ccdf340acdb19e924532189b0b51db08b444ce02dd5ce577d1966370bfeba3e6283cd6a2ce4a2b7a09e459368bc0b2a8b316c2e297fe43dae6afd4f36eb79f9042d4e82f810ed9b345cd3b31c5a136b5a57145fee025d1eb6f8e7"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x1003, r0}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000208500000072000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000e80)={r5, 0x20, &(0x7f0000000e40)={&(0x7f0000000c40)=""/225, 0xe1, 0x0, &(0x7f0000000d40)=""/233, 0xe9}}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)=""/84, 0x54}, 0x60) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[], 0x0, 0x26}, 0x28) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x7f, 0x3, 0xe3, 0x1, 0x0, 0x7, 0x11000, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x10008, 0x40, 0x2, 0x5, 0x80000000, 0x0, 0x2100, 0x0, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='mm_page_alloc\x00', r7}, 0x18) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) 18.398188127s ago: executing program 2 (id=12869): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x5}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000400)={&(0x7f0000000180)="877111600cb54bdc0617cd568df59bf07163fda0616967356f9f4b911bd483822e9b646b5e1617945bfa8632d2996f956ac37539ebbc86fe2fcbf625d648a024aa4a6b5d5067193e21f5b9704e1de40ecc8d95b37f42da2997f21f585976ce7406e7d2b5", &(0x7f00000004c0)=""/247, &(0x7f0000000380)="2cfa5ea4c478877e4a08414483a602468c0b0756ad92aa96d48b73c595bf51c422dc34f76d213f6505501d0c9ec8a10f832ae4da4abd5fb908ef7f1a0433abc2b964b13e88edcf2fcce217b7aae979d793bf0ada50733ac8d5213eda0c5d3f0a", &(0x7f0000000080)="c7b10d3f0dca3405e27cfcbd14f136f82179", 0x7f, r0, 0x4}, 0x38) sendmsg$tipc(r1, &(0x7f00000009c0)={&(0x7f0000000200)=@name={0x1e, 0x2, 0x2, {{0x40, 0x4}, 0x3}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000340)}, {&(0x7f0000000240)="3e6c77ebb8223ae74f71860b921acb6d61bc888808f06b36660bfedf950a15c8dfc19d0587e9ae1ee87f23646134d37d3ba6b89549b40a0befb69a75a516f3793de4f9db4dd481799bf345746693783bf37219283079cba40bcd007534d6ddbf", 0x60}, {&(0x7f0000000400)}, {&(0x7f0000000440)="69f4d73bd728e975b94af96d9bd148aabb2aab886252c69b238773cf42e220da6808725c4fbc9ce4fcedaa8b0b64b4817069f593f8fbc8ed3bf52bc397334f67c57d924342583b3184b15c9a2a3890e1aae08e7944c8286b6fe7abc57aeba9d5d901f6b1357ab1075aa31a1d16d497a45ddbbd", 0x73}, {&(0x7f0000000680)="6a6d316edcb9ec8d45eb2b3af8431966d026b96e9955dd7672321fbd62efd7154d07ddfb15c85e7e0c4630e409c45325ec9a214aa802adf63e3931affe6f877ef5f247f87862280a4b580b782b4646778ace2d7b4600f27dda1dae8cdd081041860d8d56c2d5adad17811f4429bdf5e153d254e9fc600edc14ff3d1e109cdbb795c9f9b393fde02a892f032e19cbeb1d8a887b6c596b651533e9906e", 0x9c}, {&(0x7f0000000840)="352ef4c9be875fb271969452689867f33d560dc978c7695cbbdda05d3975916da10a426471b173858d3047572bf266e8f4ba5d7116152687d08125529a870d898b4559878b11bd3c36823bfcf7785850102578370094f11e4031b6f7eb6222a0e167ba6d4d009fe6db25b43774e0", 0x6e}, {&(0x7f0000000900)="25c050c0d1d3e1536c7d9496080d758a521b5ffcb2da1d2d9da8fa92e2a973b7616df621051446476d570adeaad935f3f8d84434d6154e323d3aa23b7a17ee3736504ef2763fed8f2cd58370cdfda82deaf3124457c50697c12bb9f28c2d6d578f5180b3eeeb3156bfbcb5ad244fb44a799bacbeccd68997d9495531baf2b6d9e0d0f1cbbe5b6fe62591de9981241716eaa30618c01d34f2", 0x98}], 0x7, &(0x7f0000000740)="d21969e37f1ff971662cf7ef0f10c1e66e5c070917ee443a8fef6ac9e84112333218d2625a0c156411001a40b0ce5feb5491ac8791e36c0116e123", 0x3b}, 0x41) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r3 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000400000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f}, 0x94) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) 17.768183011s ago: executing program 3 (id=12874): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0500000006010000400000004000000041000000", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008c3d588f6c257d06812d09976f024ab537111ccdf340acdb19e924532189b0b51db08b444ce02dd5ce577d1966370bfeba3e6283cd6a2ce4a2b7a09e459368bc0b2a8b316c2e297fe43dae6afd4f36eb79f9042d4e82f810ed9b345cd3b31c5a136b5a57145fee025d1eb6f8e7"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r0}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{0x0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)}], 0x1}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000208500000072000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000e80)={r5, 0x20, &(0x7f0000000e40)={&(0x7f0000000c40)=""/225, 0xe1, 0x0, &(0x7f0000000d40)=""/233, 0xe9}}, 0x10) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000540)=""/75, 0x4b}, {&(0x7f0000000280)=""/56, 0x38}, {0x0}, {&(0x7f0000000740)=""/169, 0xa9}, {&(0x7f0000000800)=""/189, 0xbd}, {&(0x7f0000000380)=""/24, 0x18}, {&(0x7f0000000480)=""/57, 0x39}, {0x0}, {&(0x7f0000000640)=""/44, 0x2c}, {&(0x7f0000000940)=""/178, 0xb2}], 0xa, &(0x7f0000000ac0)=""/84, 0x54}, 0x60) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004000000000000d70c6c1714a675a17d60527e646c04a20921135933a790ae69b6d98cd00e3dfcf69faaeb7e0a3604048e"], 0x0, 0x26}, 0x18) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x7f, 0x3, 0xe3, 0x1, 0x0, 0x7, 0x11000, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x10008, 0x40, 0x2, 0x5, 0x80000000, 0x0, 0x2100, 0x0, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) 17.722115091s ago: executing program 0 (id=12875): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r0}, 0x4) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000001c0)) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYBLOB="000c00000000c50d93a09c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0x0) 17.480770233s ago: executing program 3 (id=12876): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x5}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000009c0)={&(0x7f0000000200)=@name={0x1e, 0x2, 0x2, {{0x40, 0x4}, 0x3}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000340)}, {&(0x7f0000000240)="3e6c77ebb8223ae74f71860b921acb6d61bc888808f06b36660bfedf950a15c8dfc19d0587e9ae1ee87f23646134d37d3ba6b89549b40a0befb69a75a516f3793de4f9db4dd481799bf345746693783bf37219283079cba40bcd007534d6ddbf", 0x60}, {&(0x7f0000000400), 0x300}, {&(0x7f0000000440)="69f4d73bd728e975b94af96d9bd148aabb2aab886252c69b238773cf42e220da6808725c4fbc9ce4fcedaa8b0b64b4817069f593f8fbc8ed3bf52bc397334f67c57d924342583b3184b15c9a2a3890e1aae08e7944c8286b6fe7abc57aeba9d5d901f6b1357ab1075aa31a1d16d497a45ddbbd", 0x73}, {&(0x7f0000000680)="6a6d316edcb9ec8d45eb2b3af8431966d026b96e9955dd7672321fbd62efd7154d07ddfb15c85e7e0c4630e409c45325ec9a214aa802adf63e3931affe6f877ef5f247f87862280a4b580b782b4646778ace2d7b4600f27dda1dae8cdd081041860d8d56c2d5adad17811f4429bdf5e153d254e9fc600edc14ff3d1e109cdbb795c9f9b393fde02a892f032e19cbeb1d8a887b6c596b651533e9906e", 0x9c}, {&(0x7f0000000840)="352ef4c9be875fb271969452689867f33d560dc978c7695cbbdda05d3975916da10a426471b173858d3047572bf266e8f4ba5d7116152687d08125529a870d898b4559878b11bd3c36823bfcf7785850102578370094f11e4031b6f7eb6222a0e167ba6d4d009fe6db25b43774e0", 0x6e}, {&(0x7f0000000900)="25c050c0d1d3e1536c7d9496080d758a521b5ffcb2da1d2d9da8fa92e2a973b7616df621051446476d570adeaad935f3f8d84434d6154e323d3aa23b7a17ee3736504ef2763fed8f2cd58370cdfda82deaf3124457c50697c12bb9f28c2d6d578f5180b3eeeb3156bfbcb5ad244fb44a799bacbeccd68997d9495531baf2b6d9e0d0f1cbbe5b6fe62591de9981241716eaa30618c01d34f2", 0x98}], 0x7, &(0x7f0000000740)="d21969e37f1ff971662cf7ef0f10c1e66e5c070917ee443a8fef6ac9e84112333218d2625a0c156411001a40b0ce5feb5491ac8791e36c0116e123", 0x3b}, 0x41) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r3 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000400000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f}, 0x94) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) 17.435576033s ago: executing program 1 (id=12697): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x12, 0x6, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0xb}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000440)="151fd85228ccd4805cab22b9342f709d4556746dabf460f5e596e9d1225785d1c760decff5666464b536ebdba24673be667ccab9caab0c1283434972fad3a157735e7ef508e796ff6c9bdd1d292de4d9ca443609f7a1edf28bb2949cb81ebd4e093d406016ec0ba6e481ff18cce50e70536285054da88ec80318f43aaaf7b80928a9b945184cd71ef126d88487244cda222eecd7bdba42992f348c01dcaf84f325257043cb614eb54c14742a578263b07d595c5fd401525cf261646e01a100", 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1e0000000f000000050000000900000001010000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=r4, @ANYRES32=r1, @ANYBLOB="0101000000000000000000000e00"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000400)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r5}, &(0x7f0000000880), &(0x7f00000008c0)=r3}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x37}, 0x28) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x9, 0x82, 0x42, 0x40, 0xc0, 0xffffffffffffffff, 0x5}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r7}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r7}, 0x38) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfc, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x1000010, 0x0, 0x2, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r9 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) syz_open_procfs$namespace(r9, &(0x7f0000000000)='ns/mnt\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 16.165916801s ago: executing program 0 (id=12877): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x4, &(0x7f0000000100)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}], &(0x7f0000000140)='GPL\x00', 0x8000, 0xac, &(0x7f0000000180)=""/172, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x8, 0x2, 0x7}, 0x10, 0x0, 0x0, 0xa, &(0x7f00000002c0)=[0x1, 0xffffffffffffffff], &(0x7f0000000300)=[{0x2, 0x3, 0x10, 0xc}, {0x1, 0x2, 0x7, 0xa}, {0x1, 0x2, 0x9, 0x4}, {0x3, 0x4, 0x0, 0x6}, {0x3, 0x1, 0x10, 0xa}, {0x3, 0x2, 0xe, 0x1}, {0x5, 0x1, 0x5, 0x6}, {0x3, 0x1, 0x4}, {0x5, 0x3, 0xc, 0x9}, {0x0, 0x5, 0xe, 0x3}], 0x10, 0xd5000000}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000480)=r1}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x100000, 0x0) r3 = perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x1, 0x1, 0x1, 0x8, 0x0, 0x0, 0x80, 0xd, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcab2, 0x4, @perf_config_ext={0x9, 0x9}, 0x102000, 0x5, 0x2, 0x5, 0x8, 0x4, 0xed9, 0x0, 0x9abe, 0x0, 0x6}, 0x0, 0x4, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000005c0)='GPL\x00') r4 = perf_event_open$cgroup(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x7, 0x8, 0x2, 0x0, 0x0, 0x80000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x101}, 0x10069, 0x2, 0x2, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x10, r3, 0x6) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000006c0)={0x5, 0x80, 0x6, 0x8, 0x6, 0x4, 0x0, 0x2, 0x2008, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x18}, 0x10, 0x6, 0x2d, 0x8, 0x148a400000000, 0xd6e, 0x5, 0x0, 0x4, 0x0, 0xc37}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000740)='GPL\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r2, 0xffffffffffffffff}, &(0x7f0000000780), &(0x7f00000007c0)=r1}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b40)={r2, 0x58, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x33, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@map_val={0x18, 0xa, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x101}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x82df3fb}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff}, @jmp={0x5, 0x1, 0x9, 0x9, 0x4, 0xffffffffffffffe1}, @alu={0x4, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffe0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a40)='syzkaller\x00', 0x7e3, 0x23, &(0x7f0000000a80)=""/35, 0x40f00, 0x0, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0xc, 0x6}, 0x10, 0xe5ce, r1, 0x4, &(0x7f0000000c00)=[r2], &(0x7f0000000c40)=[{0x5, 0x5, 0x10, 0xc}, {0x4, 0x2, 0xd, 0xa}, {0x1, 0x3, 0xd, 0x2}, {0x3, 0x3, 0x6, 0x3}], 0x10, 0x3}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r5, 0x1f, 0x1, 0x3, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000d80)=[0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0]}, 0x40) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x7) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000e80)) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000ec0)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x7, '\x00', r7, 0xffffffffffffffff, 0x5, 0x4, 0x4}, 0x50) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000f40), 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000f80)=0x1ff) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r12 = getpid() r13 = perf_event_open$cgroup(&(0x7f0000001000)={0x0, 0x80, 0x5, 0x77, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x10000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, @perf_config_ext={0x7fffffffffffffff, 0xffff}, 0x184ca, 0xd, 0x6, 0x5, 0x0, 0x6, 0x2, 0x0, 0xa, 0x0, 0x100000000}, r11, 0x4, r3, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000010c0)={r12, r13, 0x0, 0x4, &(0x7f0000001080)='GPL\x00'}, 0x30) socketpair(0x3, 0xa, 0x5, &(0x7f0000001100)={0xffffffffffffffff}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001140)={r9}, 0x4) recvmsg$unix(r14, &(0x7f00000017c0)={&(0x7f0000001180)=@abs, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001200)=""/40, 0x28}, {&(0x7f0000001240)=""/132, 0x84}, {&(0x7f0000001300)=""/56, 0x38}, {&(0x7f0000001340)=""/57, 0x39}, {&(0x7f0000001380)=""/227, 0xe3}, {&(0x7f0000001480)=""/41, 0x29}, {&(0x7f00000014c0)=""/82, 0x52}, {&(0x7f0000001540)=""/150, 0x96}], 0x8, &(0x7f0000001680)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130}, 0x40000120) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001800)={0x2, 0x4, 0x8, 0x1, 0x80, r15, 0xfff, '\x00', r7, r15, 0x3, 0x2, 0x2}, 0x50) ioctl$PERF_EVENT_IOC_DISABLE(r17, 0x2401, 0x7fff) syz_open_procfs$namespace(r16, &(0x7f0000001880)='ns/time\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f00000019c0)={@cgroup, 0x13, 0x0, 0x6, &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000001900)=[0x0], &(0x7f0000001940)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001980)=[0x0, 0x0]}, 0x40) 16.164779531s ago: executing program 2 (id=12878): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/16], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007000000180100002075"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYRES64=r0, @ANYBLOB="3918a0a8", @ANYBLOB="3f29d51f4510c5", @ANYRES64=r1], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x14c20, 0x0, 0x0, 0x0, 0x48d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'veth1_macvtap\x00', 0x2}) openat$tun(0xffffffffffffff9c, 0x0, 0x4a8b02, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000001050000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff4cff80850000007100000095"], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x11, 0xe, 0x0, &(0x7f00000009c0)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, 0x0, &(0x7f0000000180)}, 0x20) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x18000000000002a0, 0x7ee, 0x0, &(0x7f0000000e80)="b9e403c6631e39495aa05dc7cf1c", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) syz_clone(0x64847000, 0x0, 0xb698cc431f1f4bf7, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={0x0, &(0x7f0000000d00)=""/13, 0x2b, 0xd, 0x1, 0xfffff000, 0x10000}, 0x28) 16.164116931s ago: executing program 3 (id=12879): perf_event_open(&(0x7f0000001340)={0x2, 0x80, 0xcb, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x228, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x7880, 0xaf33, 0x0, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) socketpair(0xa, 0x3, 0x0, &(0x7f0000000400)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, &(0x7f0000000340)=""/142, 0x4e, 0x8e, 0x1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e097566f5bec64466cf0925782dd", 0x0, 0x8c9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x100000000, 0x12) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='signal_generate\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00'}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400fff800000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x915940ab3f6031c7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c989e14fd88a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) 16.138272661s ago: executing program 0 (id=12881): bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000a0000000000004200000000000000000000000b"], 0x0, 0x4a, 0x0, 0x1, 0x800, 0x10000}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b85, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x4000, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="090000000400000006000000ff"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="18080000d0ff04000000000000000000851000000600000018000a00ff0e3b3899be46c7fb2f4c309c320712932b424d108c6d7c3dd4427d3eb1df72c768e692260ecb8f46f1c5e9691ad521e520ef30419c877a43adb27e6c9ae57e64b953869bf090c193b70d97ab2720d039c98ea7b8419561a484c6b35f", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000080), 0x619, r6}, 0x38) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001c40)=ANY=[@ANYBLOB="0700000004000000080000000100000000", @ANYRES32=0x0, @ANYRES32], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r8}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r9 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r9, 0x0, 0x4) 13.898605185s ago: executing program 3 (id=12882): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0500000006010000400000004000000041000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008c3d588f6c257d06812d09976f024ab537111ccdf340acdb19e924532189b0b51db08b444ce02dd5ce577d1966370bfeba3e6283cd6a2ce4a2b7a09e459368bc0b2a8b316c2e297fe43dae6afd4f36eb79f9042d4e82f810ed9b345cd3b31c5a136b5a57145fee025d1eb6f8e7"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x1003, r0}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000208500000072000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000e80)={r5, 0x20, &(0x7f0000000e40)={&(0x7f0000000c40)=""/225, 0xe1, 0x0, &(0x7f0000000d40)=""/233, 0xe9}}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)=""/84, 0x54}, 0x60) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[], 0x0, 0x26}, 0x28) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x7f, 0x3, 0xe3, 0x1, 0x0, 0x7, 0x11000, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x10008, 0x40, 0x2, 0x5, 0x80000000, 0x0, 0x2100, 0x0, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='mm_page_alloc\x00', r7}, 0x18) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) 13.715311306s ago: executing program 0 (id=12885): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4b}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r0, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000008018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[], &(0x7f00000004c0)=""/246, 0x10f, 0xf6, 0x1, 0x2c8}, 0x28) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r4, @ANYBLOB="fcbf25358a753eccb7cc8f766f63313c6e42d7c8f408"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000007090000000000000080000085000000750000009500000000000000"], 0x0, 0xbb5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000003f00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) close(r6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000280)=ANY=[@ANYRES16=0x0, @ANYRES16, @ANYRES32=r1], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) 13.372488188s ago: executing program 0 (id=12887): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="3dc6e9a5ca", @ANYRESDEC=0x0, @ANYRES8=r0, @ANYRESOCT, @ANYRESOCT=r1, @ANYRESOCT=r3, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000a2ffff00000331420000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRESHEX=r5, @ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r8, &(0x7f0000000080)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000400000004000000040000000000", @ANYRES32=r7, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x10, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000071102a00000000009500000000000800b7a5038d495859261db0aa4e955ed0ccf26e42ffe10ed9c04445b5976bacedaef6d84d0a028f42bf6b694bbe6ca5a172cae50c795f2ff8dc31545800f2c1bc713f3debca5eb94f12fa8a3f87c0a7df680480e69baa1dbf45443d07d6333bfe2d6dd77057bf9a97dc698577e4d4e827308ee0956e2c3942791c5846bcb1b19e85cce3876cfe8ddc5515b2a38efd3a1247ff97974cdf47ae373ac917d5996274c962bf4d09bf3dd8de8643ffd73432c56257df7a0196b7f71c8bbcfb3f3893"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(r9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d170000010006000000000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r10, &(0x7f0000000080), 0x0}, 0x20) 13.12280883s ago: executing program 1 (id=12697): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x12, 0x6, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0xb}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000440)="151fd85228ccd4805cab22b9342f709d4556746dabf460f5e596e9d1225785d1c760decff5666464b536ebdba24673be667ccab9caab0c1283434972fad3a157735e7ef508e796ff6c9bdd1d292de4d9ca443609f7a1edf28bb2949cb81ebd4e093d406016ec0ba6e481ff18cce50e70536285054da88ec80318f43aaaf7b80928a9b945184cd71ef126d88487244cda222eecd7bdba42992f348c01dcaf84f325257043cb614eb54c14742a578263b07d595c5fd401525cf261646e01a100", 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1e0000000f000000050000000900000001010000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=r4, @ANYRES32=r1, @ANYBLOB="0101000000000000000000000e00"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000400)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r5}, &(0x7f0000000880), &(0x7f00000008c0)=r3}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x37}, 0x28) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x9, 0x82, 0x42, 0x40, 0xc0, 0xffffffffffffffff, 0x5}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r7}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r7}, 0x38) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfc, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x1000010, 0x0, 0x2, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r9 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) syz_open_procfs$namespace(r9, &(0x7f0000000000)='ns/mnt\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 13.01967098s ago: executing program 32 (id=12697): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x12, 0x6, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0xb}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000440)="151fd85228ccd4805cab22b9342f709d4556746dabf460f5e596e9d1225785d1c760decff5666464b536ebdba24673be667ccab9caab0c1283434972fad3a157735e7ef508e796ff6c9bdd1d292de4d9ca443609f7a1edf28bb2949cb81ebd4e093d406016ec0ba6e481ff18cce50e70536285054da88ec80318f43aaaf7b80928a9b945184cd71ef126d88487244cda222eecd7bdba42992f348c01dcaf84f325257043cb614eb54c14742a578263b07d595c5fd401525cf261646e01a100", 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1e0000000f000000050000000900000001010000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=r4, @ANYRES32=r1, @ANYBLOB="0101000000000000000000000e00"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000400)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r5}, &(0x7f0000000880), &(0x7f00000008c0)=r3}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x37}, 0x28) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x9, 0x82, 0x42, 0x40, 0xc0, 0xffffffffffffffff, 0x5}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r7}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r7}, 0x38) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfc, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x1000010, 0x0, 0x2, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r9 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) syz_open_procfs$namespace(r9, &(0x7f0000000000)='ns/mnt\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 12.95611542s ago: executing program 3 (id=12890): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x8000, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0xc18040, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000040000f7ffffff000600000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r2, &(0x7f0000000280)="68e182950b3460e163ebb07fcc54b1ac04a389ffcb3b32524530123d83c6a34f1602a2fad9cc724698b2147ba965a88c16c4ad6a848e3d0b6fb4615d496cd7a30b3be162f742308293367ce5de70e385b0688db3b5fb30f8f8d57f", 0x0}, 0x20) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0/file0\x00', 0x116) r3 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000005c0)=r3, 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00', @broadcast}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000005dacfb5c091b8705000000110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x204) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0x4, 0x0, 0x0, 0x3ff}]}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000400)={0x0, r5}, 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x12, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x37, r11, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r9, 0x40047451, &(0x7f0000000180)) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xba98575a95aeb70d) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) 12.819360052s ago: executing program 33 (id=12889): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, r4}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000005c0)='ns/uts\x00') write$cgroup_pid(r5, &(0x7f0000000980), 0x20000992) 12.811819252s ago: executing program 3 (id=12892): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="3dc6e9a5ca", @ANYRESDEC=0x0, @ANYRES8=r0, @ANYRESOCT, @ANYRESOCT=r1, @ANYRESOCT=r3, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000a2ffff00000331420000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRESHEX=r5, @ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r8, &(0x7f0000000080)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000400000004000000040000000000", @ANYRES32=r7, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x10, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000071102a00000000009500000000000800b7a5038d495859261db0aa4e955ed0ccf26e42ffe10ed9c04445b5976bacedaef6d84d0a028f42bf6b694bbe6ca5a172cae50c795f2ff8dc31545800f2c1bc713f3debca5eb94f12fa8a3f87c0a7df680480e69baa1dbf45443d07d6333bfe2d6dd77057bf9a97dc698577e4d4e827308ee0956e2c3942791c5846bcb1b19e85cce3876cfe8ddc5515b2a38efd3a1247ff97974cdf47ae373ac917d5996274c962bf4d09bf3dd8de8643ffd73432c56257df7a0196b7f71c8bbcfb3f3893"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(r9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d170000010006000000000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r10, &(0x7f0000000080), 0x0}, 0x20) 12.744591942s ago: executing program 34 (id=12892): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="3dc6e9a5ca", @ANYRESDEC=0x0, @ANYRES8=r0, @ANYRESOCT, @ANYRESOCT=r1, @ANYRESOCT=r3, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000a2ffff00000331420000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRESHEX=r5, @ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r8, &(0x7f0000000080)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000400000004000000040000000000", @ANYRES32=r7, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x10, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000071102a00000000009500000000000800b7a5038d495859261db0aa4e955ed0ccf26e42ffe10ed9c04445b5976bacedaef6d84d0a028f42bf6b694bbe6ca5a172cae50c795f2ff8dc31545800f2c1bc713f3debca5eb94f12fa8a3f87c0a7df680480e69baa1dbf45443d07d6333bfe2d6dd77057bf9a97dc698577e4d4e827308ee0956e2c3942791c5846bcb1b19e85cce3876cfe8ddc5515b2a38efd3a1247ff97974cdf47ae373ac917d5996274c962bf4d09bf3dd8de8643ffd73432c56257df7a0196b7f71c8bbcfb3f3893"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(r9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d170000010006000000000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r10, &(0x7f0000000080), 0x0}, 0x20) 12.667329713s ago: executing program 6 (id=12891): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffff7fffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@bloom_filter={0x1e, 0x8, 0xbe6, 0xe, 0x21000, r2, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0x6}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000009500000700"/32], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) 12.536263053s ago: executing program 35 (id=12891): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffff7fffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@bloom_filter={0x1e, 0x8, 0xbe6, 0xe, 0x21000, r2, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0x6}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000009500000700"/32], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) 12.531015133s ago: executing program 2 (id=12894): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000770000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 12.530618264s ago: executing program 7 (id=12901): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x34}, 0x28) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000181100"/20, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000000000000000181100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) close(0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r2}, 0x0, &(0x7f0000000580)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r3}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r4}, 0x38) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x300}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000000}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) (fail_nth: 1) 12.520113204s ago: executing program 36 (id=12901): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x34}, 0x28) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000181100"/20, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000000000000000181100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) close(0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r2}, 0x0, &(0x7f0000000580)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r3}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r4}, 0x38) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x300}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000000}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) (fail_nth: 1) 12.485321093s ago: executing program 2 (id=12896): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x9}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1436, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x1882a, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) socketpair(0x10, 0x0, 0x14, &(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 12.371164664s ago: executing program 37 (id=12896): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x9}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1436, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x1882a, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) socketpair(0x10, 0x0, 0x14, &(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 12.364179834s ago: executing program 0 (id=12897): perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4e93, 0x18445, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xc0000000000000, 0xfffe}, 0x8080, 0xa9, 0x80000000, 0x5, 0x400000a5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x13, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {}, {}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x8000, 0x0, 0x0, 0x41100, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0xa437}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0x1, 0x1, 0x1, 0x1, 0x1], &(0x7f0000000400)=[{0x5, 0x5, 0xe}, {0x1, 0x5, 0x4, 0x6}, {0x1, 0x5, 0x6, 0x6}, {0x1, 0x1, 0x8, 0xc}, {0x2, 0x4, 0xa, 0x1}], 0x10, 0x3}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r2}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r3}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000300), 0x6e, 0x0}, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x18, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000f4ff030000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) 12.322658425s ago: executing program 38 (id=12897): perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4e93, 0x18445, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xc0000000000000, 0xfffe}, 0x8080, 0xa9, 0x80000000, 0x5, 0x400000a5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x13, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {}, {}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x8000, 0x0, 0x0, 0x41100, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0xa437}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000003c0)=[0x1, 0x1, 0x1, 0x1, 0x1], &(0x7f0000000400)=[{0x5, 0x5, 0xe}, {0x1, 0x5, 0x4, 0x6}, {0x1, 0x5, 0x6, 0x6}, {0x1, 0x1, 0x8, 0xc}, {0x2, 0x4, 0xa, 0x1}], 0x10, 0x3}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r2}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r3}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000300), 0x6e, 0x0}, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x18, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000f4ff030000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) 8.15537189s ago: executing program 1 (id=12905): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) close(0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r2}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r3}, 0x38) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x11, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000000}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) 4.563967282s ago: executing program 5 (id=12925): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 3.817800267s ago: executing program 8 (id=12929): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x8}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x3100, 0x3100, &(0x7f0000000000), 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x50) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000001c0)=r1) 3.721164487s ago: executing program 8 (id=12930): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32, @ANYBLOB], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x3, 0x200000000000024f, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.699408098s ago: executing program 5 (id=12931): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b708", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x300}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x6c047000, 0x0, 0xfffffffffffffdd0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000a00)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0xb5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), 0x8, 0xa0, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x15, 0xe, &(0x7f0000003540)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x51}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit={0x95, 0x10}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000400000000000000000085000000ba00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.665019407s ago: executing program 1 (id=12905): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) close(0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r2}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r3}, 0x38) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x11, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000000}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) 3.443949669s ago: executing program 8 (id=12932): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4b}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r0, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000008018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[], &(0x7f00000004c0)=""/246, 0x10f, 0xf6, 0x1, 0x2c8}, 0x28) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r4, @ANYBLOB="fcbf25358a753eccb7cc8f766f63313c6e42d7c8f408"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000007090000000000000080000085000000750000009500000000000000"], 0x0, 0xbb5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000003f00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) close(0xffffffffffffffff) close(r6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000280)=ANY=[@ANYRES16=0x0, @ANYRES16, @ANYRES32=r1], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) 3.149320691s ago: executing program 9 (id=12934): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') ioctl$TUNSETIFF(r1, 0xb701, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x2}, 0x94) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x41fe) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x8, 0x0, 0x0}}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000040000008500000008000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8fbffffb702000008000000b703000005000000850000007b00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014000000b7030000090000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x42}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) 3.066720331s ago: executing program 4 (id=12935): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0xfff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f5009500040000"], 0x0}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f3, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x8, 0xffffffff, 0xe, 0x0, 0xfffffffe, 0xfffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 3.048872001s ago: executing program 8 (id=12936): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="3dc6e9a5ca", @ANYRESDEC=0x0, @ANYRES8=r0, @ANYRESOCT, @ANYRESOCT=r1, @ANYRESOCT=r3, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000a2ffff00000331420000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRESHEX=r5, @ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r8, &(0x7f0000000080)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000400000004000000040000000000", @ANYRES32=r7, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x10, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000071102a00000000009500000000000800b7a5038d495859261db0aa4e955ed0ccf26e42ffe10ed9c04445b5976bacedaef6d84d0a028f42bf6b694bbe6ca5a172cae50c795f2ff8dc31545800f2c1bc713f3debca5eb94f12fa8a3f87c0a7df680480e69baa1dbf45443d07d6333bfe2d6dd77057bf9a97dc698577e4d4e827308ee0956e2c3942791c5846bcb1b19e85cce3876cfe8ddc5515b2a38efd3a1247ff97974cdf47ae373ac917d5996274c962bf4d09bf3dd8de8643ffd73432c56257df7a0196b7f71c8bbcfb3f3893"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(r9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d170000010006000000000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r10, &(0x7f0000000080), 0x0}, 0x20) 2.900847772s ago: executing program 9 (id=12937): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0500000006010000400000004000000041000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008c3d588f6c257d06812d09976f024ab537111ccdf340acdb19e924532189b0b51db08b444ce02dd5ce577d1966370bfeba3e6283cd6a2ce4a2b7a09e459368bc0b2a8b316c2e297fe43dae6afd4f36eb79f9042d4e82f810ed9b345cd3b31c5a136b5a57145fee025d1eb6f8e7"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x1003, r0}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000208500000072000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000e80)={r5, 0x20, &(0x7f0000000e40)={&(0x7f0000000c40)=""/225, 0xe1, 0x0, &(0x7f0000000d40)=""/233, 0xe9}}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)=""/84, 0x54}, 0x60) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[], 0x0, 0x26}, 0x28) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000008000000850000007800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x7f, 0x3, 0xe3, 0x1, 0x0, 0x7, 0x11000, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x10008, 0x40, 0x2, 0x5, 0x80000000, 0x0, 0x2100, 0x0, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='mm_page_alloc\x00', r7}, 0x18) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) 2.794096043s ago: executing program 5 (id=12938): r0 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/user\x00') r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0xd, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000000000000000008007919a800"/32], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r7, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x27, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) r11 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0100000004001000040122009000000001000000", @ANYRESDEC=r11, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000002800100"/28], 0x48) sendmsg$inet(r8, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d80)={r4, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8d, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000a00), &(0x7f0000000c00), 0x8, 0x56, 0x8, 0x8, &(0x7f0000000c40)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000f40)=ANY=[@ANYBLOB="1800000007000000000000000001000018200000", @ANYRES32=r10, @ANYBLOB="000000000800000018120000", @ANYRES32=r3, @ANYBLOB="00000000b703000000000000850000000c000000b700000000000000950000000000003c6028fdd1d8e65e1e732b28ad2a7526d4dccfc9e79eca9250ae30edc23cd712e6e22f2d2f098ad6dcca7fd59478a85f522a88dd9c7e065486bb60ec8a5cb573bc741214607b1fb7ae833258dbdbbe2a1e84a8c2f5796da79f42f304963b9f287d8b35d59f34"], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x30, &(0x7f00000005c0)=""/48, 0x41100, 0x44, '\x00', r12, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000dc0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000e00)={0x2, 0x4, 0x3, 0xfffffffa}, 0x10, 0x2c85a, 0xffffffffffffffff, 0x0, &(0x7f0000000e40)=[r1, r2, r6], 0x0, 0x10, 0x1}, 0x94) recvmsg$unix(r9, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r13}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400000000000000000000000000000000000000000000009e810e97ff3ae03d6a4bff7eaa9fe8c93f22c832835514ebdc0093c3223372d202d67a22e7dc372beecce2d92ea783e9e318d08cea8b97508f2676d08594d0fddf62b207560c2b70e405a006f6ba70bb57ccd4c69c7e8349e5be3d4e409aa3264a2dcf284f080e"], 0x50) 2.336083036s ago: executing program 8 (id=12939): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0, 0x5a, &(0x7f0000000400)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x53, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xad, 0xad, 0x4, [@restrict={0x5, 0x0, 0x0, 0xb, 0x1}, @datasec={0xc, 0x2, 0x0, 0xf, 0x1, [{0x3, 0xfffffffe, 0x2}, {0x2, 0x2, 0x2}], "e1"}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb, 0x5}]}, @var={0xc, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x7, 0x2}, {0x6, 0x5}, {0x7, 0x2}, {0x9, 0x5}, {0xc}]}, @func={0x9, 0x0, 0x0, 0xc, 0x5}, @ptr={0xb, 0x0, 0x0, 0x2, 0x2}, @ptr={0xf, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000001280)=""/87, 0xcc, 0x57, 0x1, 0x4}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001300)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x87b, '\x00', r2, r3, 0x4, 0x2, 0x1}, 0x50) r4 = syz_clone(0xa8800000, &(0x7f0000001380)="6a01ebed2fd642c96bce40ebc20ffb826011249f9abf26552d479cbef50982fcc370826ed88925380515bd33c78867a72faa6e3c0b4eb525d9b7d8ce0f9f3cbffc1b954411d8cd8459983f54b3ac466a0c4191a197ad12e450056eb4672c3f4aef7a73ac2985e0ab008d4958cd275f1bb74d589515e008b5e09ae18ce98d212c8232a7ed1253b6c6046f541bacc4c243731bbb4548025f9ca83eccb081489a67da656e4e1858a84a5f6d6bd0865091549195d2b035ffb9be4cfa6147e5caeb3e01604951c5355cdff0fc56863dfc322cf8a244fa634c09fbd84013c12475", 0xde, &(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)="1958f55c1b25c0e607dc4a5a15cc788c710f8fa06daef1cba042d54ba863d59f4c6ef69f5fc92a90fc764dec1a5525284bba803bdd8b9b041fce30c6905a41b2c0149af96cb277018108b9cefa858de4aea20588e6c112f33609eee7f013191c840cd65373ec4f44068d0df870a129ab8c7f04f86728d7c3d0c7d16d83d286974a68b9c72271b6dd5fa4b42fbd7aa66d6f79c83aed85b28f2689567e5fa0b2b4adbf36f96cac3581cb748b00766b") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000015c0)=r4, 0x12) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200), 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x2b, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000000c0)={'rose0\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200, 0x10039, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f00000003c0), &(0x7f0000000540)}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 2.223374706s ago: executing program 4 (id=12940): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES16=r2, @ANYRES64=0x0, @ANYRESDEC=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c9042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c230000) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r7}, &(0x7f0000000800), &(0x7f0000000840)=r8}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000080)) 2.140167077s ago: executing program 8 (id=12941): r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff00000000000000001801000020646c4200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000002300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000005800000058000000050000000b00000000000080050000000e000000000000110500000004000000010000000200009301000000100000000100000000000080070000000100000001010000020000000000000a03000000020000000000001201000000005f1e0000"], &(0x7f0000000680)=""/147, 0x75, 0x93, 0x0, 0x0, 0x10000, @value=r0}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r1}, 0x8) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') socketpair(0x1d, 0x2, 0xff, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001480)=ANY=[@ANYRES32, @ANYBLOB='\x00'/13], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x5452, &(0x7f0000000a00)={'vlan0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0xfc}}) recvmsg$unix(r6, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.935419948s ago: executing program 9 (id=12942): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x3, 0x200000000000024f, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.906123008s ago: executing program 9 (id=12943): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0500000006010000400000004000000041000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008c3d588f6c257d06812d09976f024ab537111ccdf340acdb19e924532189b0b51db08b444ce02dd5ce577d1966370bfeba3e6283cd6a2ce4a2b7a09e459368bc0b2a8b316c2e297fe43dae6afd4f36eb79f9042d4e82f810ed9b345cd3b31c5a136b5a57145fee025d1eb6f8e7"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x1003, r0}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000208500000072000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000e80)={r5, 0x20, &(0x7f0000000e40)={&(0x7f0000000c40)=""/225, 0xe1, 0x0, &(0x7f0000000d40)=""/233, 0xe9}}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)=""/84, 0x54}, 0x60) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[], 0x0, 0x26}, 0x28) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000008000000850000007800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x7f, 0x3, 0xe3, 0x1, 0x0, 0x7, 0x11000, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x10008, 0x40, 0x2, 0x5, 0x80000000, 0x0, 0x2100, 0x0, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='mm_page_alloc\x00', r7}, 0x18) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) 1.843325229s ago: executing program 4 (id=12944): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x4000000000000, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 1.842844979s ago: executing program 5 (id=12945): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYRESOCT, @ANYRESDEC=0x0, @ANYRESDEC, @ANYRES64], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x4, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="26f35ad91f4b200dce231509d507786aaf069b8ee21d127fef0bfdba94f1a962f012a38f3c80632330dbb6cb90b150cb33675cba67062cd0aa2da78eb044566e863cf3278717da5e5630e8f37db5517667419d9ba456cf4fb66155fda1c2f2e85af68901e23c156cf6eaa4e98c0b2d9d7629f4044c83915a7a8ff39e351ef7fd68", @ANYRES16=r2], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r0, 0xffffffffffffffff}, &(0x7f0000000e00), &(0x7f0000000e40)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r5}, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="96536289330c653534f5d651b06d42d15316cbdb850e076188702a2a266519750fecfab0bd5db7f3806bfc2eb3122b4263be50d75ca26a0ecba414e7c4a5eb2422541bbeae766ff6ef9966e8f81945c0a59f82d36025e00bef817893c388028109c6c3157cc2de597997e8dba32f60924b10f35c71c3bc1dd945a394eb89ebc85b1a6a2baa7139a673ce555e1c203d696985a2087ebd7fe4c9ce2acfeec3ea704b2fe24142282478458f9f306830b63d3397f889040e8b1f37b9637a7784bf65869665370fb88eafb6f82d0ae5f91bb8e1490b3f460094a1e914be0527d5b1cdf676773e8d1294354cb9", @ANYRES16=r5, @ANYRES64=r1], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) r8 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0x7}, 0x450, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0, 0xcde8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = syz_clone(0x628c0100, 0x0, 0x59bbb2fd8cc8c5ef, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x9d1c, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x4}, r9, 0xafffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0xfd, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x9c048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0xa}, 0x0, 0xc8, 0x0, 0x7, 0x0, 0x0, 0x7709}, 0x0, 0x8000000000000000, r8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\b\x00'/15, @ANYRES32, @ANYBLOB="0400"/15], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x14, &(0x7f0000000200)=ANY=[@ANYRES64=r4, @ANYRES32, @ANYBLOB="0000000800000000b702000014000000b703000000000019425ce00083000000bf090000000000005509010000000000950000000000003018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xfffffffa, 0x0, 0x0, 0x41100, 0x52, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x1, 0x5, 0x9}, 0x10, 0x143ac, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r12, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000011c0)={0x5}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2"], 0xfdef) syz_open_procfs$namespace(r9, &(0x7f0000001040)='ns/time_for_children\x00') gettid() 1.794472499s ago: executing program 4 (id=12946): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) (fail_nth: 7) 1.287263842s ago: executing program 4 (id=12947): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2002f00, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.231031322s ago: executing program 4 (id=12948): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) (async) close(r0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r2}, 0x38) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='kyber_latency\x00', r5}, 0x18) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) close(0xffffffffffffffff) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) mkdirat$cgroup(r7, &(0x7f00000000c0)='syz1\x00', 0x1ff) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) 995.863254ms ago: executing program 5 (id=12949): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x38e40d154c0872d4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01005f0c0000000000010000ab7e9c971f844435a21e55"], 0x0, 0xfc5f}, 0x28) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x5, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0x88, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000340)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYRES8=r1], 0x128}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x6e, 0x26, &(0x7f0000000440)="cb7a37077507ced39fa514ef654e381b71a1c6bba5e53c79b53cac0275fde9cf504f3349797ad0d98ba0aa6090d58e060ba3f4a44e7d5775ba7b12fe7bd8c5d3f52b9930a99ca94338ed50e891a7890964872ed41ca39e4e34d4fdd7e6e7d7463f2964d0f428c43c8bbdf871200b", &(0x7f0000000180)=""/38, 0x7, 0x0, 0x51, 0x0, &(0x7f0000000200)="251c6a4a5d2a40b2ee6220dbbdcc146ebcf9cd3ee005206104b4f33a60afeb384fcbd40e4639b1e25da5e4014edb464e1f3b14e3a83ebacb041ea09a71fa1324dba37006a72ec1f39ed72fd16943298806", &(0x7f0000000580), 0x6, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r2, r3}, 0xc) close(r6) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffcf68}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) 834.747425ms ago: executing program 9 (id=12950): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="3dc6e9a5ca", @ANYRESDEC=0x0, @ANYRES8=r0, @ANYRESOCT, @ANYRESOCT=r1, @ANYRESOCT=r3, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000a2ffff00000331420000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRESHEX=r5, @ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r8, &(0x7f0000000080)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000400000004000000040000000000", @ANYRES32=r7, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x10, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000071102a00000000009500000000000800b7a5038d495859261db0aa4e955ed0ccf26e42ffe10ed9c04445b5976bacedaef6d84d0a028f42bf6b694bbe6ca5a172cae50c795f2ff8dc31545800f2c1bc713f3debca5eb94f12fa8a3f87c0a7df680480e69baa1dbf45443d07d6333bfe2d6dd77057bf9a97dc698577e4d4e827308ee0956e2c3942791c5846bcb1b19e85cce3876cfe8ddc5515b2a38efd3a1247ff97974cdf47ae373ac917d5996274c962bf4d09bf3dd8de8643ffd73432c56257df7a0196b7f71c8bbcfb3f3893"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(r9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d170000010006000000000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r10, &(0x7f0000000080), 0x0}, 0x20) 412.339757ms ago: executing program 5 (id=12951): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="3dc6e9a5ca", @ANYRESDEC=0x0, @ANYRES8=r0, @ANYRESOCT, @ANYRESOCT=r1, @ANYRESOCT=r3, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000a2ffff00000331420000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRESHEX=r5, @ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r8, &(0x7f0000000080)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000400000004000000040000000000", @ANYRES32=r7, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x10, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000071102a00000000009500000000000800b7a5038d495859261db0aa4e955ed0ccf26e42ffe10ed9c04445b5976bacedaef6d84d0a028f42bf6b694bbe6ca5a172cae50c795f2ff8dc31545800f2c1bc713f3debca5eb94f12fa8a3f87c0a7df680480e69baa1dbf45443d07d6333bfe2d6dd77057bf9a97dc698577e4d4e827308ee0956e2c3942791c5846bcb1b19e85cce3876cfe8ddc5515b2a38efd3a1247ff97974cdf47ae373ac917d5996274c962bf4d09bf3dd8de8643ffd73432c56257df7a0196b7f71c8bbcfb3f3893"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(r9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d170000010006000000000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r10, &(0x7f0000000080), 0x0}, 0x20) 235.960808ms ago: executing program 9 (id=12952): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x7, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0b00000000000000000000000000000018111e00", @ANYRES8=r0, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 0s ago: executing program 1 (id=12905): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) close(0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r2}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r3}, 0x38) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x11, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @generic={0x66, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000000}, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) kernel console output (not intermixed with test programs): 1730.321753][T30849] lowmem_reserve[]: 0 0 0 0 [ 1730.333624][T30849] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 1730.351524][T30849] Normal: 1677*4kB (ME) 1088*8kB (UME) 656*16kB (UME) 528*32kB (UME) 228*64kB (UME) 379*128kB (UM) 92*256kB (UM) 36*512kB (UME) 13*1024kB (UME) 2*2048kB (ME) 725*4096kB (UM) = 3134900kB [ 1730.403640][T30849] 22905 total pagecache pages [ 1730.409574][T30872] device sit0 left promiscuous mode [ 1730.415412][T30849] 0 pages in swap cache [ 1730.423901][T30849] Free swap = 124996kB [ 1730.478911][T30849] Total swap = 124996kB [ 1730.483120][T30849] 2097051 pages RAM [ 1730.489335][T30849] 0 pages HighMem/MovableOnly [ 1730.497197][T30849] 346840 pages reserved [ 1730.502826][T30849] 0 pages cma reserved [ 1730.503671][T30872] device sit0 entered promiscuous mode [ 1732.968336][T30916] device sit0 left promiscuous mode [ 1733.040531][T30916] device sit0 entered promiscuous mode [ 1734.085154][T30937] device sit0 left promiscuous mode [ 1734.151912][T30937] device sit0 entered promiscuous mode [ 1734.704844][T30948] device sit0 left promiscuous mode [ 1734.888720][T30948] device sit0 entered promiscuous mode [ 1736.908631][T30986] device sit0 left promiscuous mode [ 1736.926519][T30987] device sit0 entered promiscuous mode [ 1738.799974][T31017] device sit0 left promiscuous mode [ 1738.832139][T31019] device sit0 entered promiscuous mode [ 1741.372350][T31057] device sit0 left promiscuous mode [ 1741.406821][T31057] device sit0 entered promiscuous mode [ 1743.930100][T31103] device sit0 left promiscuous mode [ 1743.965293][T31105] device sit0 entered promiscuous mode [ 1744.866511][T31120] device sit0 left promiscuous mode [ 1744.884187][T31121] device sit0 entered promiscuous mode [ 1746.872061][T31155] device veth1_macvtap left promiscuous mode [ 1747.184850][T31159] device sit0 left promiscuous mode [ 1747.254938][T31159] device sit0 entered promiscuous mode [ 1749.369744][T31198] device sit0 left promiscuous mode [ 1749.480003][T31199] device sit0 entered promiscuous mode [ 1752.400104][T31260] device sit0 left promiscuous mode [ 1752.495676][T31260] device sit0 entered promiscuous mode [ 1753.244362][T31277] device wg2 left promiscuous mode [ 1754.108838][T31298] device sit0 left promiscuous mode [ 1754.156732][T31298] device sit0 entered promiscuous mode [ 1756.260021][T31347] device sit0 left promiscuous mode [ 1756.397586][T31347] device sit0 entered promiscuous mode [ 1756.617555][T31351] device sit0 left promiscuous mode [ 1756.646561][T31352] device sit0 entered promiscuous mode [ 1758.314163][T31390] device sit0 left promiscuous mode [ 1758.397532][T31390] device sit0 entered promiscuous mode [ 1758.759455][T31393] device sit0 left promiscuous mode [ 1758.807093][T31395] device sit0 entered promiscuous mode [ 1760.162955][T31427] device sit0 left promiscuous mode [ 1760.209220][T31427] device sit0 entered promiscuous mode [ 1761.110426][T31448] device sit0 left promiscuous mode [ 1761.138471][T31448] device sit0 entered promiscuous mode [ 1763.845623][T31498] device sit0 left promiscuous mode [ 1763.897408][T31499] device sit0 entered promiscuous mode [ 1765.540277][T31523] device sit0 left promiscuous mode [ 1765.602561][T31525] device sit0 entered promiscuous mode [ 1766.417491][T31541] device sit0 left promiscuous mode [ 1766.471221][T31541] device sit0 entered promiscuous mode [ 1767.697512][T31568] device sit0 left promiscuous mode [ 1767.808343][T31568] device sit0 entered promiscuous mode [ 1768.242289][T31586] device sit0 left promiscuous mode [ 1768.552610][T31588] device sit0 entered promiscuous mode [ 1768.988628][T31601] device sit0 left promiscuous mode [ 1769.054489][T31602] device sit0 entered promiscuous mode [ 1773.031099][T31675] device sit0 left promiscuous mode [ 1773.059325][T31675] device sit0 entered promiscuous mode [ 1774.530523][T31714] device sit0 left promiscuous mode [ 1774.556077][T31715] device sit0 entered promiscuous mode [ 1774.723674][T31720] device sit0 left promiscuous mode [ 1774.734242][T31721] device sit0 entered promiscuous mode [ 1776.086981][T31749] device sit0 left promiscuous mode [ 1776.176952][T31751] device sit0 entered promiscuous mode [ 1776.584278][T31761] device sit0 left promiscuous mode [ 1776.706864][T31761] device sit0 entered promiscuous mode [ 1778.848404][T31796] device sit0 left promiscuous mode [ 1778.876204][T31796] device sit0 entered promiscuous mode [ 1780.459612][T31837] device sit0 left promiscuous mode [ 1780.587214][T31837] device sit0 entered promiscuous mode [ 1781.927704][T31891] device sit0 left promiscuous mode [ 1781.952843][T31892] FAULT_INJECTION: forcing a failure. [ 1781.952843][T31892] name failslab, interval 1, probability 0, space 0, times 0 [ 1781.966208][T31892] CPU: 0 PID: 31892 Comm: syz.0.10023 Not tainted syzkaller #0 [ 1781.973774][T31892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1781.983821][T31892] Call Trace: [ 1781.987098][T31892] [ 1781.990028][T31892] __dump_stack+0x21/0x24 [ 1781.994368][T31892] dump_stack_lvl+0xee/0x150 [ 1781.998953][T31892] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1782.003969][T31892] ? kasan_quarantine_put+0x34/0x190 [ 1782.009259][T31892] dump_stack+0x15/0x24 [ 1782.013406][T31892] should_fail_ex+0x3d4/0x520 [ 1782.018098][T31892] __should_failslab+0xac/0xf0 [ 1782.022868][T31892] ? create_local_trace_uprobe+0x147/0x6f0 [ 1782.028676][T31892] should_failslab+0x9/0x20 [ 1782.033175][T31892] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1782.038545][T31892] ? create_local_trace_uprobe+0x147/0x6f0 [ 1782.044383][T31892] kmalloc_trace+0x29/0xb0 [ 1782.048796][T31892] create_local_trace_uprobe+0x147/0x6f0 [ 1782.054426][T31892] ? __cfi_create_local_trace_uprobe+0x10/0x10 [ 1782.060575][T31892] ? __kasan_check_write+0x14/0x20 [ 1782.065678][T31892] ? _copy_from_user+0x8f/0xc0 [ 1782.070443][T31892] perf_uprobe_init+0xf9/0x1a0 [ 1782.075220][T31892] perf_uprobe_event_init+0xe6/0x180 [ 1782.080495][T31892] perf_try_init_event+0x15b/0x450 [ 1782.085616][T31892] perf_event_alloc+0x10f7/0x1970 [ 1782.090642][T31892] __se_sys_perf_event_open+0x6c5/0x1b80 [ 1782.096268][T31892] ? __kasan_check_write+0x14/0x20 [ 1782.101371][T31892] ? mutex_unlock+0x89/0x220 [ 1782.105960][T31892] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1782.111593][T31892] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1782.117426][T31892] __x64_sys_perf_event_open+0xbf/0xd0 [ 1782.122886][T31892] x64_sys_call+0x385/0x9a0 [ 1782.127381][T31892] do_syscall_64+0x4c/0xa0 [ 1782.131786][T31892] ? clear_bhb_loop+0x30/0x80 [ 1782.136455][T31892] ? clear_bhb_loop+0x30/0x80 [ 1782.141127][T31892] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1782.147011][T31892] RIP: 0033:0x7fe19758f6c9 [ 1782.151418][T31892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1782.171011][T31892] RSP: 002b:00007fe198494038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1782.179412][T31892] RAX: ffffffffffffffda RBX: 00007fe1977e5fa0 RCX: 00007fe19758f6c9 [ 1782.187373][T31892] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 1782.195351][T31892] RBP: 00007fe198494090 R08: 0000000000000000 R09: 0000000000000000 [ 1782.203310][T31892] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1782.211274][T31892] R13: 00007fe1977e6038 R14: 00007fe1977e5fa0 R15: 00007ffdbec7e268 [ 1782.219240][T31892] [ 1782.224038][T31892] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 1782.273284][T31891] device sit0 entered promiscuous mode [ 1782.881958][T31914] device sit0 left promiscuous mode [ 1782.916836][T31914] device sit0 entered promiscuous mode [ 1783.754729][T31941] device sit0 left promiscuous mode [ 1783.848916][T31946] device sit0 entered promiscuous mode [ 1784.781619][T31962] device sit0 left promiscuous mode [ 1784.844601][T31962] device sit0 entered promiscuous mode [ 1786.535503][T31990] device sit0 left promiscuous mode [ 1786.549490][T31992] device sit0 entered promiscuous mode [ 1787.891907][T32027] device sit0 left promiscuous mode [ 1788.031376][T32027] device sit0 entered promiscuous mode [ 1789.954251][T32063] syz.3.10077[32063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1789.954322][T32063] syz.3.10077[32063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1790.726574][T32069] device sit0 left promiscuous mode [ 1790.775805][T32069] device sit0 entered promiscuous mode [ 1796.143901][T32164] device sit0 left promiscuous mode [ 1796.258134][T32164] device sit0 entered promiscuous mode [ 1796.778049][T32176] device sit0 left promiscuous mode [ 1796.861771][T32178] device sit0 entered promiscuous mode [ 1797.829012][T32195] device sit0 left promiscuous mode [ 1797.898225][T32195] device sit0 entered promiscuous mode [ 1801.590187][T32268] FAULT_INJECTION: forcing a failure. [ 1801.590187][T32268] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1801.609282][T32268] CPU: 0 PID: 32268 Comm: syz.4.10138 Not tainted syzkaller #0 [ 1801.616864][T32268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1801.626929][T32268] Call Trace: [ 1801.630210][T32268] [ 1801.633149][T32268] __dump_stack+0x21/0x24 [ 1801.637502][T32268] dump_stack_lvl+0xee/0x150 [ 1801.642109][T32268] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1801.647151][T32268] dump_stack+0x15/0x24 [ 1801.651328][T32268] should_fail_ex+0x3d4/0x520 [ 1801.656023][T32268] should_fail_alloc_page+0x61/0x90 [ 1801.661236][T32268] prepare_alloc_pages+0x148/0x5f0 [ 1801.666367][T32268] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 1801.671590][T32268] ? slab_post_alloc_hook+0x4f/0x2d0 [ 1801.676894][T32268] ? kmem_cache_alloc_node+0x181/0x340 [ 1801.682370][T32268] ? alloc_vmap_area+0x17b/0x1870 [ 1801.687427][T32268] ? __get_vm_area_node+0x160/0x360 [ 1801.692645][T32268] ? __vmalloc_node_range+0x326/0x13d0 [ 1801.698111][T32268] ? prealloc_init+0x146/0x8f0 [ 1801.702892][T32268] __alloc_pages+0x124/0x450 [ 1801.707502][T32268] ? __cfi___alloc_pages+0x10/0x10 [ 1801.712653][T32268] __get_free_pages+0xe/0x30 [ 1801.717251][T32268] kasan_populate_vmalloc_pte+0x29/0x120 [ 1801.722881][T32268] __apply_to_page_range+0x8de/0xc80 [ 1801.728251][T32268] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 1801.734493][T32268] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 1801.740726][T32268] apply_to_page_range+0x3b/0x50 [ 1801.745661][T32268] kasan_populate_vmalloc+0x60/0x70 [ 1801.750870][T32268] alloc_vmap_area+0x173e/0x1870 [ 1801.755800][T32268] ? vm_map_ram+0x930/0x930 [ 1801.760292][T32268] ? __kasan_kmalloc+0x95/0xb0 [ 1801.765053][T32268] ? kmalloc_node_trace+0x3d/0xb0 [ 1801.770065][T32268] __get_vm_area_node+0x160/0x360 [ 1801.775083][T32268] __vmalloc_node_range+0x326/0x13d0 [ 1801.780363][T32268] ? prealloc_init+0x146/0x8f0 [ 1801.785130][T32268] ? pcpu_memcg_post_alloc_hook+0x177/0x270 [ 1801.791024][T32268] ? __bitmap_weight+0xb3/0x100 [ 1801.795875][T32268] ? __cfi___vmalloc_node_range+0x10/0x10 [ 1801.801583][T32268] ? __alloc_percpu_gfp+0x25/0x30 [ 1801.806598][T32268] ? pcpu_alloc+0x1108/0x16b0 [ 1801.811292][T32268] bpf_map_area_alloc+0xd7/0xe0 [ 1801.816138][T32268] ? prealloc_init+0x146/0x8f0 [ 1801.820898][T32268] prealloc_init+0x146/0x8f0 [ 1801.825484][T32268] htab_map_alloc+0xb24/0xfd0 [ 1801.830152][T32268] map_create+0x49c/0xd80 [ 1801.834472][T32268] __sys_bpf+0x30b/0x780 [ 1801.838704][T32268] ? bpf_link_show_fdinfo+0x320/0x320 [ 1801.844066][T32268] ? __cfi_ksys_write+0x10/0x10 [ 1801.848909][T32268] ? debug_smp_processor_id+0x17/0x20 [ 1801.854269][T32268] __x64_sys_bpf+0x7c/0x90 [ 1801.858688][T32268] x64_sys_call+0x488/0x9a0 [ 1801.863195][T32268] do_syscall_64+0x4c/0xa0 [ 1801.867606][T32268] ? clear_bhb_loop+0x30/0x80 [ 1801.872284][T32268] ? clear_bhb_loop+0x30/0x80 [ 1801.876968][T32268] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1801.882859][T32268] RIP: 0033:0x7f9c8ad8f6c9 [ 1801.887263][T32268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1801.906878][T32268] RSP: 002b:00007f9c897f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1801.915282][T32268] RAX: ffffffffffffffda RBX: 00007f9c8afe5fa0 RCX: 00007f9c8ad8f6c9 [ 1801.923260][T32268] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 1801.931242][T32268] RBP: 00007f9c897f7090 R08: 0000000000000000 R09: 0000000000000000 [ 1801.939209][T32268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1801.947190][T32268] R13: 00007f9c8afe6038 R14: 00007f9c8afe5fa0 R15: 00007ffc171d6aa8 [ 1801.955164][T32268] [ 1802.006368][T32271] device sit0 left promiscuous mode [ 1802.063116][T32271] device sit0 entered promiscuous mode [ 1804.045257][T32309] device sit0 left promiscuous mode [ 1804.097985][T32309] device sit0 entered promiscuous mode [ 1805.578232][T32343] device sit0 left promiscuous mode [ 1805.643851][T32344] device sit0 entered promiscuous mode [ 1806.665079][T32364] device sit0 left promiscuous mode [ 1806.691308][T32364] device sit0 entered promiscuous mode [ 1807.250452][T32383] device sit0 left promiscuous mode [ 1807.263125][T32384] device sit0 entered promiscuous mode [ 1808.457217][T32393] ------------[ cut here ]------------ [ 1808.462906][T32393] WARNING: CPU: 1 PID: 32393 at kernel/events/core.c:6564 perf_pending_task+0x3cd/0x4e0 [ 1808.472711][T32393] Modules linked in: [ 1808.476667][T32393] CPU: 1 PID: 32393 Comm: syz.2.10176 Not tainted syzkaller #0 [ 1808.484285][T32393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1808.494370][T32393] RIP: 0010:perf_pending_task+0x3cd/0x4e0 [ 1808.500119][T32393] Code: 41 5f 5d c3 e8 24 09 d8 ff 43 80 3c 2f 00 0f 85 d0 fe ff ff e9 d3 fe ff ff e8 0f 09 d8 ff e8 b6 63 68 ff eb 83 e8 03 09 d8 ff <0f> 0b e9 a2 fe ff ff e8 f7 08 d8 ff 48 c7 c7 e0 3e 03 87 4c 89 f6 [ 1808.519803][T32393] RSP: 0018:ffffc900010378d8 EFLAGS: 00010293 [ 1808.525918][T32393] RAX: ffffffff819816fd RBX: ffff888123455620 RCX: ffff88811f331440 [ 1808.533931][T32393] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 1808.541922][T32393] RBP: ffffc90001037910 R08: dffffc0000000000 R09: ffffed103ee271c3 [ 1808.549956][T32393] R10: 0000000000000000 R11: ffffffff81981330 R12: ffff88811f331440 [ 1808.557982][T32393] R13: ffff8881281b78c8 R14: ffff8881234554e0 R15: 1ffff1102468aa9c [ 1808.565994][T32393] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1808.574972][T32393] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1808.581585][T32393] CR2: 00000000508f0000 CR3: 000000013381f000 CR4: 00000000003506a0 [ 1808.589598][T32393] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1808.597616][T32393] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1808.605622][T32393] Call Trace: [ 1808.608933][T32393] [ 1808.611879][T32393] task_work_run+0x1db/0x240 [ 1808.616512][T32393] ? __cfi_task_work_run+0x10/0x10 [ 1808.621657][T32393] ? disassociate_ctty+0x1f2/0x8b0 [ 1808.626810][T32393] ? __kasan_check_write+0x14/0x20 [ 1808.631937][T32393] do_exit+0xa25/0x2650 [ 1808.636155][T32393] ? perf_pending_task+0x19/0x4e0 [ 1808.641206][T32393] ? __cfi_do_exit+0x10/0x10 [ 1808.645863][T32393] ? irqentry_exit+0x37/0x40 [ 1808.650473][T32393] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1808.656338][T32393] ? do_group_exit+0x74/0x2d0 [ 1808.661037][T32393] do_group_exit+0x210/0x2d0 [ 1808.665699][T32393] ? __kasan_check_write+0x14/0x20 [ 1808.670962][T32393] get_signal+0x13b5/0x1520 [ 1808.675513][T32393] arch_do_signal_or_restart+0xb0/0x1030 [ 1808.681163][T32393] ? kernel_clone+0x254/0x810 [ 1808.685887][T32393] ? __cfi_kernel_clone+0x10/0x10 [ 1808.690955][T32393] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 1808.697155][T32393] ? __x64_sys_clone+0x168/0x1b0 [ 1808.702123][T32393] exit_to_user_mode_loop+0x7a/0xb0 [ 1808.707368][T32393] exit_to_user_mode_prepare+0x87/0xd0 [ 1808.712877][T32393] syscall_exit_to_user_mode+0x1a/0x30 [ 1808.718389][T32393] do_syscall_64+0x58/0xa0 [ 1808.722841][T32393] ? clear_bhb_loop+0x30/0x80 [ 1808.727572][T32393] ? clear_bhb_loop+0x30/0x80 [ 1808.732296][T32393] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1808.738240][T32393] RIP: 0033:0x7fefd5b8f6c9 [ 1808.742665][T32393] Code: Unable to access opcode bytes at 0x7fefd5b8f69f. [ 1808.749722][T32393] RSP: 002b:00007fefd6a2dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1808.758248][T32393] RAX: fffffffffffffffc RBX: 00007fefd5de5fa0 RCX: 00007fefd5b8f6c9 [ 1808.766262][T32393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 1808.774265][T32393] RBP: 00007fefd5c11f91 R08: 0000000000000000 R09: 0000000000000000 [ 1808.782255][T32393] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 1808.790303][T32393] R13: 00007fefd5de6038 R14: 00007fefd5de5fa0 R15: 00007fff30b81908 [ 1808.798312][T32393] [ 1808.801364][T32393] ---[ end trace 0000000000000000 ]--- [ 1809.134279][T32432] device sit0 left promiscuous mode [ 1809.392646][T32433] device sit0 entered promiscuous mode [ 1810.587775][T32478] device sit0 left promiscuous mode [ 1810.611073][T32478] device sit0 entered promiscuous mode [ 1811.691814][T32521] device sit0 left promiscuous mode [ 1811.750406][T32521] device sit0 entered promiscuous mode [ 1812.272999][T32530] device syzkaller0 entered promiscuous mode [ 1813.673644][T32573] device sit0 left promiscuous mode [ 1813.760914][T32574] device sit0 entered promiscuous mode [ 1814.338245][T32582] device sit0 left promiscuous mode [ 1814.366667][T32583] device sit0 entered promiscuous mode [ 1815.236002][T32602] bond_slave_1: mtu less than device minimum [ 1815.387634][T32610] device sit0 left promiscuous mode [ 1815.425879][T32611] device sit0 left promiscuous mode [ 1815.486338][T32610] device sit0 entered promiscuous mode [ 1815.884304][T32613] device sit0 entered promiscuous mode [ 1817.245952][T32651] device sit0 left promiscuous mode [ 1817.359800][T32651] device sit0 entered promiscuous mode [ 1819.666572][T32688] device sit0 left promiscuous mode [ 1819.749779][T32688] device sit0 entered promiscuous mode [ 1821.198102][T32717] device sit0 left promiscuous mode [ 1821.222656][T32717] device sit0 entered promiscuous mode [ 1821.888548][T32729] device sit0 left promiscuous mode [ 1821.958859][T32729] device sit0 entered promiscuous mode [ 1828.562699][ T377] device sit0 left promiscuous mode [ 1828.584652][ T377] device sit0 entered promiscuous mode [ 1829.664259][ T398] device sit0 left promiscuous mode [ 1829.761557][ T398] device sit0 entered promiscuous mode [ 1830.172685][ T406] device sit0 left promiscuous mode [ 1830.209072][ T406] device sit0 entered promiscuous mode [ 1831.549401][ T445] device sit0 left promiscuous mode [ 1831.571310][ T445] device sit0 entered promiscuous mode [ 1831.970555][ T456] device sit0 left promiscuous mode [ 1831.988057][ T456] device sit0 entered promiscuous mode [ 1834.450782][ T489] device sit0 left promiscuous mode [ 1834.490754][ T489] device sit0 entered promiscuous mode [ 1835.552639][ T511] device sit0 left promiscuous mode [ 1835.594342][ T515] device sit0 entered promiscuous mode [ 1835.933485][ T530] device sit0 left promiscuous mode [ 1835.984964][ T530] device sit0 entered promiscuous mode [ 1838.061279][ T578] device sit0 left promiscuous mode [ 1838.125748][ T578] device sit0 entered promiscuous mode [ 1838.867768][ T594] device veth1_macvtap left promiscuous mode [ 1838.874289][ T594] device macsec0 left promiscuous mode [ 1840.435222][ T621] device sit0 left promiscuous mode [ 1840.541475][ T621] device sit0 entered promiscuous mode [ 1840.987063][ T628] device sit0 left promiscuous mode [ 1841.025406][ T628] device sit0 entered promiscuous mode [ 1842.176537][ T657] device sit0 left promiscuous mode [ 1842.207706][ T657] device sit0 entered promiscuous mode [ 1845.832056][ T705] device sit0 left promiscuous mode [ 1845.936973][ T705] device sit0 entered promiscuous mode [ 1849.717691][ T784] device sit0 left promiscuous mode [ 1850.042775][ T790] device sit0 entered promiscuous mode [ 1854.225624][ T875] device sit0 left promiscuous mode [ 1854.342480][ T876] device sit0 entered promiscuous mode [ 1857.994863][ T955] device sit0 left promiscuous mode [ 1858.031552][ T957] device sit0 entered promiscuous mode [ 1860.213419][ T1013] device sit0 left promiscuous mode [ 1860.276514][ T1014] device sit0 entered promiscuous mode [ 1865.456991][ T1116] device sit0 left promiscuous mode [ 1865.506616][ T1116] device sit0 entered promiscuous mode [ 1866.297582][ T1129] device sit0 left promiscuous mode [ 1866.371624][ T1129] device sit0 entered promiscuous mode [ 1867.415052][ T1147] device sit0 left promiscuous mode [ 1867.467985][ T1147] device sit0 entered promiscuous mode [ 1871.166503][ T1203] device sit0 left promiscuous mode [ 1871.218371][ T1203] device sit0 entered promiscuous mode [ 1872.716616][ T1231] device sit0 left promiscuous mode [ 1872.799384][ T1231] device sit0 entered promiscuous mode [ 1873.124738][ T1235] device sit0 left promiscuous mode [ 1873.156106][ T1240] device sit0 entered promiscuous mode [ 1873.491407][ T1252] device sit0 left promiscuous mode [ 1873.581921][ T1255] device sit0 entered promiscuous mode [ 1876.026706][ T1306] device sit0 left promiscuous mode [ 1876.109841][ T1306] device sit0 entered promiscuous mode [ 1877.900873][ T1340] device sit0 left promiscuous mode [ 1877.980915][ T1344] device sit0 entered promiscuous mode [ 1878.487205][ T1352] device sit0 left promiscuous mode [ 1878.517937][ T1353] device sit0 entered promiscuous mode [ 1880.454943][ T1390] device sit0 left promiscuous mode [ 1880.530773][ T1390] device sit0 entered promiscuous mode [ 1881.014721][ T1401] device sit0 left promiscuous mode [ 1881.111383][ T1404] device sit0 entered promiscuous mode [ 1882.193299][ T1428] device sit0 left promiscuous mode [ 1882.320824][ T1429] device sit0 entered promiscuous mode [ 1882.701847][ T1434] device sit0 left promiscuous mode [ 1882.821364][ T1434] device sit0 entered promiscuous mode [ 1883.083549][ T1442] device sit0 left promiscuous mode [ 1883.111327][ T1445] device sit0 entered promiscuous mode [ 1883.385515][ T1451] device sit0 left promiscuous mode [ 1883.465166][ T1454] device sit0 entered promiscuous mode [ 1883.889968][ T1470] device sit0 left promiscuous mode [ 1883.949021][ T1470] device sit0 entered promiscuous mode [ 1885.623454][ T1512] device sit0 left promiscuous mode [ 1885.648916][ T1512] device sit0 entered promiscuous mode [ 1886.035674][ T1525] device sit0 left promiscuous mode [ 1886.097352][ T1527] device sit0 entered promiscuous mode [ 1888.044903][ T1568] device sit0 left promiscuous mode [ 1888.111988][ T1568] device sit0 entered promiscuous mode [ 1890.624919][ T1616] device sit0 left promiscuous mode [ 1890.657407][ T1616] device sit0 entered promiscuous mode [ 1892.997221][ T1658] device sit0 left promiscuous mode [ 1893.021534][ T1658] device sit0 entered promiscuous mode [ 1895.433758][ T1702] device sit0 left promiscuous mode [ 1895.456624][ T1704] device sit0 entered promiscuous mode [ 1897.352782][ T1750] device sit0 left promiscuous mode [ 1897.367532][ T1751] device sit0 entered promiscuous mode [ 1899.962265][ T1787] device sit0 left promiscuous mode [ 1899.984988][ T1787] device sit0 entered promiscuous mode [ 1900.197413][ T1792] device sit0 left promiscuous mode [ 1900.260342][ T1796] device sit0 entered promiscuous mode [ 1900.693032][ T1812] device sit0 left promiscuous mode [ 1900.731829][ T1813] device sit0 entered promiscuous mode [ 1901.872049][ T1839] device sit0 left promiscuous mode [ 1901.934625][ T1839] device sit0 entered promiscuous mode [ 1902.249424][ T1846] device syzkaller0 entered promiscuous mode [ 1902.882398][ T1858] device sit0 left promiscuous mode [ 1902.931803][ T1858] device sit0 entered promiscuous mode [ 1903.568442][ T1876] device sit0 left promiscuous mode [ 1903.591709][ T1876] device sit0 entered promiscuous mode [ 1903.936724][ T1885] device sit0 left promiscuous mode [ 1904.014184][ T1885] device sit0 entered promiscuous mode [ 1905.529398][ T1909] device sit0 left promiscuous mode [ 1905.586870][ T1909] device sit0 entered promiscuous mode [ 1905.923332][ T1920] device sit0 left promiscuous mode [ 1906.189335][ T1920] device sit0 entered promiscuous mode [ 1907.683022][ T1957] device sit0 left promiscuous mode [ 1907.727395][ T1957] device sit0 entered promiscuous mode [ 1910.456817][ T2004] device sit0 left promiscuous mode [ 1910.478296][ T2004] device sit0 entered promiscuous mode [ 1911.440461][ T2024] device sit0 left promiscuous mode [ 1911.702865][ T2027] device sit0 entered promiscuous mode [ 1911.883534][ T2037] device sit0 left promiscuous mode [ 1911.956431][ T2041] device sit0 entered promiscuous mode [ 1912.318056][ T2048] device sit0 left promiscuous mode [ 1912.338652][ T2048] device sit0 entered promiscuous mode [ 1915.334144][ T2090] device sit0 left promiscuous mode [ 1915.359449][ T2092] device sit0 left promiscuous mode [ 1915.389040][ T2094] device sit0 entered promiscuous mode [ 1915.581809][ T2095] device sit0 entered promiscuous mode [ 1917.431808][ T2136] device sit0 left promiscuous mode [ 1917.670564][ T2140] device sit0 entered promiscuous mode [ 1920.144761][ T2179] device sit0 left promiscuous mode [ 1920.217093][ T2181] device sit0 entered promiscuous mode [ 1920.814200][ T2185] device sit0 left promiscuous mode [ 1920.831857][ T2185] device sit0 entered promiscuous mode [ 1921.662189][ T2209] device sit0 left promiscuous mode [ 1921.764485][ T2209] device sit0 entered promiscuous mode [ 1922.771579][ T2231] device sit0 left promiscuous mode [ 1922.818058][ T2231] device sit0 entered promiscuous mode [ 1923.262825][ T2240] device sit0 left promiscuous mode [ 1923.353161][ T2242] device sit0 entered promiscuous mode [ 1924.966895][ T2284] device sit0 left promiscuous mode [ 1925.083820][ T2285] device sit0 entered promiscuous mode [ 1925.382472][ T2288] device sit0 left promiscuous mode [ 1925.422229][ T2291] device sit0 entered promiscuous mode [ 1926.983447][ T2327] device sit0 left promiscuous mode [ 1927.021130][ T2328] device sit0 entered promiscuous mode [ 1927.554587][ T2332] device sit0 left promiscuous mode [ 1927.647637][ T2332] device sit0 entered promiscuous mode [ 1927.832459][ T2336] device sit0 left promiscuous mode [ 1927.859513][ T2340] device sit0 entered promiscuous mode [ 1928.841947][ T2360] device sit0 left promiscuous mode [ 1928.914255][ T2360] device sit0 entered promiscuous mode [ 1930.358239][ T2383] device sit0 left promiscuous mode [ 1930.374198][ T2383] device sit0 entered promiscuous mode [ 1934.883684][ T2478] device sit0 left promiscuous mode [ 1934.912830][ T2482] device sit0 entered promiscuous mode [ 1936.857580][ T2523] device syzkaller0 entered promiscuous mode [ 1937.568969][ T2539] device sit0 left promiscuous mode [ 1937.610899][ T2539] device sit0 entered promiscuous mode [ 1939.006860][ T2575] device syzkaller0 entered promiscuous mode [ 1940.071926][ T2605] device sit0 left promiscuous mode [ 1940.117319][ T2605] device sit0 entered promiscuous mode [ 1942.190256][ T2648] device sit0 left promiscuous mode [ 1942.455654][ T2648] device sit0 entered promiscuous mode [ 1943.453741][ T2683] device sit0 left promiscuous mode [ 1943.577803][ T2686] device sit0 entered promiscuous mode [ 1944.826138][ T2707] device sit0 left promiscuous mode [ 1944.947099][ T2707] device sit0 entered promiscuous mode [ 1945.724511][ T2720] device sit0 left promiscuous mode [ 1945.758539][ T2720] device sit0 entered promiscuous mode [ 1947.689512][ T2772] device sit0 left promiscuous mode [ 1947.764630][ T2772] device sit0 entered promiscuous mode [ 1948.272191][ T2783] device sit0 left promiscuous mode [ 1948.295617][ T2789] device sit0 entered promiscuous mode [ 1950.363211][ T2831] device sit0 left promiscuous mode [ 1950.623127][ T2831] device sit0 entered promiscuous mode [ 1952.384541][ T2875] device sit0 left promiscuous mode [ 1952.483013][ T2875] device sit0 entered promiscuous mode [ 1955.205087][ T2921] device sit0 left promiscuous mode [ 1955.237137][ T2923] device sit0 left promiscuous mode [ 1955.252919][ T2921] device sit0 entered promiscuous mode [ 1955.479009][ T2923] device sit0 entered promiscuous mode [ 1957.714577][ T2968] device sit0 left promiscuous mode [ 1957.730342][ T2969] device sit0 entered promiscuous mode [ 1960.187729][ T3017] device sit0 left promiscuous mode [ 1960.245541][ T3017] device sit0 entered promiscuous mode [ 1962.435875][ T3069] device sit0 left promiscuous mode [ 1962.489539][ T3069] device sit0 entered promiscuous mode [ 1965.231213][ T3118] device sit0 left promiscuous mode [ 1965.276650][ T3118] device sit0 entered promiscuous mode [ 1973.063455][ T3292] device sit0 left promiscuous mode [ 1973.092767][ T3292] device sit0 entered promiscuous mode [ 1973.864112][ T3311] device sit0 left promiscuous mode [ 1973.903446][ T3314] device sit0 entered promiscuous mode [ 1975.333376][ T3344] device sit0 left promiscuous mode [ 1975.378287][ T3344] device sit0 entered promiscuous mode [ 1975.704900][ T3350] device sit0 left promiscuous mode [ 1975.790232][ T3353] device sit0 entered promiscuous mode [ 1976.307956][ T3363] device sit0 left promiscuous mode [ 1976.338847][ T3367] device sit0 entered promiscuous mode [ 1976.616974][ T3380] device sit0 left promiscuous mode [ 1976.645585][ T3380] device sit0 entered promiscuous mode [ 1977.269394][ T3395] device sit0 left promiscuous mode [ 1977.360000][ T3399] device sit0 entered promiscuous mode [ 1977.603365][ T3403] device sit0 left promiscuous mode [ 1977.637234][ T3404] device sit0 entered promiscuous mode [ 1977.913031][ T3412] device sit0 left promiscuous mode [ 1977.929858][ T3414] device sit0 entered promiscuous mode [ 1978.278449][ T3423] device sit0 left promiscuous mode [ 1978.317064][ T3423] device sit0 entered promiscuous mode [ 1980.292915][ T3462] device sit0 left promiscuous mode [ 1980.311512][ T3463] device sit0 entered promiscuous mode [ 1980.585462][ T3472] device sit0 left promiscuous mode [ 1980.600804][ T3473] device sit0 entered promiscuous mode [ 1980.963921][ T3482] device sit0 left promiscuous mode [ 1981.007548][ T3485] device sit0 entered promiscuous mode [ 1982.830932][ T3515] device sit0 left promiscuous mode [ 1982.888521][ T3518] device sit0 left promiscuous mode [ 1982.911825][ T3515] device sit0 entered promiscuous mode [ 1983.245230][ T3518] device sit0 entered promiscuous mode [ 1983.294648][ T3522] device sit0 left promiscuous mode [ 1983.307533][ T3524] device sit0 entered promiscuous mode [ 1984.539321][ T3565] device sit0 left promiscuous mode [ 1984.595674][ T3565] device sit0 entered promiscuous mode [ 1985.900284][ T3592] device sit0 left promiscuous mode [ 1985.957935][ T3592] device sit0 entered promiscuous mode [ 1986.508673][ T3608] device sit0 left promiscuous mode [ 1986.549148][ T3608] device sit0 entered promiscuous mode [ 1987.957044][ T3640] device sit0 left promiscuous mode [ 1988.050879][ T3642] device sit0 left promiscuous mode [ 1988.077696][ T3645] device sit0 entered promiscuous mode [ 1988.307596][ T3646] device sit0 entered promiscuous mode [ 1988.480805][ T3657] device sit0 left promiscuous mode [ 1988.532498][ T3657] device sit0 entered promiscuous mode [ 1989.966014][ T3683] device sit0 left promiscuous mode [ 1990.029500][ T3683] device sit0 entered promiscuous mode [ 1993.169457][ T3743] device sit0 left promiscuous mode [ 1993.210297][ T3744] device sit0 entered promiscuous mode [ 1996.256052][ T3823] device sit0 left promiscuous mode [ 1996.279453][ T3821] device sit0 left promiscuous mode [ 1996.360292][ T3823] device sit0 entered promiscuous mode [ 1996.577349][ T3821] device sit0 entered promiscuous mode [ 2002.298756][ T3935] device sit0 left promiscuous mode [ 2002.394326][ T3935] device sit0 entered promiscuous mode [ 2002.713862][ T3943] device sit0 left promiscuous mode [ 2002.777920][ T3943] device sit0 entered promiscuous mode [ 2003.734834][ T3967] device sit0 left promiscuous mode [ 2004.010372][ T3967] device sit0 entered promiscuous mode [ 2004.474565][ T3977] device sit0 left promiscuous mode [ 2004.547695][ T3977] device sit0 entered promiscuous mode [ 2006.627774][ T4019] device sit0 left promiscuous mode [ 2006.717410][ T4020] device sit0 entered promiscuous mode [ 2007.091030][ T4029] device sit0 left promiscuous mode [ 2007.144398][ T4029] device sit0 entered promiscuous mode [ 2007.384965][ T4031] device sit0 left promiscuous mode [ 2007.399373][ T4032] device sit0 entered promiscuous mode [ 2009.095727][ T4080] device sit0 left promiscuous mode [ 2009.116598][ T4080] device sit0 entered promiscuous mode [ 2012.944397][ T4130] device sit0 left promiscuous mode [ 2013.026270][ T4133] device sit0 entered promiscuous mode [ 2013.804935][ T4152] device sit0 left promiscuous mode [ 2013.865113][ T4152] device sit0 entered promiscuous mode [ 2014.807709][ T4174] device sit0 left promiscuous mode [ 2014.855219][ T4174] device sit0 entered promiscuous mode [ 2015.734543][ T4196] device sit0 left promiscuous mode [ 2015.792736][ T4197] device sit0 entered promiscuous mode [ 2016.707551][ T4211] device sit0 left promiscuous mode [ 2016.728238][ T4211] device sit0 entered promiscuous mode [ 2016.975834][ T4221] device sit0 left promiscuous mode [ 2017.022008][ T4221] device sit0 entered promiscuous mode [ 2019.737529][ T4273] device sit0 left promiscuous mode [ 2019.789337][ T4273] device sit0 entered promiscuous mode [ 2021.603711][ T4299] device sit0 left promiscuous mode [ 2021.616065][ T4300] device sit0 entered promiscuous mode [ 2023.611021][ T4351] device sit0 left promiscuous mode [ 2023.638211][ T4351] device sit0 entered promiscuous mode [ 2026.802166][ T4430] device sit0 left promiscuous mode [ 2027.180098][ T4445] device sit0 entered promiscuous mode [ 2029.683207][ T4494] device sit0 left promiscuous mode [ 2029.717208][ T4497] device sit0 left promiscuous mode [ 2029.824743][ T4498] device sit0 entered promiscuous mode [ 2030.272863][ T4494] device sit0 entered promiscuous mode [ 2032.127239][ T4551] device sit0 left promiscuous mode [ 2032.247238][ T4553] device sit0 entered promiscuous mode [ 2034.599170][ T4595] device sit0 left promiscuous mode [ 2034.695664][ T4595] device sit0 entered promiscuous mode [ 2037.564333][ T4644] device sit0 left promiscuous mode [ 2037.888382][ T4644] device sit0 entered promiscuous mode [ 2039.959398][ T4692] device sit0 left promiscuous mode [ 2040.058177][ T4693] device sit0 entered promiscuous mode [ 2040.438967][ T4700] device sit0 left promiscuous mode [ 2040.469540][ T4701] device sit0 entered promiscuous mode [ 2053.621210][ T4937] device sit0 left promiscuous mode [ 2053.641398][ T4937] device sit0 entered promiscuous mode [ 2054.455857][ T4956] device sit0 left promiscuous mode [ 2054.506331][ T4956] device sit0 entered promiscuous mode [ 2056.271403][ T4986] device sit0 left promiscuous mode [ 2056.310209][ T4986] device sit0 entered promiscuous mode [ 2057.393699][ T5003] bridge0: port 1(bridge_slave_0) entered blocking state [ 2057.412552][ T5003] bridge0: port 1(bridge_slave_0) entered disabled state [ 2057.423679][ T5003] device bridge_slave_0 entered promiscuous mode [ 2057.452941][ T5003] bridge0: port 2(bridge_slave_1) entered blocking state [ 2057.460186][ T5003] bridge0: port 2(bridge_slave_1) entered disabled state [ 2057.468251][ T5003] device bridge_slave_1 entered promiscuous mode [ 2057.779186][ T5003] bridge0: port 2(bridge_slave_1) entered blocking state [ 2057.786250][ T5003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2057.793521][ T5003] bridge0: port 1(bridge_slave_0) entered blocking state [ 2057.800541][ T5003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2057.823668][ T357] device bridge_slave_1 left promiscuous mode [ 2057.829814][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 2057.844826][ T357] device bridge_slave_0 left promiscuous mode [ 2057.851035][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 2057.860211][ T357] device veth0_vlan left promiscuous mode [ 2057.973438][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 2057.981066][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 2058.020925][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2058.028680][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2058.043965][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2058.052539][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2058.061426][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 2058.068487][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2058.076238][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2058.084904][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2058.093227][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 2058.100267][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2058.113807][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2058.122057][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2058.130351][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2058.139027][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2058.151801][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2058.160323][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2058.172546][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2058.181056][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2058.191803][ T5003] device veth0_vlan entered promiscuous mode [ 2058.199288][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2058.208247][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2058.229517][ T5003] device veth1_macvtap entered promiscuous mode [ 2058.237604][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2058.246134][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2058.254442][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2058.268304][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2058.276759][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2058.288041][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2058.296610][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2060.559814][ T5061] device sit0 left promiscuous mode [ 2060.633739][ T5061] device sit0 entered promiscuous mode [ 2062.115671][ T5098] device sit0 left promiscuous mode [ 2062.166321][ T5102] device sit0 entered promiscuous mode [ 2067.204501][ T5190] device sit0 left promiscuous mode [ 2067.234042][ T5191] device sit0 entered promiscuous mode [ 2071.328540][ T5271] device sit0 entered promiscuous mode [ 2073.251244][ T1606] device bridge_slave_1 left promiscuous mode [ 2073.270160][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2073.292151][ T1606] device bridge_slave_0 left promiscuous mode [ 2073.307142][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2073.331842][ T1606] device veth0_vlan left promiscuous mode [ 2073.647150][ T5304] bridge0: port 1(bridge_slave_0) entered blocking state [ 2073.654269][ T5304] bridge0: port 1(bridge_slave_0) entered disabled state [ 2073.661804][ T5304] device bridge_slave_0 entered promiscuous mode [ 2073.669115][ T5304] bridge0: port 2(bridge_slave_1) entered blocking state [ 2073.680299][ T5304] bridge0: port 2(bridge_slave_1) entered disabled state [ 2073.687980][ T5304] device bridge_slave_1 entered promiscuous mode [ 2073.791988][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2073.819913][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2073.885774][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2073.903458][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2073.920528][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 2073.927649][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2073.953621][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2073.971095][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2073.993546][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 2074.000639][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2074.133646][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2074.143473][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2074.151732][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2074.160274][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2074.168692][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2074.235898][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2074.249479][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2074.270547][ T5304] device veth0_vlan entered promiscuous mode [ 2074.285068][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2074.293213][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2074.302457][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2074.310597][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2074.321866][ T5304] device veth1_macvtap entered promiscuous mode [ 2074.329452][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2074.338442][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2074.365365][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2074.373898][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2074.385533][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2074.394392][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2079.846350][ T5441] device sit0 entered promiscuous mode [ 2088.105694][ T5616] device sit0 left promiscuous mode [ 2088.167085][ T5616] device sit0 entered promiscuous mode [ 2096.206281][ T5746] device sit0 left promiscuous mode [ 2096.239827][ T5747] device sit0 entered promiscuous mode [ 2096.842506][ T5764] device sit0 left promiscuous mode [ 2096.989728][ T5764] device sit0 entered promiscuous mode [ 2098.068584][ T5796] device sit0 left promiscuous mode [ 2098.149519][ T5796] device sit0 entered promiscuous mode [ 2099.142142][ T5819] device sit0 left promiscuous mode [ 2099.202376][ T5819] device sit0 entered promiscuous mode [ 2100.764142][ T5847] device sit0 left promiscuous mode [ 2100.778680][ T5848] device sit0 left promiscuous mode [ 2100.800234][ T5847] device sit0 entered promiscuous mode [ 2101.044380][ T5848] device sit0 entered promiscuous mode [ 2101.391531][ T5863] device sit0 left promiscuous mode [ 2101.589851][ T5863] device sit0 entered promiscuous mode [ 2101.782477][ T5865] bridge0: port 1(bridge_slave_0) entered blocking state [ 2101.789718][ T5865] bridge0: port 1(bridge_slave_0) entered disabled state [ 2101.802093][ T5865] device bridge_slave_0 entered promiscuous mode [ 2101.810297][ T5865] bridge0: port 2(bridge_slave_1) entered blocking state [ 2101.817609][ T5865] bridge0: port 2(bridge_slave_1) entered disabled state [ 2101.826151][ T5865] device bridge_slave_1 entered promiscuous mode [ 2102.694023][ T5926] device bridge_slave_1 left promiscuous mode [ 2102.701725][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 2102.716950][ T5926] device bridge_slave_0 left promiscuous mode [ 2102.725137][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 2102.754037][ T5926] device veth1_macvtap left promiscuous mode [ 2102.761449][ T5926] device veth0_vlan left promiscuous mode [ 2103.226612][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2103.234258][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2103.241715][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2103.250285][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2103.258637][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 2103.265693][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2103.273621][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2103.281953][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2103.296089][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 2103.303247][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2103.312275][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2103.320417][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2103.328647][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2103.336838][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2103.345137][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2103.353509][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2103.361831][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2103.378273][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2103.386496][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2103.394978][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2103.402442][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2103.410385][ T5865] device veth0_vlan entered promiscuous mode [ 2103.440005][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2103.448798][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2103.459712][ T5865] device veth1_macvtap entered promiscuous mode [ 2103.551573][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2103.574015][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2103.583884][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2103.633823][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2103.649150][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2104.201825][ T5914] device sit0 left promiscuous mode [ 2104.361829][ T5915] device sit0 entered promiscuous mode [ 2104.482853][ T5921] device sit0 left promiscuous mode [ 2104.497933][ T5923] device sit0 entered promiscuous mode [ 2107.073649][ T5971] device sit0 left promiscuous mode [ 2107.085847][ T5974] device sit0 entered promiscuous mode [ 2107.419656][ T5978] device sit0 left promiscuous mode [ 2107.556884][ T5978] device sit0 entered promiscuous mode [ 2110.383115][ T6023] device sit0 left promiscuous mode [ 2110.506268][ T6024] device sit0 entered promiscuous mode [ 2111.644951][ T6047] device sit0 left promiscuous mode [ 2111.768449][ T6050] device sit0 entered promiscuous mode [ 2113.080810][ T6077] device sit0 left promiscuous mode [ 2113.223512][ T6077] device sit0 entered promiscuous mode [ 2114.537813][ T6097] device sit0 left promiscuous mode [ 2114.562843][ T6097] device sit0 entered promiscuous mode [ 2117.612166][ T6131] bridge0: port 1(bridge_slave_0) entered blocking state [ 2117.657589][ T6131] bridge0: port 1(bridge_slave_0) entered disabled state [ 2117.665419][ T6131] device bridge_slave_0 entered promiscuous mode [ 2117.682900][ T6131] bridge0: port 2(bridge_slave_1) entered blocking state [ 2117.717137][ T6131] bridge0: port 2(bridge_slave_1) entered disabled state [ 2117.732471][ T6131] device bridge_slave_1 entered promiscuous mode [ 2118.004055][ T5926] device bridge_slave_1 left promiscuous mode [ 2118.015036][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 2118.056838][ T5926] device bridge_slave_0 left promiscuous mode [ 2118.063113][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 2118.403377][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2118.411135][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2118.492808][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2118.510098][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2118.524534][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 2118.531734][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2118.541172][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2118.551709][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2118.567244][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 2118.574534][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2118.647099][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2118.658929][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2118.667464][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2118.683008][ T6131] device veth0_vlan entered promiscuous mode [ 2118.838857][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2118.848467][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2118.857029][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2118.864788][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2118.921307][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2118.930520][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2118.948341][ T6131] device veth1_macvtap entered promiscuous mode [ 2119.011914][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2119.030062][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2119.075321][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2119.130039][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2119.138757][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2119.329049][ T6183] device sit0 entered promiscuous mode [ 2126.871135][ T6324] device sit0 entered promiscuous mode [ 2131.056027][ T6393] device sit0 left promiscuous mode [ 2131.129419][ T6393] device sit0 entered promiscuous mode [ 2133.335134][ T6444] device sit0 left promiscuous mode [ 2133.476025][ T6444] device sit0 entered promiscuous mode [ 2184.331217][ T7266] FAULT_INJECTION: forcing a failure. [ 2184.331217][ T7266] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2184.430856][ T7266] CPU: 0 PID: 7266 Comm: syz.1.12330 Tainted: G W syzkaller #0 [ 2184.439940][ T7266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2184.450015][ T7266] Call Trace: [ 2184.453313][ T7266] [ 2184.456246][ T7266] __dump_stack+0x21/0x24 [ 2184.460588][ T7266] dump_stack_lvl+0xee/0x150 [ 2184.465187][ T7266] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2184.470216][ T7266] ? kasan_check_range+0x253/0x290 [ 2184.475345][ T7266] ? memcpy+0x56/0x70 [ 2184.479336][ T7266] dump_stack+0x15/0x24 [ 2184.483501][ T7266] should_fail_ex+0x3d4/0x520 [ 2184.488195][ T7266] should_fail+0xb/0x10 [ 2184.492371][ T7266] should_fail_usercopy+0x1a/0x20 [ 2184.497409][ T7266] strncpy_from_user+0x24/0x2d0 [ 2184.502265][ T7266] bpf_prog_load+0x1bb/0x15a0 [ 2184.506954][ T7266] ? map_freeze+0x390/0x390 [ 2184.511491][ T7266] ? security_bpf+0x8e/0xb0 [ 2184.516007][ T7266] ? security_bpf+0x93/0xb0 [ 2184.520539][ T7266] __sys_bpf+0x504/0x780 [ 2184.524795][ T7266] ? bpf_link_show_fdinfo+0x320/0x320 [ 2184.530180][ T7266] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 2184.536350][ T7266] __x64_sys_bpf+0x7c/0x90 [ 2184.540785][ T7266] x64_sys_call+0x488/0x9a0 [ 2184.545303][ T7266] do_syscall_64+0x4c/0xa0 [ 2184.549728][ T7266] ? clear_bhb_loop+0x30/0x80 [ 2184.554432][ T7266] ? clear_bhb_loop+0x30/0x80 [ 2184.559132][ T7266] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2184.565040][ T7266] RIP: 0033:0x7f4990d8f6c9 [ 2184.569465][ T7266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2184.589080][ T7266] RSP: 002b:00007f4991cca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2184.597507][ T7266] RAX: ffffffffffffffda RBX: 00007f4990fe5fa0 RCX: 00007f4990d8f6c9 [ 2184.605484][ T7266] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 2184.613450][ T7266] RBP: 00007f4991cca090 R08: 0000000000000000 R09: 0000000000000000 [ 2184.621411][ T7266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2184.629371][ T7266] R13: 00007f4990fe6038 R14: 00007f4990fe5fa0 R15: 00007ffc59bf13d8 [ 2184.637338][ T7266] [ 2185.015753][ T7274] FAULT_INJECTION: forcing a failure. [ 2185.015753][ T7274] name failslab, interval 1, probability 0, space 0, times 0 [ 2185.122735][ T7274] CPU: 0 PID: 7274 Comm: syz.4.12333 Tainted: G W syzkaller #0 [ 2185.131823][ T7274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2185.141878][ T7274] Call Trace: [ 2185.145153][ T7274] [ 2185.148075][ T7274] __dump_stack+0x21/0x24 [ 2185.152401][ T7274] dump_stack_lvl+0xee/0x150 [ 2185.156980][ T7274] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2185.161997][ T7274] ? security_file_alloc+0x33/0x130 [ 2185.167185][ T7274] ? kmem_cache_alloc+0x16e/0x330 [ 2185.172205][ T7274] ? security_file_alloc+0x33/0x130 [ 2185.177403][ T7274] dump_stack+0x15/0x24 [ 2185.181557][ T7274] should_fail_ex+0x3d4/0x520 [ 2185.186233][ T7274] __should_failslab+0xac/0xf0 [ 2185.190989][ T7274] ? bpf_trampoline_update+0x7d/0x13f0 [ 2185.196438][ T7274] should_failslab+0x9/0x20 [ 2185.200929][ T7274] __kmem_cache_alloc_node+0x3d/0x2c0 [ 2185.206297][ T7274] ? bpf_trampoline_update+0x7d/0x13f0 [ 2185.211753][ T7274] kmalloc_trace+0x29/0xb0 [ 2185.216163][ T7274] bpf_trampoline_update+0x7d/0x13f0 [ 2185.221458][ T7274] bpf_trampoline_link_prog+0x4f8/0x6f0 [ 2185.227010][ T7274] bpf_tracing_prog_attach+0x833/0xfa0 [ 2185.232465][ T7274] ? bpf_raw_tp_link_attach+0x550/0x550 [ 2185.238008][ T7274] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 2185.243819][ T7274] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 2185.249977][ T7274] bpf_raw_tp_link_attach+0x3a5/0x550 [ 2185.255345][ T7274] ? bpf_insn_prepare_dump+0x840/0x840 [ 2185.260804][ T7274] ? __kasan_check_write+0x14/0x20 [ 2185.265912][ T7274] bpf_raw_tracepoint_open+0x258/0x480 [ 2185.271364][ T7274] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 2185.277517][ T7274] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 2185.283230][ T7274] ? __sys_bpf+0x4c9/0x780 [ 2185.287642][ T7274] __sys_bpf+0x4d1/0x780 [ 2185.291873][ T7274] ? bpf_link_show_fdinfo+0x320/0x320 [ 2185.297234][ T7274] ? __cfi_sched_clock_cpu+0x10/0x10 [ 2185.302516][ T7274] __x64_sys_bpf+0x7c/0x90 [ 2185.306931][ T7274] x64_sys_call+0x488/0x9a0 [ 2185.311428][ T7274] do_syscall_64+0x4c/0xa0 [ 2185.315849][ T7274] ? clear_bhb_loop+0x30/0x80 [ 2185.320518][ T7274] ? clear_bhb_loop+0x30/0x80 [ 2185.325187][ T7274] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2185.331072][ T7274] RIP: 0033:0x7f8f56d8f6c9 [ 2185.335477][ T7274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2185.355072][ T7274] RSP: 002b:00007f8f57bba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2185.363476][ T7274] RAX: ffffffffffffffda RBX: 00007f8f56fe5fa0 RCX: 00007f8f56d8f6c9 [ 2185.371439][ T7274] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 2185.379401][ T7274] RBP: 00007f8f57bba090 R08: 0000000000000000 R09: 0000000000000000 [ 2185.387362][ T7274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2185.395323][ T7274] R13: 00007f8f56fe6038 R14: 00007f8f56fe5fa0 R15: 00007ffd4a227bf8 [ 2185.403292][ T7274] [ 2189.032243][ T7342] FAULT_INJECTION: forcing a failure. [ 2189.032243][ T7342] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2189.151057][ T7342] CPU: 0 PID: 7342 Comm: syz.4.12354 Tainted: G W syzkaller #0 [ 2189.160051][ T7342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2189.170121][ T7342] Call Trace: [ 2189.173414][ T7342] [ 2189.176353][ T7342] __dump_stack+0x21/0x24 [ 2189.180694][ T7342] dump_stack_lvl+0xee/0x150 [ 2189.185291][ T7342] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2189.190326][ T7342] dump_stack+0x15/0x24 [ 2189.194490][ T7342] should_fail_ex+0x3d4/0x520 [ 2189.199187][ T7342] should_fail_alloc_page+0x61/0x90 [ 2189.204407][ T7342] prepare_alloc_pages+0x148/0x5f0 [ 2189.209543][ T7342] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 2189.214759][ T7342] ? slab_post_alloc_hook+0x4f/0x2d0 [ 2189.220049][ T7342] ? kmem_cache_alloc_node+0x181/0x340 [ 2189.225531][ T7342] ? alloc_vmap_area+0x17b/0x1870 [ 2189.230567][ T7342] ? __get_vm_area_node+0x160/0x360 [ 2189.235775][ T7342] ? __vmalloc_node_range+0x326/0x13d0 [ 2189.241244][ T7342] ? prealloc_init+0x146/0x8f0 [ 2189.246029][ T7342] __alloc_pages+0x124/0x450 [ 2189.250638][ T7342] ? __cfi___alloc_pages+0x10/0x10 [ 2189.255767][ T7342] __get_free_pages+0xe/0x30 [ 2189.260369][ T7342] kasan_populate_vmalloc_pte+0x29/0x120 [ 2189.266015][ T7342] __apply_to_page_range+0x8de/0xc80 [ 2189.271316][ T7342] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 2189.277574][ T7342] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 2189.283828][ T7342] apply_to_page_range+0x3b/0x50 [ 2189.288787][ T7342] kasan_populate_vmalloc+0x60/0x70 [ 2189.293992][ T7342] alloc_vmap_area+0x173e/0x1870 [ 2189.298940][ T7342] ? asm_sysvec_call_function_single+0x1b/0x20 [ 2189.305104][ T7342] ? vm_map_ram+0x930/0x930 [ 2189.309617][ T7342] ? alloc_vmap_area+0x1/0x1870 [ 2189.314469][ T7342] __get_vm_area_node+0x160/0x360 [ 2189.319483][ T7342] __vmalloc_node_range+0x326/0x13d0 [ 2189.324753][ T7342] ? prealloc_init+0x146/0x8f0 [ 2189.329524][ T7342] ? pcpu_memcg_post_alloc_hook+0x177/0x270 [ 2189.335407][ T7342] ? __bitmap_weight+0xb3/0x100 [ 2189.340263][ T7342] ? __cfi___vmalloc_node_range+0x10/0x10 [ 2189.345969][ T7342] ? __alloc_percpu_gfp+0x25/0x30 [ 2189.350985][ T7342] ? pcpu_alloc+0x1108/0x16b0 [ 2189.355650][ T7342] bpf_map_area_alloc+0xd7/0xe0 [ 2189.360492][ T7342] ? prealloc_init+0x146/0x8f0 [ 2189.365249][ T7342] prealloc_init+0x146/0x8f0 [ 2189.369836][ T7342] htab_map_alloc+0xb24/0xfd0 [ 2189.374506][ T7342] map_create+0x49c/0xd80 [ 2189.378828][ T7342] __sys_bpf+0x30b/0x780 [ 2189.383070][ T7342] ? bpf_link_show_fdinfo+0x320/0x320 [ 2189.388440][ T7342] ? __cfi_ksys_write+0x10/0x10 [ 2189.393282][ T7342] ? debug_smp_processor_id+0x17/0x20 [ 2189.398654][ T7342] __x64_sys_bpf+0x7c/0x90 [ 2189.403073][ T7342] x64_sys_call+0x488/0x9a0 [ 2189.407571][ T7342] do_syscall_64+0x4c/0xa0 [ 2189.411987][ T7342] ? clear_bhb_loop+0x30/0x80 [ 2189.416662][ T7342] ? clear_bhb_loop+0x30/0x80 [ 2189.421348][ T7342] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2189.427255][ T7342] RIP: 0033:0x7f8f56d8f6c9 [ 2189.431661][ T7342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2189.451252][ T7342] RSP: 002b:00007f8f57bba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2189.459651][ T7342] RAX: ffffffffffffffda RBX: 00007f8f56fe5fa0 RCX: 00007f8f56d8f6c9 [ 2189.467613][ T7342] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 2189.475590][ T7342] RBP: 00007f8f57bba090 R08: 0000000000000000 R09: 0000000000000000 [ 2189.483550][ T7342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2189.491509][ T7342] R13: 00007f8f56fe6038 R14: 00007f8f56fe5fa0 R15: 00007ffd4a227bf8 [ 2189.499477][ T7342] [ 2190.320996][ T7370] FAULT_INJECTION: forcing a failure. [ 2190.320996][ T7370] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2190.335767][ T7370] CPU: 0 PID: 7370 Comm: syz.0.12363 Tainted: G W syzkaller #0 [ 2190.344732][ T7370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2190.354795][ T7370] Call Trace: [ 2190.358077][ T7370] [ 2190.361012][ T7370] __dump_stack+0x21/0x24 [ 2190.365350][ T7370] dump_stack_lvl+0xee/0x150 [ 2190.369948][ T7370] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2190.374984][ T7370] dump_stack+0x15/0x24 [ 2190.379173][ T7370] should_fail_ex+0x3d4/0x520 [ 2190.383867][ T7370] should_fail_alloc_page+0x61/0x90 [ 2190.389081][ T7370] prepare_alloc_pages+0x148/0x5f0 [ 2190.394206][ T7370] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 2190.399421][ T7370] __alloc_pages+0x124/0x450 [ 2190.404037][ T7370] ? __cfi___alloc_pages+0x10/0x10 [ 2190.409169][ T7370] ? __schedule+0xb8f/0x14e0 [ 2190.413770][ T7370] __get_free_pages+0xe/0x30 [ 2190.418371][ T7370] kasan_populate_vmalloc_pte+0x29/0x120 [ 2190.424014][ T7370] __apply_to_page_range+0x8de/0xc80 [ 2190.429313][ T7370] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 2190.435567][ T7370] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 2190.441819][ T7370] apply_to_page_range+0x3b/0x50 [ 2190.446772][ T7370] kasan_populate_vmalloc+0x60/0x70 [ 2190.451982][ T7370] alloc_vmap_area+0x173e/0x1870 [ 2190.456935][ T7370] ? vm_map_ram+0x930/0x930 [ 2190.461445][ T7370] ? __kasan_kmalloc+0x95/0xb0 [ 2190.466215][ T7370] ? kmalloc_node_trace+0x3d/0xb0 [ 2190.471229][ T7370] __get_vm_area_node+0x160/0x360 [ 2190.476241][ T7370] __vmalloc_node_range+0x326/0x13d0 [ 2190.481517][ T7370] ? prealloc_init+0x146/0x8f0 [ 2190.486278][ T7370] ? pcpu_memcg_post_alloc_hook+0x177/0x270 [ 2190.492168][ T7370] ? __alloc_percpu_gfp+0x25/0x30 [ 2190.497187][ T7370] ? __cfi___vmalloc_node_range+0x10/0x10 [ 2190.502904][ T7370] ? __alloc_percpu_gfp+0x25/0x30 [ 2190.507930][ T7370] ? pcpu_alloc+0x1108/0x16b0 [ 2190.512603][ T7370] bpf_map_area_alloc+0xd7/0xe0 [ 2190.517448][ T7370] ? prealloc_init+0x146/0x8f0 [ 2190.522209][ T7370] prealloc_init+0x146/0x8f0 [ 2190.526796][ T7370] htab_map_alloc+0xb24/0xfd0 [ 2190.531467][ T7370] map_create+0x49c/0xd80 [ 2190.535789][ T7370] __sys_bpf+0x30b/0x780 [ 2190.540020][ T7370] ? bpf_link_show_fdinfo+0x320/0x320 [ 2190.545386][ T7370] ? __cfi_ksys_write+0x10/0x10 [ 2190.550232][ T7370] ? debug_smp_processor_id+0x17/0x20 [ 2190.555592][ T7370] __x64_sys_bpf+0x7c/0x90 [ 2190.560005][ T7370] x64_sys_call+0x488/0x9a0 [ 2190.564503][ T7370] do_syscall_64+0x4c/0xa0 [ 2190.568908][ T7370] ? clear_bhb_loop+0x30/0x80 [ 2190.573577][ T7370] ? clear_bhb_loop+0x30/0x80 [ 2190.578252][ T7370] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2190.584144][ T7370] RIP: 0033:0x7f474db8f6c9 [ 2190.588553][ T7370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2190.608152][ T7370] RSP: 002b:00007f474ea21038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2190.616561][ T7370] RAX: ffffffffffffffda RBX: 00007f474dde5fa0 RCX: 00007f474db8f6c9 [ 2190.624528][ T7370] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 2190.632489][ T7370] RBP: 00007f474ea21090 R08: 0000000000000000 R09: 0000000000000000 [ 2190.640451][ T7370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2190.648412][ T7370] R13: 00007f474dde6038 R14: 00007f474dde5fa0 R15: 00007ffdc6a41db8 [ 2190.656385][ T7370] [ 2192.505040][ T7438] device sit0 left promiscuous mode [ 2192.726785][ T7438] device sit0 entered promiscuous mode [ 2193.470703][ T7455] device syzkaller0 entered promiscuous mode [ 2193.667222][ T7462] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 2193.673433][ T7462] syzkaller0: linktype set to 776 [ 2193.795517][ T7476] FAULT_INJECTION: forcing a failure. [ 2193.795517][ T7476] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2193.861281][ T7476] CPU: 0 PID: 7476 Comm: syz.2.12405 Tainted: G W syzkaller #0 [ 2193.870270][ T7476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2193.880333][ T7476] Call Trace: [ 2193.883608][ T7476] [ 2193.886532][ T7476] __dump_stack+0x21/0x24 [ 2193.890881][ T7476] dump_stack_lvl+0xee/0x150 [ 2193.895463][ T7476] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2193.900476][ T7476] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 2193.906627][ T7476] dump_stack+0x15/0x24 [ 2193.910777][ T7476] should_fail_ex+0x3d4/0x520 [ 2193.915451][ T7476] should_fail+0xb/0x10 [ 2193.919602][ T7476] should_fail_usercopy+0x1a/0x20 [ 2193.924626][ T7476] _copy_from_user+0x1e/0xc0 [ 2193.929221][ T7476] __sys_bpf+0x277/0x780 [ 2193.933941][ T7476] ? bpf_link_show_fdinfo+0x320/0x320 [ 2193.939323][ T7476] ? __cfi_sched_clock_cpu+0x10/0x10 [ 2193.944619][ T7476] __x64_sys_bpf+0x7c/0x90 [ 2193.949041][ T7476] x64_sys_call+0x488/0x9a0 [ 2193.953535][ T7476] do_syscall_64+0x4c/0xa0 [ 2193.957948][ T7476] ? clear_bhb_loop+0x30/0x80 [ 2193.962630][ T7476] ? clear_bhb_loop+0x30/0x80 [ 2193.967307][ T7476] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2193.973197][ T7476] RIP: 0033:0x7f691638f6c9 [ 2193.977619][ T7476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2193.997218][ T7476] RSP: 002b:00007f69172fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2194.005625][ T7476] RAX: ffffffffffffffda RBX: 00007f69165e5fa0 RCX: 00007f691638f6c9 [ 2194.013594][ T7476] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 2194.021563][ T7476] RBP: 00007f69172fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2194.029530][ T7476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2194.037493][ T7476] R13: 00007f69165e6038 R14: 00007f69165e5fa0 R15: 00007ffe1ebbb738 [ 2194.045463][ T7476] [ 2198.953601][ T7559] FAULT_INJECTION: forcing a failure. [ 2198.953601][ T7559] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2198.986656][ T7559] CPU: 1 PID: 7559 Comm: syz.1.12422 Tainted: G W syzkaller #0 [ 2198.995648][ T7559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2199.005711][ T7559] Call Trace: [ 2199.009003][ T7559] [ 2199.011937][ T7559] __dump_stack+0x21/0x24 [ 2199.016280][ T7559] dump_stack_lvl+0xee/0x150 [ 2199.020879][ T7559] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2199.025913][ T7559] dump_stack+0x15/0x24 [ 2199.030078][ T7559] should_fail_ex+0x3d4/0x520 [ 2199.034771][ T7559] should_fail+0xb/0x10 [ 2199.038941][ T7559] should_fail_usercopy+0x1a/0x20 [ 2199.043979][ T7559] _copy_to_user+0x1e/0x90 [ 2199.048414][ T7559] simple_read_from_buffer+0xe9/0x160 [ 2199.053796][ T7559] proc_fail_nth_read+0x19a/0x210 [ 2199.058829][ T7559] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2199.064384][ T7559] ? security_file_permission+0x94/0xb0 [ 2199.069943][ T7559] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2199.075498][ T7559] vfs_read+0x26e/0x8c0 [ 2199.079673][ T7559] ? __cfi_vfs_read+0x10/0x10 [ 2199.084373][ T7559] ? __kasan_check_write+0x14/0x20 [ 2199.089495][ T7559] ? mutex_lock+0x8d/0x1a0 [ 2199.093926][ T7559] ? __cfi_mutex_lock+0x10/0x10 [ 2199.098806][ T7559] ? __fdget_pos+0x2cd/0x380 [ 2199.103401][ T7559] ? ksys_read+0x71/0x240 [ 2199.107753][ T7559] ksys_read+0x140/0x240 [ 2199.112013][ T7559] ? __cfi_ksys_read+0x10/0x10 [ 2199.116791][ T7559] ? debug_smp_processor_id+0x17/0x20 [ 2199.122169][ T7559] __x64_sys_read+0x7b/0x90 [ 2199.126674][ T7559] x64_sys_call+0x2f/0x9a0 [ 2199.131115][ T7559] do_syscall_64+0x4c/0xa0 [ 2199.135542][ T7559] ? clear_bhb_loop+0x30/0x80 [ 2199.140243][ T7559] ? clear_bhb_loop+0x30/0x80 [ 2199.144938][ T7559] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2199.150864][ T7559] RIP: 0033:0x7f4990d8e0dc [ 2199.155286][ T7559] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2199.174902][ T7559] RSP: 002b:00007f4991cca030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2199.183333][ T7559] RAX: ffffffffffffffda RBX: 00007f4990fe5fa0 RCX: 00007f4990d8e0dc [ 2199.191314][ T7559] RDX: 000000000000000f RSI: 00007f4991cca0a0 RDI: 0000000000000007 [ 2199.199298][ T7559] RBP: 00007f4991cca090 R08: 0000000000000000 R09: 0000000000000000 [ 2199.207277][ T7559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2199.215258][ T7559] R13: 00007f4990fe6038 R14: 00007f4990fe5fa0 R15: 00007ffc59bf13d8 [ 2199.223248][ T7559] [ 2199.341789][ T7568] FAULT_INJECTION: forcing a failure. [ 2199.341789][ T7568] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2199.355303][ T7568] CPU: 1 PID: 7568 Comm: syz.2.12425 Tainted: G W syzkaller #0 [ 2199.364261][ T7568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2199.374332][ T7568] Call Trace: [ 2199.377628][ T7568] [ 2199.380573][ T7568] __dump_stack+0x21/0x24 [ 2199.384916][ T7568] dump_stack_lvl+0xee/0x150 [ 2199.389514][ T7568] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2199.394562][ T7568] ? has_cap_mac_admin+0x330/0x330 [ 2199.399694][ T7568] dump_stack+0x15/0x24 [ 2199.403863][ T7568] should_fail_ex+0x3d4/0x520 [ 2199.408562][ T7568] should_fail+0xb/0x10 [ 2199.412754][ T7568] should_fail_usercopy+0x1a/0x20 [ 2199.417800][ T7568] _copy_from_user+0x1e/0xc0 [ 2199.422410][ T7568] get_user_ifreq+0x6c/0x180 [ 2199.427013][ T7568] sock_ioctl+0x630/0x6e0 [ 2199.431357][ T7568] ? __cfi_sock_ioctl+0x10/0x10 [ 2199.436231][ T7568] ? security_file_ioctl+0x95/0xc0 [ 2199.441374][ T7568] ? __cfi_sock_ioctl+0x10/0x10 [ 2199.446234][ T7568] __se_sys_ioctl+0x12f/0x1b0 [ 2199.450918][ T7568] __x64_sys_ioctl+0x7b/0x90 [ 2199.455512][ T7568] x64_sys_call+0x58b/0x9a0 [ 2199.460023][ T7568] do_syscall_64+0x4c/0xa0 [ 2199.464452][ T7568] ? clear_bhb_loop+0x30/0x80 [ 2199.469153][ T7568] ? clear_bhb_loop+0x30/0x80 [ 2199.473850][ T7568] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2199.479762][ T7568] RIP: 0033:0x7f691638f6c9 [ 2199.484184][ T7568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2199.503803][ T7568] RSP: 002b:00007f69172fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2199.512231][ T7568] RAX: ffffffffffffffda RBX: 00007f69165e5fa0 RCX: 00007f691638f6c9 [ 2199.520213][ T7568] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000006 [ 2199.528193][ T7568] RBP: 00007f69172fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2199.536182][ T7568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2199.544165][ T7568] R13: 00007f69165e6038 R14: 00007f69165e5fa0 R15: 00007ffe1ebbb738 [ 2199.552155][ T7568] [ 2200.919660][ T7585] device syzkaller0 entered promiscuous mode [ 2200.947622][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 2201.019683][ T7602] device pim6reg1 entered promiscuous mode [ 2201.799051][ T7631] FAULT_INJECTION: forcing a failure. [ 2201.799051][ T7631] name failslab, interval 1, probability 0, space 0, times 0 [ 2201.903039][ T7631] CPU: 1 PID: 7631 Comm: syz.3.12446 Tainted: G W syzkaller #0 [ 2201.912110][ T7631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2201.922180][ T7631] Call Trace: [ 2201.925460][ T7631] [ 2201.928400][ T7631] __dump_stack+0x21/0x24 [ 2201.932743][ T7631] dump_stack_lvl+0xee/0x150 [ 2201.937343][ T7631] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2201.942380][ T7631] dump_stack+0x15/0x24 [ 2201.946629][ T7631] should_fail_ex+0x3d4/0x520 [ 2201.951317][ T7631] ? security_file_alloc+0x33/0x130 [ 2201.956531][ T7631] __should_failslab+0xac/0xf0 [ 2201.961313][ T7631] should_failslab+0x9/0x20 [ 2201.965824][ T7631] kmem_cache_alloc+0x3b/0x330 [ 2201.970606][ T7631] ? __alloc_file+0x28/0x2a0 [ 2201.975206][ T7631] security_file_alloc+0x33/0x130 [ 2201.980245][ T7631] __alloc_file+0xb5/0x2a0 [ 2201.984672][ T7631] alloc_empty_file+0x97/0x180 [ 2201.989445][ T7631] alloc_file+0x59/0x640 [ 2201.993699][ T7631] alloc_file_pseudo+0x17a/0x1f0 [ 2201.998650][ T7631] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 2202.004119][ T7631] ? alloc_perf_context+0x222/0x2e0 [ 2202.009332][ T7631] anon_inode_getfile+0xa6/0x180 [ 2202.014280][ T7631] __se_sys_perf_event_open+0xbd2/0x1b80 [ 2202.019933][ T7631] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 2202.025581][ T7631] ? __cfi_ksys_write+0x10/0x10 [ 2202.030441][ T7631] __x64_sys_perf_event_open+0xbf/0xd0 [ 2202.035916][ T7631] x64_sys_call+0x385/0x9a0 [ 2202.040432][ T7631] do_syscall_64+0x4c/0xa0 [ 2202.044853][ T7631] ? clear_bhb_loop+0x30/0x80 [ 2202.049545][ T7631] ? clear_bhb_loop+0x30/0x80 [ 2202.054236][ T7631] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2202.060151][ T7631] RIP: 0033:0x7fd0c1b8f6c9 [ 2202.064570][ T7631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2202.084188][ T7631] RSP: 002b:00007fd0c29a2038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2202.092612][ T7631] RAX: ffffffffffffffda RBX: 00007fd0c1de5fa0 RCX: 00007fd0c1b8f6c9 [ 2202.100589][ T7631] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000100 [ 2202.108571][ T7631] RBP: 00007fd0c29a2090 R08: 0000000000000000 R09: 0000000000000000 [ 2202.116558][ T7631] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2202.124535][ T7631] R13: 00007fd0c1de6038 R14: 00007fd0c1de5fa0 R15: 00007ffe4de3f878 [ 2202.132522][ T7631] [ 2202.834545][ T7682] bridge0: port 2(bridge_slave_1) entered disabled state [ 2202.841857][ T7682] bridge0: port 1(bridge_slave_0) entered disabled state [ 2202.981994][ T7673] device bridge_slave_1 left promiscuous mode [ 2203.000610][ T7673] bridge0: port 2(bridge_slave_1) entered disabled state [ 2203.049113][ T7673] device bridge_slave_0 left promiscuous mode [ 2203.082910][ T7673] bridge0: port 1(bridge_slave_0) entered disabled state [ 2204.934506][ T7755] syz.4.12490[7755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2204.934570][ T7755] syz.4.12490[7755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2206.525510][ T7816] FAULT_INJECTION: forcing a failure. [ 2206.525510][ T7816] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2206.623044][ T7816] CPU: 0 PID: 7816 Comm: syz.1.12507 Tainted: G W syzkaller #0 [ 2206.632028][ T7816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2206.642096][ T7816] Call Trace: [ 2206.645380][ T7816] [ 2206.648315][ T7816] __dump_stack+0x21/0x24 [ 2206.652660][ T7816] dump_stack_lvl+0xee/0x150 [ 2206.657254][ T7816] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2206.662289][ T7816] dump_stack+0x15/0x24 [ 2206.666465][ T7816] should_fail_ex+0x3d4/0x520 [ 2206.671159][ T7816] should_fail+0xb/0x10 [ 2206.675321][ T7816] should_fail_usercopy+0x1a/0x20 [ 2206.680356][ T7816] _copy_from_user+0x1e/0xc0 [ 2206.684956][ T7816] bpf_prog_test_run_skb+0x286/0x1290 [ 2206.690340][ T7816] ? __fget_files+0x2d5/0x330 [ 2206.695023][ T7816] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 2206.700845][ T7816] bpf_prog_test_run+0x3e3/0x630 [ 2206.705786][ T7816] ? slab_free_freelist_hook+0xc2/0x190 [ 2206.711343][ T7816] ? bpf_prog_query+0x270/0x270 [ 2206.716197][ T7816] ? selinux_bpf+0xce/0xf0 [ 2206.720637][ T7816] ? security_bpf+0x93/0xb0 [ 2206.725157][ T7816] __sys_bpf+0x56d/0x780 [ 2206.729413][ T7816] ? bpf_link_show_fdinfo+0x320/0x320 [ 2206.734803][ T7816] ? __cfi_ksys_write+0x10/0x10 [ 2206.739651][ T7816] ? debug_smp_processor_id+0x17/0x20 [ 2206.745018][ T7816] __x64_sys_bpf+0x7c/0x90 [ 2206.749439][ T7816] x64_sys_call+0x488/0x9a0 [ 2206.753939][ T7816] do_syscall_64+0x4c/0xa0 [ 2206.758353][ T7816] ? clear_bhb_loop+0x30/0x80 [ 2206.763037][ T7816] ? clear_bhb_loop+0x30/0x80 [ 2206.767719][ T7816] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2206.773616][ T7816] RIP: 0033:0x7f4990d8f6c9 [ 2206.778035][ T7816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2206.797643][ T7816] RSP: 002b:00007f4991ca9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2206.806050][ T7816] RAX: ffffffffffffffda RBX: 00007f4990fe6090 RCX: 00007f4990d8f6c9 [ 2206.814014][ T7816] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 2206.821983][ T7816] RBP: 00007f4991ca9090 R08: 0000000000000000 R09: 0000000000000000 [ 2206.829954][ T7816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2206.837926][ T7816] R13: 00007f4990fe6128 R14: 00007f4990fe6090 R15: 00007ffc59bf13d8 [ 2206.845911][ T7816] [ 2207.203960][ T7830] FAULT_INJECTION: forcing a failure. [ 2207.203960][ T7830] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2207.222342][ T7830] CPU: 1 PID: 7830 Comm: syz.0.12512 Tainted: G W syzkaller #0 [ 2207.231304][ T7830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2207.241361][ T7830] Call Trace: [ 2207.244634][ T7830] [ 2207.247574][ T7830] __dump_stack+0x21/0x24 [ 2207.251932][ T7830] dump_stack_lvl+0xee/0x150 [ 2207.256533][ T7830] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2207.261559][ T7830] dump_stack+0x15/0x24 [ 2207.265713][ T7830] should_fail_ex+0x3d4/0x520 [ 2207.270388][ T7830] should_fail+0xb/0x10 [ 2207.274541][ T7830] should_fail_usercopy+0x1a/0x20 [ 2207.279565][ T7830] _copy_from_user+0x1e/0xc0 [ 2207.284153][ T7830] bpf_prog_test_run_skb+0x286/0x1290 [ 2207.289530][ T7830] ? __fget_files+0x2d5/0x330 [ 2207.294198][ T7830] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 2207.300007][ T7830] bpf_prog_test_run+0x3e3/0x630 [ 2207.304939][ T7830] ? slab_free_freelist_hook+0xc2/0x190 [ 2207.310480][ T7830] ? bpf_prog_query+0x270/0x270 [ 2207.315318][ T7830] ? selinux_bpf+0xce/0xf0 [ 2207.319724][ T7830] ? security_bpf+0x93/0xb0 [ 2207.324220][ T7830] __sys_bpf+0x56d/0x780 [ 2207.328456][ T7830] ? bpf_link_show_fdinfo+0x320/0x320 [ 2207.333824][ T7830] ? __cfi_ksys_write+0x10/0x10 [ 2207.338669][ T7830] ? debug_smp_processor_id+0x17/0x20 [ 2207.344033][ T7830] __x64_sys_bpf+0x7c/0x90 [ 2207.348464][ T7830] x64_sys_call+0x488/0x9a0 [ 2207.352985][ T7830] do_syscall_64+0x4c/0xa0 [ 2207.357393][ T7830] ? clear_bhb_loop+0x30/0x80 [ 2207.362063][ T7830] ? clear_bhb_loop+0x30/0x80 [ 2207.366737][ T7830] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2207.372622][ T7830] RIP: 0033:0x7f474db8f6c9 [ 2207.377030][ T7830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2207.396628][ T7830] RSP: 002b:00007f474ea21038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2207.405033][ T7830] RAX: ffffffffffffffda RBX: 00007f474dde5fa0 RCX: 00007f474db8f6c9 [ 2207.412995][ T7830] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 2207.420954][ T7830] RBP: 00007f474ea21090 R08: 0000000000000000 R09: 0000000000000000 [ 2207.428925][ T7830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2207.436890][ T7830] R13: 00007f474dde6038 R14: 00007f474dde5fa0 R15: 00007ffdc6a41db8 [ 2207.444857][ T7830] [ 2207.907652][ T7836] device syzkaller0 entered promiscuous mode [ 2207.935018][ T7843] device pim6reg1 entered promiscuous mode [ 2208.144399][ T7848] device pim6reg1 entered promiscuous mode [ 2208.565023][ T7857] FAULT_INJECTION: forcing a failure. [ 2208.565023][ T7857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2208.583166][ T7857] CPU: 0 PID: 7857 Comm: syz.0.12521 Tainted: G W syzkaller #0 [ 2208.592131][ T7857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2208.602190][ T7857] Call Trace: [ 2208.605462][ T7857] [ 2208.608379][ T7857] __dump_stack+0x21/0x24 [ 2208.612697][ T7857] dump_stack_lvl+0xee/0x150 [ 2208.617278][ T7857] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2208.622286][ T7857] dump_stack+0x15/0x24 [ 2208.626434][ T7857] should_fail_ex+0x3d4/0x520 [ 2208.631112][ T7857] should_fail+0xb/0x10 [ 2208.635257][ T7857] should_fail_usercopy+0x1a/0x20 [ 2208.640274][ T7857] _copy_to_user+0x1e/0x90 [ 2208.644686][ T7857] simple_read_from_buffer+0xe9/0x160 [ 2208.650046][ T7857] proc_fail_nth_read+0x19a/0x210 [ 2208.655070][ T7857] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2208.660602][ T7857] ? security_file_permission+0x94/0xb0 [ 2208.666152][ T7857] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2208.671687][ T7857] vfs_read+0x26e/0x8c0 [ 2208.675842][ T7857] ? __cfi_vfs_read+0x10/0x10 [ 2208.680515][ T7857] ? __kasan_check_write+0x14/0x20 [ 2208.685618][ T7857] ? mutex_lock+0x8d/0x1a0 [ 2208.690028][ T7857] ? __cfi_mutex_lock+0x10/0x10 [ 2208.694874][ T7857] ? __fdget_pos+0x2cd/0x380 [ 2208.699454][ T7857] ? ksys_read+0x71/0x240 [ 2208.703788][ T7857] ksys_read+0x140/0x240 [ 2208.708041][ T7857] ? __cfi_ksys_read+0x10/0x10 [ 2208.712804][ T7857] ? fpregs_restore_userregs+0x128/0x260 [ 2208.718431][ T7857] __x64_sys_read+0x7b/0x90 [ 2208.722928][ T7857] x64_sys_call+0x2f/0x9a0 [ 2208.727337][ T7857] do_syscall_64+0x4c/0xa0 [ 2208.731743][ T7857] ? clear_bhb_loop+0x30/0x80 [ 2208.736415][ T7857] ? clear_bhb_loop+0x30/0x80 [ 2208.741085][ T7857] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2208.746972][ T7857] RIP: 0033:0x7f474db8e0dc [ 2208.751375][ T7857] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2208.770970][ T7857] RSP: 002b:00007f474ea21030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2208.779374][ T7857] RAX: ffffffffffffffda RBX: 00007f474dde5fa0 RCX: 00007f474db8e0dc [ 2208.787336][ T7857] RDX: 000000000000000f RSI: 00007f474ea210a0 RDI: 0000000000000005 [ 2208.795298][ T7857] RBP: 00007f474ea21090 R08: 0000000000000000 R09: 0000000000000000 [ 2208.803256][ T7857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2208.811217][ T7857] R13: 00007f474dde6038 R14: 00007f474dde5fa0 R15: 00007ffdc6a41db8 [ 2208.819183][ T7857] [ 2210.794353][ T7887] device syzkaller0 entered promiscuous mode [ 2210.844899][ T7897] device veth0_vlan left promiscuous mode [ 2210.861442][ T7897] device veth0_vlan entered promiscuous mode [ 2210.954465][ T7898] device syzkaller0 entered promiscuous mode [ 2211.853887][ T7920] device pim6reg1 entered promiscuous mode [ 2213.359947][ T7940] GPL: port 1(erspan0) entered blocking state [ 2213.397437][ T7940] GPL: port 1(erspan0) entered disabled state [ 2213.413495][ T7940] device erspan0 entered promiscuous mode [ 2213.419505][ T7940] GPL: port 1(erspan0) entered blocking state [ 2213.425616][ T7940] GPL: port 1(erspan0) entered forwarding state [ 2213.644989][ T7952] device syzkaller0 entered promiscuous mode [ 2214.617128][ T7976] device veth0_vlan left promiscuous mode [ 2214.706516][ T7976] device veth0_vlan entered promiscuous mode [ 2214.780778][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2214.809577][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2214.861128][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2216.669325][ T7991] FAULT_INJECTION: forcing a failure. [ 2216.669325][ T7991] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2216.751579][ T7991] CPU: 0 PID: 7991 Comm: syz.4.12560 Tainted: G W syzkaller #0 [ 2216.760555][ T7991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2216.770612][ T7991] Call Trace: [ 2216.773880][ T7991] [ 2216.776801][ T7991] __dump_stack+0x21/0x24 [ 2216.781140][ T7991] dump_stack_lvl+0xee/0x150 [ 2216.785723][ T7991] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2216.790739][ T7991] dump_stack+0x15/0x24 [ 2216.794881][ T7991] should_fail_ex+0x3d4/0x520 [ 2216.799553][ T7991] should_fail+0xb/0x10 [ 2216.803711][ T7991] should_fail_usercopy+0x1a/0x20 [ 2216.808770][ T7991] _copy_from_user+0x1e/0xc0 [ 2216.813353][ T7991] bpf_test_init+0x106/0x160 [ 2216.817943][ T7991] bpf_prog_test_run_xdp+0x359/0xe50 [ 2216.823236][ T7991] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 2216.829045][ T7991] ? __kasan_check_write+0x14/0x20 [ 2216.834149][ T7991] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 2216.839961][ T7991] bpf_prog_test_run+0x3e3/0x630 [ 2216.844891][ T7991] ? slab_free_freelist_hook+0xc2/0x190 [ 2216.850435][ T7991] ? bpf_prog_query+0x270/0x270 [ 2216.855282][ T7991] ? selinux_bpf+0xce/0xf0 [ 2216.859687][ T7991] ? security_bpf+0x93/0xb0 [ 2216.864183][ T7991] __sys_bpf+0x56d/0x780 [ 2216.868418][ T7991] ? bpf_link_show_fdinfo+0x320/0x320 [ 2216.873789][ T7991] ? __cfi_ksys_write+0x10/0x10 [ 2216.878628][ T7991] ? debug_smp_processor_id+0x17/0x20 [ 2216.883990][ T7991] __x64_sys_bpf+0x7c/0x90 [ 2216.888408][ T7991] x64_sys_call+0x488/0x9a0 [ 2216.892910][ T7991] do_syscall_64+0x4c/0xa0 [ 2216.897320][ T7991] ? clear_bhb_loop+0x30/0x80 [ 2216.901994][ T7991] ? clear_bhb_loop+0x30/0x80 [ 2216.906667][ T7991] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2216.912559][ T7991] RIP: 0033:0x7f8f56d8f6c9 [ 2216.916961][ T7991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2216.936642][ T7991] RSP: 002b:00007f8f57bba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2216.945048][ T7991] RAX: ffffffffffffffda RBX: 00007f8f56fe5fa0 RCX: 00007f8f56d8f6c9 [ 2216.953014][ T7991] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 2216.961013][ T7991] RBP: 00007f8f57bba090 R08: 0000000000000000 R09: 0000000000000000 [ 2216.968971][ T7991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2216.976931][ T7991] R13: 00007f8f56fe6038 R14: 00007f8f56fe5fa0 R15: 00007ffd4a227bf8 [ 2216.984894][ T7991] [ 2217.281271][ T8000] device Ÿë entered promiscuous mode [ 2217.455452][ T8008] device sit0 left promiscuous mode [ 2217.519856][ T8010] device sit0 entered promiscuous mode [ 2218.187435][ T8014] device pim6reg1 entered promiscuous mode [ 2219.381412][ T8046] device pim6reg1 entered promiscuous mode [ 2220.096719][ T8057] GPL: port 1(erspan0) entered blocking state [ 2220.143767][ T8057] GPL: port 1(erspan0) entered disabled state [ 2220.217486][ T8057] device erspan0 entered promiscuous mode [ 2220.263055][ T8061] GPL: port 1(erspan0) entered blocking state [ 2220.269170][ T8061] GPL: port 1(erspan0) entered forwarding state [ 2221.102107][ T8090] device sit0 left promiscuous mode [ 2221.155037][ T8090] device sit0 entered promiscuous mode [ 2221.357991][ T8096] device veth0_vlan left promiscuous mode [ 2221.376406][ T8096] device veth0_vlan entered promiscuous mode [ 2221.446668][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2221.457280][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2221.471227][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2221.771422][ T8110] device syzkaller0 entered promiscuous mode [ 2224.407243][ T8166] FAULT_INJECTION: forcing a failure. [ 2224.407243][ T8166] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2224.420557][ T8166] CPU: 1 PID: 8166 Comm: syz.4.12607 Tainted: G W syzkaller #0 [ 2224.429502][ T8166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2224.439562][ T8166] Call Trace: [ 2224.442840][ T8166] [ 2224.445772][ T8166] __dump_stack+0x21/0x24 [ 2224.450117][ T8166] dump_stack_lvl+0xee/0x150 [ 2224.454716][ T8166] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2224.459753][ T8166] ? __kasan_check_write+0x14/0x20 [ 2224.464883][ T8166] dump_stack+0x15/0x24 [ 2224.469044][ T8166] should_fail_ex+0x3d4/0x520 [ 2224.473732][ T8166] should_fail+0xb/0x10 [ 2224.477902][ T8166] should_fail_usercopy+0x1a/0x20 [ 2224.482946][ T8166] _copy_from_user+0x1e/0xc0 [ 2224.487545][ T8166] perf_copy_attr+0x15e/0x880 [ 2224.492228][ T8166] __se_sys_perf_event_open+0xcb/0x1b80 [ 2224.497784][ T8166] ? __kasan_check_write+0x14/0x20 [ 2224.502902][ T8166] ? mutex_unlock+0x89/0x220 [ 2224.507500][ T8166] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 2224.513141][ T8166] ? __cfi_ksys_write+0x10/0x10 [ 2224.517998][ T8166] __x64_sys_perf_event_open+0xbf/0xd0 [ 2224.523471][ T8166] x64_sys_call+0x385/0x9a0 [ 2224.527982][ T8166] do_syscall_64+0x4c/0xa0 [ 2224.532409][ T8166] ? clear_bhb_loop+0x30/0x80 [ 2224.537095][ T8166] ? clear_bhb_loop+0x30/0x80 [ 2224.541780][ T8166] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2224.547688][ T8166] RIP: 0033:0x7f8f56d8f6c9 [ 2224.552112][ T8166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2224.571724][ T8166] RSP: 002b:00007f8f57bba038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2224.580146][ T8166] RAX: ffffffffffffffda RBX: 00007f8f56fe5fa0 RCX: 00007f8f56d8f6c9 [ 2224.588127][ T8166] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 2224.596109][ T8166] RBP: 00007f8f57bba090 R08: 0000000000000000 R09: 0000000000000000 [ 2224.604088][ T8166] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2224.612064][ T8166] R13: 00007f8f56fe6038 R14: 00007f8f56fe5fa0 R15: 00007ffd4a227bf8 [ 2224.620046][ T8166] [ 2224.747752][ T8175] bridge0: port 2(bridge_slave_1) entered disabled state [ 2224.755018][ T8175] bridge0: port 1(bridge_slave_0) entered disabled state [ 2224.901492][ T8175] device bridge_slave_1 left promiscuous mode [ 2224.998571][ T8175] bridge0: port 2(bridge_slave_1) entered disabled state [ 2225.075668][ T8175] device bridge_slave_0 left promiscuous mode [ 2225.105612][ T8175] bridge0: port 1(bridge_slave_0) entered disabled state [ 2225.128355][ T8183] FAULT_INJECTION: forcing a failure. [ 2225.128355][ T8183] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2225.141501][ T8183] CPU: 1 PID: 8183 Comm: syz.0.12612 Tainted: G W syzkaller #0 [ 2225.150436][ T8183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2225.160481][ T8183] Call Trace: [ 2225.163751][ T8183] [ 2225.166685][ T8183] __dump_stack+0x21/0x24 [ 2225.171031][ T8183] dump_stack_lvl+0xee/0x150 [ 2225.175618][ T8183] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2225.180634][ T8183] dump_stack+0x15/0x24 [ 2225.184782][ T8183] should_fail_ex+0x3d4/0x520 [ 2225.189454][ T8183] should_fail+0xb/0x10 [ 2225.193699][ T8183] should_fail_usercopy+0x1a/0x20 [ 2225.198718][ T8183] _copy_from_user+0x1e/0xc0 [ 2225.203294][ T8183] sock_do_ioctl+0x186/0x310 [ 2225.207885][ T8183] ? sock_show_fdinfo+0xb0/0xb0 [ 2225.212749][ T8183] ? selinux_file_ioctl+0x377/0x480 [ 2225.217946][ T8183] sock_ioctl+0x4d8/0x6e0 [ 2225.222278][ T8183] ? __cfi_sock_ioctl+0x10/0x10 [ 2225.227133][ T8183] ? __fget_files+0x2d5/0x330 [ 2225.231804][ T8183] ? security_file_ioctl+0x95/0xc0 [ 2225.236909][ T8183] ? __cfi_sock_ioctl+0x10/0x10 [ 2225.241752][ T8183] __se_sys_ioctl+0x12f/0x1b0 [ 2225.246419][ T8183] __x64_sys_ioctl+0x7b/0x90 [ 2225.251001][ T8183] x64_sys_call+0x58b/0x9a0 [ 2225.255496][ T8183] do_syscall_64+0x4c/0xa0 [ 2225.259897][ T8183] ? clear_bhb_loop+0x30/0x80 [ 2225.264562][ T8183] ? clear_bhb_loop+0x30/0x80 [ 2225.269234][ T8183] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2225.275114][ T8183] RIP: 0033:0x7f474db8f6c9 [ 2225.279522][ T8183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2225.299120][ T8183] RSP: 002b:00007f474ea21038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2225.307545][ T8183] RAX: ffffffffffffffda RBX: 00007f474dde5fa0 RCX: 00007f474db8f6c9 [ 2225.315513][ T8183] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 0000000000000009 [ 2225.323472][ T8183] RBP: 00007f474ea21090 R08: 0000000000000000 R09: 0000000000000000 [ 2225.331429][ T8183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2225.339385][ T8183] R13: 00007f474dde6038 R14: 00007f474dde5fa0 R15: 00007ffdc6a41db8 [ 2225.347351][ T8183] [ 2226.052097][ T8207] bond_slave_1: mtu less than device minimum [ 2226.073586][ T8209] FAULT_INJECTION: forcing a failure. [ 2226.073586][ T8209] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2226.086849][ T8209] CPU: 1 PID: 8209 Comm: syz.1.12619 Tainted: G W syzkaller #0 [ 2226.095804][ T8209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2226.105858][ T8209] Call Trace: [ 2226.109126][ T8209] [ 2226.112045][ T8209] __dump_stack+0x21/0x24 [ 2226.116378][ T8209] dump_stack_lvl+0xee/0x150 [ 2226.120973][ T8209] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2226.126004][ T8209] dump_stack+0x15/0x24 [ 2226.130157][ T8209] should_fail_ex+0x3d4/0x520 [ 2226.134831][ T8209] should_fail+0xb/0x10 [ 2226.138983][ T8209] should_fail_usercopy+0x1a/0x20 [ 2226.144001][ T8209] _copy_from_user+0x1e/0xc0 [ 2226.148588][ T8209] sock_do_ioctl+0x186/0x310 [ 2226.153178][ T8209] ? sock_show_fdinfo+0xb0/0xb0 [ 2226.158028][ T8209] ? selinux_file_ioctl+0x377/0x480 [ 2226.163223][ T8209] sock_ioctl+0x4d8/0x6e0 [ 2226.167547][ T8209] ? __cfi_sock_ioctl+0x10/0x10 [ 2226.172391][ T8209] ? __fget_files+0x2d5/0x330 [ 2226.177057][ T8209] ? security_file_ioctl+0x95/0xc0 [ 2226.182248][ T8209] ? __cfi_sock_ioctl+0x10/0x10 [ 2226.187089][ T8209] __se_sys_ioctl+0x12f/0x1b0 [ 2226.191756][ T8209] __x64_sys_ioctl+0x7b/0x90 [ 2226.196348][ T8209] x64_sys_call+0x58b/0x9a0 [ 2226.200852][ T8209] do_syscall_64+0x4c/0xa0 [ 2226.205256][ T8209] ? clear_bhb_loop+0x30/0x80 [ 2226.209927][ T8209] ? clear_bhb_loop+0x30/0x80 [ 2226.214598][ T8209] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2226.220504][ T8209] RIP: 0033:0x7f4990d8f6c9 [ 2226.224926][ T8209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2226.244527][ T8209] RSP: 002b:00007f4991cca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2226.252927][ T8209] RAX: ffffffffffffffda RBX: 00007f4990fe5fa0 RCX: 00007f4990d8f6c9 [ 2226.260885][ T8209] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 0000000000000009 [ 2226.268932][ T8209] RBP: 00007f4991cca090 R08: 0000000000000000 R09: 0000000000000000 [ 2226.276911][ T8209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2226.284900][ T8209] R13: 00007f4990fe6038 R14: 00007f4990fe5fa0 R15: 00007ffc59bf13d8 [ 2226.292869][ T8209] [ 2226.361626][ T8218] bridge0: port 2(bridge_slave_1) entered disabled state [ 2226.368948][ T8218] bridge0: port 1(bridge_slave_0) entered disabled state [ 2226.544093][ T8223] device syzkaller0 entered promiscuous mode [ 2226.550851][ T8225] device bridge_slave_1 left promiscuous mode [ 2226.557383][ T8225] bridge0: port 2(bridge_slave_1) entered disabled state [ 2226.566129][ T8225] device bridge_slave_0 left promiscuous mode [ 2226.572264][ T8225] bridge0: port 1(bridge_slave_0) entered disabled state [ 2226.580109][ T8227] FAULT_INJECTION: forcing a failure. [ 2226.580109][ T8227] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2226.593732][ T8227] CPU: 1 PID: 8227 Comm: syz.3.12626 Tainted: G W syzkaller #0 [ 2226.602688][ T8227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2226.612728][ T8227] Call Trace: [ 2226.615999][ T8227] [ 2226.618926][ T8227] __dump_stack+0x21/0x24 [ 2226.623247][ T8227] dump_stack_lvl+0xee/0x150 [ 2226.627828][ T8227] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2226.632847][ T8227] dump_stack+0x15/0x24 [ 2226.637003][ T8227] should_fail_ex+0x3d4/0x520 [ 2226.641691][ T8227] should_fail+0xb/0x10 [ 2226.645840][ T8227] should_fail_usercopy+0x1a/0x20 [ 2226.650869][ T8227] _copy_from_user+0x1e/0xc0 [ 2226.655459][ T8227] __sys_bpf+0x277/0x780 [ 2226.659696][ T8227] ? bpf_link_show_fdinfo+0x320/0x320 [ 2226.665063][ T8227] ? __cfi_ksys_write+0x10/0x10 [ 2226.669906][ T8227] ? debug_smp_processor_id+0x17/0x20 [ 2226.675271][ T8227] __x64_sys_bpf+0x7c/0x90 [ 2226.679689][ T8227] x64_sys_call+0x488/0x9a0 [ 2226.684188][ T8227] do_syscall_64+0x4c/0xa0 [ 2226.688607][ T8227] ? clear_bhb_loop+0x30/0x80 [ 2226.693286][ T8227] ? clear_bhb_loop+0x30/0x80 [ 2226.697963][ T8227] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2226.703857][ T8227] RIP: 0033:0x7fd0c1b8f6c9 [ 2226.708270][ T8227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2226.727993][ T8227] RSP: 002b:00007fd0c29a2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2226.736410][ T8227] RAX: ffffffffffffffda RBX: 00007fd0c1de5fa0 RCX: 00007fd0c1b8f6c9 [ 2226.744373][ T8227] RDX: 0000000000000020 RSI: 0000200000000300 RDI: 0000000000000004 [ 2226.752341][ T8227] RBP: 00007fd0c29a2090 R08: 0000000000000000 R09: 0000000000000000 [ 2226.760315][ T8227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2226.768277][ T8227] R13: 00007fd0c1de6038 R14: 00007fd0c1de5fa0 R15: 00007ffe4de3f878 [ 2226.776250][ T8227] [ 2227.452429][ T8248] device sit0 left promiscuous mode [ 2227.648383][ T8257] device syzkaller0 entered promiscuous mode [ 2228.148743][ T8274] bond_slave_1: mtu less than device minimum [ 2228.360281][ T8284] FAULT_INJECTION: forcing a failure. [ 2228.360281][ T8284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2228.377385][ T8284] CPU: 0 PID: 8284 Comm: syz.1.12652 Tainted: G W syzkaller #0 [ 2228.386350][ T8284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2228.396409][ T8284] Call Trace: [ 2228.399684][ T8284] [ 2228.402613][ T8284] __dump_stack+0x21/0x24 [ 2228.406941][ T8284] dump_stack_lvl+0xee/0x150 [ 2228.411532][ T8284] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2228.416559][ T8284] dump_stack+0x15/0x24 [ 2228.420722][ T8284] should_fail_ex+0x3d4/0x520 [ 2228.425404][ T8284] should_fail+0xb/0x10 [ 2228.429561][ T8284] should_fail_usercopy+0x1a/0x20 [ 2228.434593][ T8284] _copy_from_user+0x1e/0xc0 [ 2228.439190][ T8284] __sys_bpf+0x277/0x780 [ 2228.443432][ T8284] ? bpf_link_show_fdinfo+0x320/0x320 [ 2228.448822][ T8284] ? irqentry_exit+0x37/0x40 [ 2228.453456][ T8284] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 2228.459285][ T8284] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 2228.465454][ T8284] __x64_sys_bpf+0x7c/0x90 [ 2228.469884][ T8284] x64_sys_call+0x488/0x9a0 [ 2228.474389][ T8284] do_syscall_64+0x4c/0xa0 [ 2228.478808][ T8284] ? clear_bhb_loop+0x30/0x80 [ 2228.483514][ T8284] ? clear_bhb_loop+0x30/0x80 [ 2228.488199][ T8284] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2228.494097][ T8284] RIP: 0033:0x7f4990d8f6c9 [ 2228.498510][ T8284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2228.518211][ T8284] RSP: 002b:00007f4991cca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2228.526635][ T8284] RAX: ffffffffffffffda RBX: 00007f4990fe5fa0 RCX: 00007f4990d8f6c9 [ 2228.534611][ T8284] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 2228.542581][ T8284] RBP: 00007f4991cca090 R08: 0000000000000000 R09: 0000000000000000 [ 2228.550553][ T8284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2228.558517][ T8284] R13: 00007f4990fe6038 R14: 00007f4990fe5fa0 R15: 00007ffc59bf13d8 [ 2228.566497][ T8284] [ 2228.828458][ T8282] device syzkaller0 entered promiscuous mode [ 2229.114819][ T8300] device sit0 entered promiscuous mode [ 2229.153435][ T8298] device sit0 left promiscuous mode [ 2229.848990][ T8310] device syzkaller0 entered promiscuous mode [ 2230.061220][ T8334] FAULT_INJECTION: forcing a failure. [ 2230.061220][ T8334] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2230.099047][ T8334] CPU: 1 PID: 8334 Comm: syz.2.12658 Tainted: G W syzkaller #0 [ 2230.108036][ T8334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2230.118104][ T8334] Call Trace: [ 2230.121394][ T8334] [ 2230.124328][ T8334] __dump_stack+0x21/0x24 [ 2230.128678][ T8334] dump_stack_lvl+0xee/0x150 [ 2230.133276][ T8334] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2230.138318][ T8334] dump_stack+0x15/0x24 [ 2230.142484][ T8334] should_fail_ex+0x3d4/0x520 [ 2230.147178][ T8334] should_fail+0xb/0x10 [ 2230.151341][ T8334] should_fail_usercopy+0x1a/0x20 [ 2230.156369][ T8334] _copy_from_user+0x1e/0xc0 [ 2230.160964][ T8334] ___sys_sendmsg+0x155/0x290 [ 2230.165646][ T8334] ? __sys_sendmsg+0x270/0x270 [ 2230.170416][ T8334] ? __kasan_check_write+0x14/0x20 [ 2230.175525][ T8334] ? proc_fail_nth_write+0x17a/0x1f0 [ 2230.180815][ T8334] ? vfs_write+0x9d6/0xca0 [ 2230.185243][ T8334] ? __fdget+0x19c/0x220 [ 2230.189488][ T8334] __x64_sys_sendmsg+0x1f0/0x2c0 [ 2230.194432][ T8334] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 2230.199903][ T8334] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 2230.205976][ T8334] x64_sys_call+0x171/0x9a0 [ 2230.210486][ T8334] do_syscall_64+0x4c/0xa0 [ 2230.214904][ T8334] ? clear_bhb_loop+0x30/0x80 [ 2230.219586][ T8334] ? clear_bhb_loop+0x30/0x80 [ 2230.224269][ T8334] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2230.230167][ T8334] RIP: 0033:0x7f691638f6c9 [ 2230.234579][ T8334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2230.254181][ T8334] RSP: 002b:00007f69172d9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2230.262596][ T8334] RAX: ffffffffffffffda RBX: 00007f69165e6090 RCX: 00007f691638f6c9 [ 2230.270604][ T8334] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000005 [ 2230.278599][ T8334] RBP: 00007f69172d9090 R08: 0000000000000000 R09: 0000000000000000 [ 2230.286570][ T8334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2230.294536][ T8334] R13: 00007f69165e6128 R14: 00007f69165e6090 R15: 00007ffe1ebbb738 [ 2230.302516][ T8334] [ 2230.852206][ T8344] FAULT_INJECTION: forcing a failure. [ 2230.852206][ T8344] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2230.865960][ T8344] CPU: 1 PID: 8344 Comm: syz.2.12661 Tainted: G W syzkaller #0 [ 2230.874910][ T8344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2230.884952][ T8344] Call Trace: [ 2230.888218][ T8344] [ 2230.891139][ T8344] __dump_stack+0x21/0x24 [ 2230.895462][ T8344] dump_stack_lvl+0xee/0x150 [ 2230.900036][ T8344] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2230.905047][ T8344] ? __kmalloc_node+0xb2/0x1e0 [ 2230.909802][ T8344] dump_stack+0x15/0x24 [ 2230.913951][ T8344] should_fail_ex+0x3d4/0x520 [ 2230.918640][ T8344] should_fail+0xb/0x10 [ 2230.922802][ T8344] should_fail_usercopy+0x1a/0x20 [ 2230.927823][ T8344] _copy_from_user+0x1e/0xc0 [ 2230.932407][ T8344] generic_map_update_batch+0x458/0x780 [ 2230.937952][ T8344] ? __cfi_generic_map_update_batch+0x10/0x10 [ 2230.944040][ T8344] ? __cfi_generic_map_update_batch+0x10/0x10 [ 2230.950099][ T8344] bpf_map_do_batch+0x48c/0x620 [ 2230.954939][ T8344] __sys_bpf+0x624/0x780 [ 2230.959179][ T8344] ? bpf_link_show_fdinfo+0x320/0x320 [ 2230.964546][ T8344] ? __cfi_ksys_write+0x10/0x10 [ 2230.969390][ T8344] ? debug_smp_processor_id+0x17/0x20 [ 2230.974750][ T8344] __x64_sys_bpf+0x7c/0x90 [ 2230.979162][ T8344] x64_sys_call+0x488/0x9a0 [ 2230.983659][ T8344] do_syscall_64+0x4c/0xa0 [ 2230.988068][ T8344] ? clear_bhb_loop+0x30/0x80 [ 2230.992744][ T8344] ? clear_bhb_loop+0x30/0x80 [ 2230.997416][ T8344] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2231.003300][ T8344] RIP: 0033:0x7f691638f6c9 [ 2231.007707][ T8344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2231.027302][ T8344] RSP: 002b:00007f69172fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2231.035705][ T8344] RAX: ffffffffffffffda RBX: 00007f69165e5fa0 RCX: 00007f691638f6c9 [ 2231.043669][ T8344] RDX: 0000000000000038 RSI: 00002000000006c0 RDI: 000000000000001a [ 2231.051626][ T8344] RBP: 00007f69172fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2231.059586][ T8344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2231.067546][ T8344] R13: 00007f69165e6038 R14: 00007f69165e5fa0 R15: 00007ffe1ebbb738 [ 2231.075509][ T8344] [ 2232.371144][ T8376] device syzkaller0 entered promiscuous mode [ 2232.390173][ T8377] bond_slave_1: mtu less than device minimum [ 2233.998937][ T8432] FAULT_INJECTION: forcing a failure. [ 2233.998937][ T8432] name failslab, interval 1, probability 0, space 0, times 0 [ 2234.063093][ T8432] CPU: 1 PID: 8432 Comm: syz.4.12687 Tainted: G W syzkaller #0 [ 2234.072085][ T8432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2234.082153][ T8432] Call Trace: [ 2234.085443][ T8432] [ 2234.088384][ T8432] __dump_stack+0x21/0x24 [ 2234.092734][ T8432] dump_stack_lvl+0xee/0x150 [ 2234.097332][ T8432] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2234.102384][ T8432] dump_stack+0x15/0x24 [ 2234.106550][ T8432] should_fail_ex+0x3d4/0x520 [ 2234.111242][ T8432] ? security_file_alloc+0x33/0x130 [ 2234.116469][ T8432] __should_failslab+0xac/0xf0 [ 2234.121276][ T8432] should_failslab+0x9/0x20 [ 2234.125791][ T8432] kmem_cache_alloc+0x3b/0x330 [ 2234.130574][ T8432] ? __alloc_file+0x28/0x2a0 [ 2234.135173][ T8432] security_file_alloc+0x33/0x130 [ 2234.140193][ T8432] __alloc_file+0xb5/0x2a0 [ 2234.144601][ T8432] alloc_empty_file+0x97/0x180 [ 2234.149363][ T8432] alloc_file+0x59/0x640 [ 2234.153606][ T8432] alloc_file_pseudo+0x17a/0x1f0 [ 2234.158542][ T8432] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 2234.164012][ T8432] ? alloc_perf_context+0x222/0x2e0 [ 2234.169205][ T8432] anon_inode_getfile+0xa6/0x180 [ 2234.174145][ T8432] __se_sys_perf_event_open+0xbd2/0x1b80 [ 2234.179779][ T8432] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 2234.185410][ T8432] ? __cfi_ksys_write+0x10/0x10 [ 2234.190251][ T8432] __x64_sys_perf_event_open+0xbf/0xd0 [ 2234.195709][ T8432] x64_sys_call+0x385/0x9a0 [ 2234.200206][ T8432] do_syscall_64+0x4c/0xa0 [ 2234.204616][ T8432] ? clear_bhb_loop+0x30/0x80 [ 2234.209294][ T8432] ? clear_bhb_loop+0x30/0x80 [ 2234.213978][ T8432] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2234.219866][ T8432] RIP: 0033:0x7f8f56d8f6c9 [ 2234.224289][ T8432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2234.243885][ T8432] RSP: 002b:00007f8f57bba038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2234.252286][ T8432] RAX: ffffffffffffffda RBX: 00007f8f56fe5fa0 RCX: 00007f8f56d8f6c9 [ 2234.260244][ T8432] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000012c0 [ 2234.268208][ T8432] RBP: 00007f8f57bba090 R08: 0000000000000000 R09: 0000000000000000 [ 2234.276171][ T8432] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2234.284144][ T8432] R13: 00007f8f56fe6038 R14: 00007f8f56fe5fa0 R15: 00007ffd4a227bf8 [ 2234.292111][ T8432] [ 2234.564546][ T8430] device syzkaller0 entered promiscuous mode [ 2234.609801][ T8450] FAULT_INJECTION: forcing a failure. [ 2234.609801][ T8450] name failslab, interval 1, probability 0, space 0, times 0 [ 2234.622467][ T8450] CPU: 1 PID: 8450 Comm: syz.4.12692 Tainted: G W syzkaller #0 [ 2234.631411][ T8450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2234.641470][ T8450] Call Trace: [ 2234.644767][ T8450] [ 2234.647704][ T8450] __dump_stack+0x21/0x24 [ 2234.652055][ T8450] dump_stack_lvl+0xee/0x150 [ 2234.656661][ T8450] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2234.661708][ T8450] ? ip6_pol_route+0xd2c/0x1110 [ 2234.666601][ T8450] ? ip6_pol_route+0x477/0x1110 [ 2234.671470][ T8450] dump_stack+0x15/0x24 [ 2234.675637][ T8450] should_fail_ex+0x3d4/0x520 [ 2234.680327][ T8450] __should_failslab+0xac/0xf0 [ 2234.685107][ T8450] should_failslab+0x9/0x20 [ 2234.689627][ T8450] kmem_cache_alloc_node+0x42/0x340 [ 2234.694837][ T8450] ? __alloc_skb+0xea/0x4b0 [ 2234.699345][ T8450] __alloc_skb+0xea/0x4b0 [ 2234.703681][ T8450] alloc_skb_with_frags+0xa8/0x620 [ 2234.708821][ T8450] sock_alloc_send_pskb+0x853/0x980 [ 2234.714031][ T8450] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 2234.719765][ T8450] ? ip6_dst_lookup_tail+0xb6d/0x1460 [ 2234.725160][ T8450] ? __kasan_check_write+0x14/0x20 [ 2234.730278][ T8450] __ip6_append_data+0x2803/0x3a10 [ 2234.735408][ T8450] ? __cfi_icmpv6_getfrag+0x10/0x10 [ 2234.740621][ T8450] ? icmpv6_route_lookup+0x424/0x4a0 [ 2234.745925][ T8450] ? ip6_setup_cork+0x10a0/0x10a0 [ 2234.750961][ T8450] ? __kasan_check_read+0x11/0x20 [ 2234.755993][ T8450] ? ip6_setup_cork+0xb1d/0x10a0 [ 2234.760939][ T8450] ip6_append_data+0x1e8/0x400 [ 2234.765715][ T8450] ? __cfi_icmpv6_getfrag+0x10/0x10 [ 2234.770927][ T8450] icmp6_send+0xf40/0x1580 [ 2234.775346][ T8450] ? icmp6_send+0x8bc/0x1580 [ 2234.779958][ T8450] ? __cfi_icmp6_send+0x10/0x10 [ 2234.784806][ T8450] ? prep_new_page+0x3b/0x110 [ 2234.789480][ T8450] ? get_page_from_freelist+0x2c7b/0x2cf0 [ 2234.795199][ T8450] ? cgroup_rstat_updated+0xf5/0x370 [ 2234.800478][ T8450] ? __skb_flow_dissect+0x54de/0x5f40 [ 2234.805848][ T8450] icmpv6_param_prob_reason+0x36/0x50 [ 2234.811222][ T8450] ip6_parse_tlv+0x1a7d/0x1c20 [ 2234.815991][ T8450] ipv6_parse_hopopts+0x2fa/0x5f0 [ 2234.821102][ T8450] ip6_rcv_core+0xd83/0x1480 [ 2234.825691][ T8450] ipv6_rcv+0xca/0x210 [ 2234.829758][ T8450] ? __cfi_ipv6_rcv+0x10/0x10 [ 2234.834427][ T8450] ? asm_exc_page_fault+0x27/0x30 [ 2234.839448][ T8450] ? _copy_from_iter+0x171/0xfd0 [ 2234.844379][ T8450] ? __cfi_ipv6_rcv+0x10/0x10 [ 2234.849052][ T8450] __netif_receive_skb+0xd7/0x2a0 [ 2234.854099][ T8450] ? tun_rx_batched+0x158/0x770 [ 2234.858951][ T8450] netif_receive_skb+0x98/0x3d0 [ 2234.863794][ T8450] ? __cfi_netif_receive_skb+0x10/0x10 [ 2234.869241][ T8450] ? __cfi__copy_from_iter+0x10/0x10 [ 2234.874526][ T8450] ? tun_rx_batched+0x158/0x770 [ 2234.879381][ T8450] tun_rx_batched+0x1b6/0x770 [ 2234.884058][ T8450] ? pskb_may_pull+0x100/0x100 [ 2234.888815][ T8450] ? stack_trace_save+0x98/0xe0 [ 2234.893659][ T8450] ? tun_get_user+0x1f21/0x3320 [ 2234.898504][ T8450] tun_get_user+0x2494/0x3320 [ 2234.903176][ T8450] ? kstrtoull+0x137/0x1d0 [ 2234.907591][ T8450] ? tun_do_read+0x1c20/0x1c20 [ 2234.912348][ T8450] ? __kasan_check_write+0x14/0x20 [ 2234.917452][ T8450] ? ref_tracker_alloc+0x30f/0x430 [ 2234.922555][ T8450] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 2234.928008][ T8450] ? avc_policy_seqno+0x1b/0x70 [ 2234.932861][ T8450] ? selinux_file_permission+0x2a5/0x510 [ 2234.938491][ T8450] tun_chr_write_iter+0x1fb/0x300 [ 2234.943508][ T8450] vfs_write+0x5db/0xca0 [ 2234.947747][ T8450] ? slab_free_freelist_hook+0xc2/0x190 [ 2234.953293][ T8450] ? __cfi_vfs_write+0x10/0x10 [ 2234.958054][ T8450] ? __fget_files+0x2d5/0x330 [ 2234.962722][ T8450] ? __fdget_pos+0x1f2/0x380 [ 2234.967300][ T8450] ? ksys_write+0x71/0x240 [ 2234.971706][ T8450] ksys_write+0x140/0x240 [ 2234.976041][ T8450] ? __cfi_ksys_write+0x10/0x10 [ 2234.980884][ T8450] ? debug_smp_processor_id+0x17/0x20 [ 2234.986241][ T8450] __x64_sys_write+0x7b/0x90 [ 2234.990817][ T8450] x64_sys_call+0x27b/0x9a0 [ 2234.995310][ T8450] do_syscall_64+0x4c/0xa0 [ 2234.999722][ T8450] ? clear_bhb_loop+0x30/0x80 [ 2235.004393][ T8450] ? clear_bhb_loop+0x30/0x80 [ 2235.009061][ T8450] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2235.014948][ T8450] RIP: 0033:0x7f8f56d8f6c9 [ 2235.019354][ T8450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2235.039041][ T8450] RSP: 002b:00007f8f57bba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2235.047441][ T8450] RAX: ffffffffffffffda RBX: 00007f8f56fe5fa0 RCX: 00007f8f56d8f6c9 [ 2235.055404][ T8450] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 2235.063366][ T8450] RBP: 00007f8f57bba090 R08: 0000000000000000 R09: 0000000000000000 [ 2235.071322][ T8450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2235.079282][ T8450] R13: 00007f8f56fe6038 R14: 00007f8f56fe5fa0 R15: 00007ffd4a227bf8 [ 2235.087248][ T8450] [ 2235.791550][ T8464] bridge0: port 1(bridge_slave_0) entered blocking state [ 2235.798699][ T8464] bridge0: port 1(bridge_slave_0) entered disabled state [ 2235.806651][ T8464] device bridge_slave_0 entered promiscuous mode [ 2235.813840][ T8464] bridge0: port 2(bridge_slave_1) entered blocking state [ 2235.820941][ T8464] bridge0: port 2(bridge_slave_1) entered disabled state [ 2235.829632][ T8464] device bridge_slave_1 entered promiscuous mode [ 2235.922340][ T8475] FAULT_INJECTION: forcing a failure. [ 2235.922340][ T8475] name failslab, interval 1, probability 0, space 0, times 0 [ 2235.935195][ T8475] CPU: 1 PID: 8475 Comm: syz.0.12700 Tainted: G W syzkaller #0 [ 2235.944144][ T8475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2235.954204][ T8475] Call Trace: [ 2235.957483][ T8475] [ 2235.960410][ T8475] __dump_stack+0x21/0x24 [ 2235.964738][ T8475] dump_stack_lvl+0xee/0x150 [ 2235.969324][ T8475] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2235.974356][ T8475] dump_stack+0x15/0x24 [ 2235.978512][ T8475] should_fail_ex+0x3d4/0x520 [ 2235.983187][ T8475] ? security_file_alloc+0x33/0x130 [ 2235.988377][ T8475] __should_failslab+0xac/0xf0 [ 2235.993135][ T8475] should_failslab+0x9/0x20 [ 2235.997629][ T8475] kmem_cache_alloc+0x3b/0x330 [ 2236.002408][ T8475] ? __alloc_file+0x28/0x2a0 [ 2236.006990][ T8475] security_file_alloc+0x33/0x130 [ 2236.012008][ T8475] __alloc_file+0xb5/0x2a0 [ 2236.016414][ T8475] alloc_empty_file+0x97/0x180 [ 2236.021169][ T8475] alloc_file+0x59/0x640 [ 2236.025408][ T8475] alloc_file_pseudo+0x17a/0x1f0 [ 2236.030340][ T8475] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 2236.035788][ T8475] ? alloc_perf_context+0x222/0x2e0 [ 2236.040979][ T8475] anon_inode_getfile+0xa6/0x180 [ 2236.045909][ T8475] __se_sys_perf_event_open+0xbd2/0x1b80 [ 2236.051543][ T8475] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 2236.057174][ T8475] ? __cfi_ksys_write+0x10/0x10 [ 2236.062010][ T8475] ? do_user_addr_fault+0x9ac/0x1050 [ 2236.067298][ T8475] __x64_sys_perf_event_open+0xbf/0xd0 [ 2236.072750][ T8475] x64_sys_call+0x385/0x9a0 [ 2236.077245][ T8475] do_syscall_64+0x4c/0xa0 [ 2236.081658][ T8475] ? clear_bhb_loop+0x30/0x80 [ 2236.086327][ T8475] ? clear_bhb_loop+0x30/0x80 [ 2236.090997][ T8475] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2236.096897][ T8475] RIP: 0033:0x7f474db8f6c9 [ 2236.101309][ T8475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2236.120925][ T8475] RSP: 002b:00007f474ea21038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2236.129336][ T8475] RAX: ffffffffffffffda RBX: 00007f474dde5fa0 RCX: 00007f474db8f6c9 [ 2236.137306][ T8475] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000002c0 [ 2236.145265][ T8475] RBP: 00007f474ea21090 R08: 0000000000000000 R09: 0000000000000000 [ 2236.153229][ T8475] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2236.161191][ T8475] R13: 00007f474dde6038 R14: 00007f474dde5fa0 R15: 00007ffdc6a41db8 [ 2236.169160][ T8475] [ 2236.461527][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2236.471565][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2236.494266][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2236.510534][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2236.526483][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 2236.533669][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2236.541172][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2236.549690][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2236.561229][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 2236.568345][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2236.620917][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2236.629289][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2236.656642][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2236.684624][ T8464] device veth0_vlan entered promiscuous mode [ 2236.738714][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2236.791265][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2236.878006][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2236.967528][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2237.100895][ T8492] device veth0_vlan left promiscuous mode [ 2237.142730][ T8492] device veth0_vlan entered promiscuous mode [ 2237.225528][ T8464] device veth1_macvtap entered promiscuous mode [ 2237.407917][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2237.536017][ T8503] device syzkaller0 entered promiscuous mode [ 2237.585477][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2237.595873][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2237.604553][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2237.612846][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2238.693075][ T8523] FAULT_INJECTION: forcing a failure. [ 2238.693075][ T8523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2238.733418][ T8523] CPU: 1 PID: 8523 Comm: syz.2.12711 Tainted: G W syzkaller #0 [ 2238.742410][ T8523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2238.752478][ T8523] Call Trace: [ 2238.755766][ T8523] [ 2238.758721][ T8523] __dump_stack+0x21/0x24 [ 2238.763068][ T8523] dump_stack_lvl+0xee/0x150 [ 2238.767681][ T8523] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2238.772717][ T8523] ? _parse_integer+0x2a/0x40 [ 2238.777417][ T8523] dump_stack+0x15/0x24 [ 2238.781594][ T8523] should_fail_ex+0x3d4/0x520 [ 2238.786290][ T8523] should_fail+0xb/0x10 [ 2238.790463][ T8523] should_fail_usercopy+0x1a/0x20 [ 2238.795503][ T8523] _copy_from_user+0x1e/0xc0 [ 2238.800107][ T8523] ___sys_sendmsg+0x155/0x290 [ 2238.804800][ T8523] ? __sys_sendmsg+0x270/0x270 [ 2238.809579][ T8523] ? __kasan_check_write+0x14/0x20 [ 2238.814742][ T8523] ? proc_fail_nth_write+0x17a/0x1f0 [ 2238.820042][ T8523] ? vfs_write+0x9d6/0xca0 [ 2238.824482][ T8523] ? __fdget+0x19c/0x220 [ 2238.828739][ T8523] __x64_sys_sendmsg+0x1f0/0x2c0 [ 2238.833705][ T8523] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 2238.839180][ T8523] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 2238.845264][ T8523] x64_sys_call+0x171/0x9a0 [ 2238.849779][ T8523] do_syscall_64+0x4c/0xa0 [ 2238.854200][ T8523] ? clear_bhb_loop+0x30/0x80 [ 2238.858884][ T8523] ? clear_bhb_loop+0x30/0x80 [ 2238.863577][ T8523] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2238.869484][ T8523] RIP: 0033:0x7f691638f6c9 [ 2238.873904][ T8523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2238.893515][ T8523] RSP: 002b:00007f69172fa038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2238.901941][ T8523] RAX: ffffffffffffffda RBX: 00007f69165e5fa0 RCX: 00007f691638f6c9 [ 2238.909920][ T8523] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000005 [ 2238.917897][ T8523] RBP: 00007f69172fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2238.925961][ T8523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2238.933939][ T8523] R13: 00007f69165e6038 R14: 00007f69165e5fa0 R15: 00007ffe1ebbb738 [ 2238.941925][ T8523] [ 2239.142382][ T8524] bridge0: port 1(bridge_slave_0) entered blocking state [ 2239.153480][ T8524] bridge0: port 1(bridge_slave_0) entered disabled state [ 2239.161105][ T8524] device bridge_slave_0 entered promiscuous mode [ 2239.170465][ T8524] bridge0: port 2(bridge_slave_1) entered blocking state [ 2239.179614][ T8524] bridge0: port 2(bridge_slave_1) entered disabled state [ 2239.187124][ T8524] device bridge_slave_1 entered promiscuous mode [ 2239.338686][ T1606] device bridge_slave_1 left promiscuous mode [ 2239.345069][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2239.352557][ T1606] device bridge_slave_0 left promiscuous mode [ 2239.358888][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2239.382389][ T1606] device veth1_macvtap left promiscuous mode [ 2239.608376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2239.616352][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2239.679421][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2239.690654][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2239.699319][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 2239.706397][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2239.753767][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2239.773899][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2239.790623][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2239.809073][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 2239.816255][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2239.831684][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2239.840410][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2239.862586][ T8524] device veth0_vlan entered promiscuous mode [ 2239.875283][ T8524] device veth1_macvtap entered promiscuous mode [ 2240.056609][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2240.073197][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2240.081878][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2240.090736][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2240.114898][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2240.122400][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2240.137250][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2240.277172][ T8555] device syzkaller0 entered promiscuous mode [ 2240.766464][ T8565] device syzkaller0 entered promiscuous mode [ 2240.814152][ T8573] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 2240.891233][ T8574] device pim6reg1 entered promiscuous mode [ 2241.069914][ T8572] bridge0: port 1(bridge_slave_0) entered blocking state [ 2241.078214][ T8572] bridge0: port 1(bridge_slave_0) entered disabled state [ 2241.171048][ T8572] device bridge_slave_0 entered promiscuous mode [ 2241.284169][ T8572] bridge0: port 2(bridge_slave_1) entered blocking state [ 2241.291262][ T8572] bridge0: port 2(bridge_slave_1) entered disabled state [ 2241.299012][ T8572] device bridge_slave_1 entered promiscuous mode [ 2241.492841][ T1606] device bridge_slave_1 left promiscuous mode [ 2241.512272][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2241.522828][ T1606] device bridge_slave_0 left promiscuous mode [ 2241.529574][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2241.539823][ T1606] device veth1_macvtap left promiscuous mode [ 2241.546004][ T1606] device veth0_vlan left promiscuous mode [ 2242.648635][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2242.658580][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2242.720703][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2242.732728][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2242.759471][T27575] bridge0: port 1(bridge_slave_0) entered blocking state [ 2242.766689][T27575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2242.820669][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2242.829540][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2242.838829][T27575] bridge0: port 2(bridge_slave_1) entered blocking state [ 2242.845894][T27575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2242.853702][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2242.882407][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2242.893403][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2242.901669][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2242.945557][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2242.953800][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2242.968866][ T8572] device veth0_vlan entered promiscuous mode [ 2242.975771][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2242.984691][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2243.044810][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2243.053970][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2243.085091][ T8572] device veth1_macvtap entered promiscuous mode [ 2243.133189][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2243.141570][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2243.150258][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2243.168571][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2243.177208][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2243.315161][ T8572] syz-executor (8572) used greatest stack depth: 20576 bytes left [ 2243.368611][ T1606] device bridge_slave_1 left promiscuous mode [ 2243.378586][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2243.391624][ T1606] device bridge_slave_0 left promiscuous mode [ 2243.400639][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2243.416897][ T1606] device veth1_macvtap left promiscuous mode [ 2243.422992][ T1606] device veth0_vlan left promiscuous mode [ 2244.462846][ T8621] device syzkaller0 entered promiscuous mode [ 2244.517814][ T8619] device pim6reg1 entered promiscuous mode [ 2244.888893][ T8634] bridge0: port 1(bridge_slave_0) entered blocking state [ 2244.896209][ T8634] bridge0: port 1(bridge_slave_0) entered disabled state [ 2244.906312][ T8634] device bridge_slave_0 entered promiscuous mode [ 2245.403073][ T8634] bridge0: port 2(bridge_slave_1) entered blocking state [ 2245.410256][ T8634] bridge0: port 2(bridge_slave_1) entered disabled state [ 2245.417872][ T8634] device bridge_slave_1 entered promiscuous mode [ 2245.424820][ T8642] device wg2 entered promiscuous mode [ 2245.597283][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2245.604760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2245.613233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2245.621709][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2245.631343][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 2245.638397][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2245.656268][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2245.664756][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2245.674437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2245.682578][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 2245.689625][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2245.697677][ T1606] device bridge_slave_1 left promiscuous mode [ 2245.703914][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2245.712574][ T1606] device bridge_slave_0 left promiscuous mode [ 2245.720445][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2245.730275][ T1606] device veth1_macvtap left promiscuous mode [ 2245.736413][ T1606] device veth0_vlan left promiscuous mode [ 2245.852356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2245.954990][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2246.000065][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2246.008897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2246.028218][ T8634] device veth0_vlan entered promiscuous mode [ 2246.034675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2246.042541][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2246.051574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2246.059579][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2246.074984][ T8634] device veth1_macvtap entered promiscuous mode [ 2246.081828][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2246.090449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2246.098818][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2246.126486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2246.148972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2246.158057][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2246.170573][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2247.113664][ T1606] device bridge_slave_1 left promiscuous mode [ 2247.119791][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2247.127308][ T1606] device bridge_slave_0 left promiscuous mode [ 2247.133788][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2247.141642][ T1606] device veth1_macvtap left promiscuous mode [ 2247.147727][ T1606] device veth0_vlan left promiscuous mode [ 2247.782745][ T8689] bridge0: port 1(bridge_slave_0) entered blocking state [ 2247.832136][ T8689] bridge0: port 1(bridge_slave_0) entered disabled state [ 2247.861234][ T8689] device bridge_slave_0 entered promiscuous mode [ 2247.938990][ T8689] bridge0: port 2(bridge_slave_1) entered blocking state [ 2247.946343][ T8689] bridge0: port 2(bridge_slave_1) entered disabled state [ 2247.954921][ T8689] device bridge_slave_1 entered promiscuous mode [ 2248.674954][ T8706] bond_slave_1: mtu less than device minimum [ 2248.913966][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2248.921818][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2248.961512][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2248.975896][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2248.984493][ T1606] bridge0: port 1(bridge_slave_0) entered blocking state [ 2248.991550][ T1606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2249.004752][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2249.133186][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2249.141609][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2249.177157][ T1606] bridge0: port 2(bridge_slave_1) entered blocking state [ 2249.184268][ T1606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2249.252550][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2249.265131][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2249.279720][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2249.309593][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2249.341887][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2249.353306][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2249.382360][ T8689] device veth0_vlan entered promiscuous mode [ 2249.445578][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2249.456021][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2249.527997][ T8689] device veth1_macvtap entered promiscuous mode [ 2249.539755][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2249.549994][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2249.575175][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2249.583807][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2249.593282][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2249.625390][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2249.634721][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2249.650877][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2249.659327][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2250.465037][ T1606] device bridge_slave_1 left promiscuous mode [ 2250.471232][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2250.483214][ T1606] device bridge_slave_0 left promiscuous mode [ 2250.489359][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2250.497965][ T1606] device veth1_macvtap left promiscuous mode [ 2250.504069][ T1606] device veth0_vlan left promiscuous mode [ 2250.586587][ T8746] FAULT_INJECTION: forcing a failure. [ 2250.586587][ T8746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2250.609550][ T8746] CPU: 1 PID: 8746 Comm: syz.0.12762 Tainted: G W syzkaller #0 [ 2250.618544][ T8746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2250.628641][ T8746] Call Trace: [ 2250.631933][ T8746] [ 2250.634897][ T8746] __dump_stack+0x21/0x24 [ 2250.639251][ T8746] dump_stack_lvl+0xee/0x150 [ 2250.643857][ T8746] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2250.648936][ T8746] dump_stack+0x15/0x24 [ 2250.653121][ T8746] should_fail_ex+0x3d4/0x520 [ 2250.657821][ T8746] should_fail_alloc_page+0x61/0x90 [ 2250.663055][ T8746] prepare_alloc_pages+0x148/0x5f0 [ 2250.668194][ T8746] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 2250.673425][ T8746] ? __this_cpu_preempt_check+0x13/0x20 [ 2250.678994][ T8746] __alloc_pages+0x124/0x450 [ 2250.683629][ T8746] ? __kasan_kmalloc_large+0xa4/0xb0 [ 2250.688947][ T8746] ? __cfi___alloc_pages+0x10/0x10 [ 2250.694273][ T8746] ? __alloc_skb+0x2df/0x4b0 [ 2250.698879][ T8746] alloc_skb_with_frags+0x20c/0x620 [ 2250.704108][ T8746] sock_alloc_send_pskb+0x853/0x980 [ 2250.709348][ T8746] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 2250.715097][ T8746] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 2250.721288][ T8746] unix_dgram_sendmsg+0x592/0x16d0 [ 2250.726441][ T8746] ? selinux_socket_sendmsg+0x208/0x2e0 [ 2250.732015][ T8746] ? __cfi_selinux_socket_sendmsg+0x10/0x10 [ 2250.737943][ T8746] ? __cfi_unix_dgram_sendmsg+0x10/0x10 [ 2250.743526][ T8746] ? __cfi_selinux_socket_sendmsg+0x10/0x10 [ 2250.749449][ T8746] unix_seqpacket_sendmsg+0x118/0x1e0 [ 2250.754851][ T8746] ? __cfi_unix_seqpacket_sendmsg+0x10/0x10 [ 2250.760767][ T8746] ____sys_sendmsg+0x5a9/0x990 [ 2250.765554][ T8746] ? __sys_sendmsg_sock+0x40/0x40 [ 2250.770608][ T8746] ? import_iovec+0x7c/0xb0 [ 2250.775136][ T8746] ___sys_sendmsg+0x21c/0x290 [ 2250.779839][ T8746] ? __sys_sendmsg+0x270/0x270 [ 2250.784637][ T8746] __x64_sys_sendmsg+0x1f0/0x2c0 [ 2250.789595][ T8746] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 2250.795070][ T8746] ? __kasan_check_write+0x14/0x20 [ 2250.800189][ T8746] x64_sys_call+0x171/0x9a0 [ 2250.804703][ T8746] do_syscall_64+0x4c/0xa0 [ 2250.809126][ T8746] ? clear_bhb_loop+0x30/0x80 [ 2250.813816][ T8746] ? clear_bhb_loop+0x30/0x80 [ 2250.818507][ T8746] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2250.824409][ T8746] RIP: 0033:0x7f474db8f6c9 [ 2250.828826][ T8746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2250.848437][ T8746] RSP: 002b:00007f474ea21038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2250.856861][ T8746] RAX: ffffffffffffffda RBX: 00007f474dde5fa0 RCX: 00007f474db8f6c9 [ 2250.864840][ T8746] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000007 [ 2250.872816][ T8746] RBP: 00007f474ea21090 R08: 0000000000000000 R09: 0000000000000000 [ 2250.880787][ T8746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2250.888753][ T8746] R13: 00007f474dde6038 R14: 00007f474dde5fa0 R15: 00007ffdc6a41db8 [ 2250.896736][ T8746] [ 2251.504519][ T8750] bridge0: port 1(bridge_slave_0) entered blocking state [ 2251.512725][ T8750] bridge0: port 1(bridge_slave_0) entered disabled state [ 2251.520652][ T8750] device bridge_slave_0 entered promiscuous mode [ 2251.590358][ T8750] bridge0: port 2(bridge_slave_1) entered blocking state [ 2251.598870][ T8750] bridge0: port 2(bridge_slave_1) entered disabled state [ 2251.606691][ T8750] device bridge_slave_1 entered promiscuous mode [ 2251.972667][ T8750] bridge0: port 2(bridge_slave_1) entered blocking state [ 2251.979767][ T8750] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2251.987079][ T8750] bridge0: port 1(bridge_slave_0) entered blocking state [ 2251.994138][ T8750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2252.076765][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 2252.084576][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 2252.123066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2252.160168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2252.252425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2252.272238][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 2252.279347][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2252.350641][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2252.361581][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2252.371227][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 2252.378327][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2252.585433][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2252.635464][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2252.697926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2252.740646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2252.829201][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2252.854473][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2252.867291][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2252.876905][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2252.931522][ T8750] device veth0_vlan entered promiscuous mode [ 2252.945846][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2253.011031][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2253.025983][ T8750] device veth1_macvtap entered promiscuous mode [ 2253.073661][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2253.093983][ T8800] FAULT_INJECTION: forcing a failure. [ 2253.093983][ T8800] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2253.142523][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2253.142893][ T8800] CPU: 1 PID: 8800 Comm: syz.4.12775 Tainted: G W syzkaller #0 [ 2253.159415][ T8800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2253.169579][ T8800] Call Trace: [ 2253.172879][ T8800] [ 2253.175818][ T8800] __dump_stack+0x21/0x24 [ 2253.180163][ T8800] dump_stack_lvl+0xee/0x150 [ 2253.184763][ T8800] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2253.189798][ T8800] ? migrate_enable+0x19c/0x280 [ 2253.194666][ T8800] dump_stack+0x15/0x24 [ 2253.199010][ T8800] should_fail_ex+0x3d4/0x520 [ 2253.203705][ T8800] should_fail+0xb/0x10 [ 2253.207874][ T8800] should_fail_usercopy+0x1a/0x20 [ 2253.212914][ T8800] _copy_from_user+0x1e/0xc0 [ 2253.217521][ T8800] generic_map_update_batch+0x4b1/0x780 [ 2253.223089][ T8800] ? __cfi_generic_map_update_batch+0x10/0x10 [ 2253.229172][ T8800] ? __fdget+0x19c/0x220 [ 2253.233424][ T8800] ? __cfi_generic_map_update_batch+0x10/0x10 [ 2253.239512][ T8800] bpf_map_do_batch+0x48c/0x620 [ 2253.244376][ T8800] __sys_bpf+0x624/0x780 [ 2253.248637][ T8800] ? bpf_link_show_fdinfo+0x320/0x320 [ 2253.254024][ T8800] ? __cfi_ksys_write+0x10/0x10 [ 2253.258888][ T8800] ? debug_smp_processor_id+0x17/0x20 [ 2253.264279][ T8800] __x64_sys_bpf+0x7c/0x90 [ 2253.268713][ T8800] x64_sys_call+0x488/0x9a0 [ 2253.273231][ T8800] do_syscall_64+0x4c/0xa0 [ 2253.277660][ T8800] ? clear_bhb_loop+0x30/0x80 [ 2253.282351][ T8800] ? clear_bhb_loop+0x30/0x80 [ 2253.287055][ T8800] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2253.292966][ T8800] RIP: 0033:0x7f8f56d8f6c9 [ 2253.297389][ T8800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2253.317005][ T8800] RSP: 002b:00007f8f57bba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2253.325428][ T8800] RAX: ffffffffffffffda RBX: 00007f8f56fe5fa0 RCX: 00007f8f56d8f6c9 [ 2253.333413][ T8800] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 2253.341387][ T8800] RBP: 00007f8f57bba090 R08: 0000000000000000 R09: 0000000000000000 [ 2253.349367][ T8800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2253.357345][ T8800] R13: 00007f8f56fe6038 R14: 00007f8f56fe5fa0 R15: 00007ffd4a227bf8 [ 2253.365344][ T8800] [ 2253.388494][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2253.396545][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2253.405319][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2253.434023][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2253.455264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2254.443575][ T1606] device bridge_slave_1 left promiscuous mode [ 2254.450015][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2254.458531][ T1606] device bridge_slave_0 left promiscuous mode [ 2254.464860][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2254.474110][ T1606] device veth1_macvtap left promiscuous mode [ 2254.480242][ T1606] device veth0_vlan left promiscuous mode [ 2254.716854][ T28] audit: type=1400 audit(1762314950.887:148): avc: denied { create } for pid=8814 comm="syz.3.12780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2255.170419][ T8824] bridge0: port 1(bridge_slave_0) entered blocking state [ 2255.199568][ T8824] bridge0: port 1(bridge_slave_0) entered disabled state [ 2255.207465][ T8824] device bridge_slave_0 entered promiscuous mode [ 2255.221906][ T8824] bridge0: port 2(bridge_slave_1) entered blocking state [ 2255.229242][ T8824] bridge0: port 2(bridge_slave_1) entered disabled state [ 2255.237036][ T8824] device bridge_slave_1 entered promiscuous mode [ 2255.861547][ T8844] device syzkaller0 entered promiscuous mode [ 2255.887944][ T8846] FAULT_INJECTION: forcing a failure. [ 2255.887944][ T8846] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2255.903034][ T8846] CPU: 0 PID: 8846 Comm: syz.2.12786 Tainted: G W syzkaller #0 [ 2255.912204][ T8846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2255.922282][ T8846] Call Trace: [ 2255.925564][ T8846] [ 2255.928496][ T8846] __dump_stack+0x21/0x24 [ 2255.932831][ T8846] dump_stack_lvl+0xee/0x150 [ 2255.937422][ T8846] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2255.942453][ T8846] dump_stack+0x15/0x24 [ 2255.946641][ T8846] should_fail_ex+0x3d4/0x520 [ 2255.951324][ T8846] should_fail_alloc_page+0x61/0x90 [ 2255.956528][ T8846] prepare_alloc_pages+0x148/0x5f0 [ 2255.961664][ T8846] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 2255.966864][ T8846] ? slab_post_alloc_hook+0x4f/0x2d0 [ 2255.972160][ T8846] ? alloc_vmap_area+0x17b/0x1870 [ 2255.977186][ T8846] ? __get_vm_area_node+0x160/0x360 [ 2255.982401][ T8846] ? __vmalloc_node_range+0x326/0x13d0 [ 2255.987858][ T8846] __alloc_pages+0x124/0x450 [ 2255.992459][ T8846] ? __cfi___alloc_pages+0x10/0x10 [ 2255.997572][ T8846] ? __kasan_check_write+0x14/0x20 [ 2256.002676][ T8846] ? _raw_spin_lock+0x8e/0xe0 [ 2256.007362][ T8846] ? __cfi__raw_spin_lock+0x10/0x10 [ 2256.012572][ T8846] __get_free_pages+0xe/0x30 [ 2256.017185][ T8846] kasan_populate_vmalloc_pte+0x29/0x120 [ 2256.022822][ T8846] __apply_to_page_range+0x8de/0xc80 [ 2256.028121][ T8846] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 2256.034375][ T8846] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 2256.040616][ T8846] apply_to_page_range+0x3b/0x50 [ 2256.045595][ T8846] kasan_populate_vmalloc+0x60/0x70 [ 2256.050791][ T8846] alloc_vmap_area+0x173e/0x1870 [ 2256.055735][ T8846] ? vm_map_ram+0x930/0x930 [ 2256.060255][ T8846] ? __kasan_kmalloc+0x95/0xb0 [ 2256.065031][ T8846] ? kmalloc_node_trace+0x3d/0xb0 [ 2256.070050][ T8846] __get_vm_area_node+0x160/0x360 [ 2256.075070][ T8846] __vmalloc_node_range+0x326/0x13d0 [ 2256.080354][ T8846] ? prealloc_init+0x146/0x8f0 [ 2256.085130][ T8846] ? __kasan_check_read+0x11/0x20 [ 2256.090199][ T8846] ? pcpu_memcg_post_alloc_hook+0x177/0x270 [ 2256.096096][ T8846] ? __bitmap_weight+0xb3/0x100 [ 2256.100972][ T8846] ? __cfi___vmalloc_node_range+0x10/0x10 [ 2256.106691][ T8846] ? __alloc_percpu_gfp+0x25/0x30 [ 2256.111716][ T8846] ? pcpu_alloc+0x1108/0x16b0 [ 2256.116394][ T8846] bpf_map_area_alloc+0xd7/0xe0 [ 2256.121251][ T8846] ? prealloc_init+0x146/0x8f0 [ 2256.126018][ T8846] prealloc_init+0x146/0x8f0 [ 2256.130624][ T8846] htab_map_alloc+0xb24/0xfd0 [ 2256.135318][ T8846] map_create+0x49c/0xd80 [ 2256.139666][ T8846] __sys_bpf+0x30b/0x780 [ 2256.143908][ T8846] ? bpf_link_show_fdinfo+0x320/0x320 [ 2256.149318][ T8846] ? __cfi_sched_clock_cpu+0x10/0x10 [ 2256.154634][ T8846] __x64_sys_bpf+0x7c/0x90 [ 2256.159062][ T8846] x64_sys_call+0x488/0x9a0 [ 2256.163569][ T8846] do_syscall_64+0x4c/0xa0 [ 2256.167991][ T8846] ? clear_bhb_loop+0x30/0x80 [ 2256.172697][ T8846] ? clear_bhb_loop+0x30/0x80 [ 2256.177387][ T8846] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2256.183285][ T8846] RIP: 0033:0x7f691638f6c9 [ 2256.187699][ T8846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2256.207317][ T8846] RSP: 002b:00007f69172fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2256.215751][ T8846] RAX: ffffffffffffffda RBX: 00007f69165e5fa0 RCX: 00007f691638f6c9 [ 2256.223731][ T8846] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 2256.231711][ T8846] RBP: 00007f69172fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2256.239699][ T8846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2256.247763][ T8846] R13: 00007f69165e6038 R14: 00007f69165e5fa0 R15: 00007ffe1ebbb738 [ 2256.255742][ T8846] [ 2256.561376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2256.569153][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2256.626379][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2256.635771][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2256.650582][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 2256.657692][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2256.666594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2256.678676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2256.690202][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 2256.697303][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2256.705238][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2257.043879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2257.052281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2257.060894][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2257.069411][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2257.141172][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2257.159831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2257.186142][ T8824] device veth0_vlan entered promiscuous mode [ 2257.198770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2257.209861][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2257.262125][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2257.293279][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2257.337744][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2257.362933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2257.429649][ T8824] device veth1_macvtap entered promiscuous mode [ 2257.477264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2257.496995][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2257.519973][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2257.564513][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2257.624699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2257.912854][ T8870] device syzkaller0 entered promiscuous mode [ 2258.735148][ T8876] device veth1_macvtap left promiscuous mode [ 2258.988749][ T8880] device syzkaller0 entered promiscuous mode [ 2259.071378][ T8893] FAULT_INJECTION: forcing a failure. [ 2259.071378][ T8893] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2259.154768][ T8893] CPU: 0 PID: 8893 Comm: syz.4.12799 Tainted: G W syzkaller #0 [ 2259.163797][ T8893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2259.173882][ T8893] Call Trace: [ 2259.177178][ T8893] [ 2259.180128][ T8893] __dump_stack+0x21/0x24 [ 2259.184484][ T8893] dump_stack_lvl+0xee/0x150 [ 2259.189105][ T8893] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2259.194160][ T8893] dump_stack+0x15/0x24 [ 2259.198347][ T8893] should_fail_ex+0x3d4/0x520 [ 2259.203064][ T8893] should_fail+0xb/0x10 [ 2259.207254][ T8893] should_fail_usercopy+0x1a/0x20 [ 2259.212312][ T8893] strncpy_from_user+0x24/0x2d0 [ 2259.217184][ T8893] bpf_prog_load+0x1bb/0x15a0 [ 2259.221893][ T8893] ? map_freeze+0x390/0x390 [ 2259.226423][ T8893] ? selinux_bpf+0xc7/0xf0 [ 2259.230958][ T8893] ? security_bpf+0x93/0xb0 [ 2259.235492][ T8893] __sys_bpf+0x504/0x780 [ 2259.239769][ T8893] ? bpf_link_show_fdinfo+0x320/0x320 [ 2259.245186][ T8893] ? __cfi_ksys_write+0x10/0x10 [ 2259.250079][ T8893] ? debug_smp_processor_id+0x17/0x20 [ 2259.255488][ T8893] __x64_sys_bpf+0x7c/0x90 [ 2259.259945][ T8893] x64_sys_call+0x488/0x9a0 [ 2259.264480][ T8893] do_syscall_64+0x4c/0xa0 [ 2259.268932][ T8893] ? clear_bhb_loop+0x30/0x80 [ 2259.273640][ T8893] ? clear_bhb_loop+0x30/0x80 [ 2259.278352][ T8893] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2259.284281][ T8893] RIP: 0033:0x7f8f56d8f6c9 [ 2259.288716][ T8893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2259.308348][ T8893] RSP: 002b:00007f8f57bba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2259.316886][ T8893] RAX: ffffffffffffffda RBX: 00007f8f56fe5fa0 RCX: 00007f8f56d8f6c9 [ 2259.324889][ T8893] RDX: 0000000000000094 RSI: 0000200000002ac0 RDI: 0000000000000005 [ 2259.332983][ T8893] RBP: 00007f8f57bba090 R08: 0000000000000000 R09: 0000000000000000 [ 2259.340977][ T8893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2259.348967][ T8893] R13: 00007f8f56fe6038 R14: 00007f8f56fe5fa0 R15: 00007ffd4a227bf8 [ 2259.356972][ T8893] [ 2259.405896][ T8896] ip6_vti0: mtu greater than device maximum [ 2259.451536][ T8896] device sit0 left promiscuous mode [ 2259.497316][ T8896] device sit0 entered promiscuous mode [ 2259.762411][ T8889] bridge0: port 1(bridge_slave_0) entered blocking state [ 2259.783114][ T8889] bridge0: port 1(bridge_slave_0) entered disabled state [ 2259.790748][ T8889] device bridge_slave_0 entered promiscuous mode [ 2259.798324][ T8889] bridge0: port 2(bridge_slave_1) entered blocking state [ 2259.805580][ T8889] bridge0: port 2(bridge_slave_1) entered disabled state [ 2259.813336][ T8889] device bridge_slave_1 entered promiscuous mode [ 2259.886929][ T1606] device bridge_slave_1 left promiscuous mode [ 2259.902231][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2259.936112][ T1606] device bridge_slave_0 left promiscuous mode [ 2259.955704][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2260.009145][ T1606] device veth1_macvtap left promiscuous mode [ 2260.025497][ T1606] device veth0_vlan left promiscuous mode [ 2260.425248][ T8927] FAULT_INJECTION: forcing a failure. [ 2260.425248][ T8927] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2260.441197][ T8927] CPU: 1 PID: 8927 Comm: syz.0.12808 Tainted: G W syzkaller #0 [ 2260.441724][ T8922] device syzkaller0 entered promiscuous mode [ 2260.450187][ T8927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2260.450204][ T8927] Call Trace: [ 2260.450211][ T8927] [ 2260.450220][ T8927] __dump_stack+0x21/0x24 [ 2260.450248][ T8927] dump_stack_lvl+0xee/0x150 [ 2260.450270][ T8927] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2260.450292][ T8927] ? __schedule+0xb8f/0x14e0 [ 2260.450319][ T8927] dump_stack+0x15/0x24 [ 2260.450346][ T8927] should_fail_ex+0x3d4/0x520 [ 2260.450385][ T8927] should_fail+0xb/0x10 [ 2260.450412][ T8927] should_fail_usercopy+0x1a/0x20 [ 2260.450440][ T8927] copyout+0x20/0xa0 [ 2260.450465][ T8927] _copy_to_iter+0x3f0/0xe50 [ 2260.517754][ T8927] ? irqentry_exit+0x37/0x40 [ 2260.522375][ T8927] ? __cfi__copy_to_iter+0x10/0x10 [ 2260.527507][ T8927] ? __virt_addr_valid+0x66/0x2e0 [ 2260.532536][ T8927] ? __kasan_check_read+0x11/0x20 [ 2260.537559][ T8927] ? __check_object_size+0x45a/0x600 [ 2260.542855][ T8927] simple_copy_to_iter+0x50/0x70 [ 2260.547790][ T8927] __skb_datagram_iter+0xf1/0x730 [ 2260.552816][ T8927] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 2260.558632][ T8927] ? __cfi_simple_copy_to_iter+0x10/0x10 [ 2260.564283][ T8927] skb_copy_datagram_iter+0x40/0x150 [ 2260.569631][ T8927] tipc_recvstream+0x6fe/0xe80 [ 2260.574429][ T8927] ? __cfi_tipc_recvstream+0x10/0x10 [ 2260.579723][ T8927] ____sys_recvmsg+0x2a0/0x590 [ 2260.584498][ T8927] ? __sys_recvmsg_sock+0x50/0x50 [ 2260.589530][ T8927] ? import_iovec+0x7c/0xb0 [ 2260.594043][ T8927] ___sys_recvmsg+0x1b2/0x510 [ 2260.598743][ T8927] ? __sys_recvmsg+0x270/0x270 [ 2260.603519][ T8927] ? __fget_files+0x2d5/0x330 [ 2260.608211][ T8927] ? __fdget+0x19c/0x220 [ 2260.612460][ T8927] __x64_sys_recvmsg+0x1ed/0x2c0 [ 2260.617405][ T8927] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 2260.622872][ T8927] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 2260.628945][ T8927] x64_sys_call+0x75/0x9a0 [ 2260.633390][ T8927] do_syscall_64+0x4c/0xa0 [ 2260.637818][ T8927] ? clear_bhb_loop+0x30/0x80 [ 2260.642608][ T8927] ? clear_bhb_loop+0x30/0x80 [ 2260.647328][ T8927] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2260.653239][ T8927] RIP: 0033:0x7f474db8f6c9 [ 2260.657665][ T8927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2260.677274][ T8927] RSP: 002b:00007f474ea21038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 2260.685688][ T8927] RAX: ffffffffffffffda RBX: 00007f474dde5fa0 RCX: 00007f474db8f6c9 [ 2260.693658][ T8927] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000004 [ 2260.701632][ T8927] RBP: 00007f474ea21090 R08: 0000000000000000 R09: 0000000000000000 [ 2260.709721][ T8927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2260.717692][ T8927] R13: 00007f474dde6038 R14: 00007f474dde5fa0 R15: 00007ffdc6a41db8 [ 2260.725668][ T8927] [ 2260.811999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2260.819538][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2260.837805][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2260.846398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2260.888940][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 2260.890697][ T8937] FAULT_INJECTION: forcing a failure. [ 2260.890697][ T8937] name failslab, interval 1, probability 0, space 0, times 0 [ 2260.896174][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2260.896923][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2260.924884][ T8937] CPU: 1 PID: 8937 Comm: syz.2.12809 Tainted: G W syzkaller #0 [ 2260.933856][ T8937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2260.943920][ T8937] Call Trace: [ 2260.947211][ T8937] [ 2260.950154][ T8937] __dump_stack+0x21/0x24 [ 2260.954618][ T8937] dump_stack_lvl+0xee/0x150 [ 2260.959229][ T8937] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2260.964270][ T8937] ? kasan_set_track+0x60/0x70 [ 2260.969081][ T8937] ? kasan_set_track+0x4b/0x70 [ 2260.973857][ T8937] ? kasan_save_alloc_info+0x25/0x30 [ 2260.979183][ T8937] dump_stack+0x15/0x24 [ 2260.983355][ T8937] should_fail_ex+0x3d4/0x520 [ 2260.988037][ T8937] __should_failslab+0xac/0xf0 [ 2260.992817][ T8937] should_failslab+0x9/0x20 [ 2260.997326][ T8937] kmem_cache_alloc_node+0x42/0x340 [ 2261.002530][ T8937] ? alloc_vmap_area+0x17b/0x1870 [ 2261.007600][ T8937] alloc_vmap_area+0x17b/0x1870 [ 2261.012451][ T8937] ? vm_map_ram+0x930/0x930 [ 2261.016949][ T8937] ? __kasan_kmalloc+0x95/0xb0 [ 2261.021719][ T8937] ? kmalloc_node_trace+0x3d/0xb0 [ 2261.026752][ T8937] __get_vm_area_node+0x160/0x360 [ 2261.031793][ T8937] __vmalloc_node_range+0x326/0x13d0 [ 2261.037119][ T8937] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.042690][ T8937] ? arch_stack_walk+0xfc/0x150 [ 2261.047557][ T8937] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 2261.053322][ T8937] ? stack_trace_save+0x98/0xe0 [ 2261.058186][ T8937] ? __cfi___vmalloc_node_range+0x10/0x10 [ 2261.063912][ T8937] ? __cfi_selinux_capable+0x10/0x10 [ 2261.069229][ T8937] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.074778][ T8937] __vmalloc+0x79/0x90 [ 2261.078845][ T8937] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.084394][ T8937] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.089768][ T8937] ? security_capable+0x99/0xc0 [ 2261.094624][ T8937] bpf_prog_alloc+0x22/0x1c0 [ 2261.099221][ T8937] bpf_prog_load+0x7c6/0x15a0 [ 2261.103899][ T8937] ? map_freeze+0x390/0x390 [ 2261.108409][ T8937] ? selinux_bpf+0xc7/0xf0 [ 2261.112825][ T8937] ? security_bpf+0x93/0xb0 [ 2261.117340][ T8937] __sys_bpf+0x504/0x780 [ 2261.121591][ T8937] ? bpf_link_show_fdinfo+0x320/0x320 [ 2261.127078][ T8937] ? __cfi_ksys_write+0x10/0x10 [ 2261.131942][ T8937] ? debug_smp_processor_id+0x17/0x20 [ 2261.137318][ T8937] __x64_sys_bpf+0x7c/0x90 [ 2261.141754][ T8937] x64_sys_call+0x488/0x9a0 [ 2261.146270][ T8937] do_syscall_64+0x4c/0xa0 [ 2261.150684][ T8937] ? clear_bhb_loop+0x30/0x80 [ 2261.155363][ T8937] ? clear_bhb_loop+0x30/0x80 [ 2261.160074][ T8937] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2261.165970][ T8937] RIP: 0033:0x7f691638f6c9 [ 2261.170386][ T8937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2261.189997][ T8937] RSP: 002b:00007f69172fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2261.198517][ T8937] RAX: ffffffffffffffda RBX: 00007f69165e5fa0 RCX: 00007f691638f6c9 [ 2261.206493][ T8937] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 2261.214458][ T8937] RBP: 00007f69172fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2261.222454][ T8937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2261.230457][ T8937] R13: 00007f69165e6038 R14: 00007f69165e5fa0 R15: 00007ffe1ebbb738 [ 2261.238440][ T8937] [ 2261.245525][ T8937] syz.2.12809: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 2261.263403][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2261.271712][ T8937] CPU: 1 PID: 8937 Comm: syz.2.12809 Tainted: G W syzkaller #0 [ 2261.280682][ T8937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2261.290776][ T8937] Call Trace: [ 2261.294079][ T8937] [ 2261.297029][ T8937] __dump_stack+0x21/0x24 [ 2261.301382][ T8937] dump_stack_lvl+0xee/0x150 [ 2261.306004][ T8937] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2261.311072][ T8937] ? pr_cont_kernfs_name+0x133/0x160 [ 2261.316485][ T8937] dump_stack+0x15/0x24 [ 2261.320661][ T8937] warn_alloc+0x1b0/0x1d0 [ 2261.325027][ T8937] ? __cfi_warn_alloc+0x10/0x10 [ 2261.329908][ T8937] ? __get_vm_area_node+0x175/0x360 [ 2261.335139][ T8937] __vmalloc_node_range+0x34b/0x13d0 [ 2261.340453][ T8937] ? arch_stack_walk+0xfc/0x150 [ 2261.345343][ T8937] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 2261.351098][ T8937] ? stack_trace_save+0x98/0xe0 [ 2261.355986][ T8937] ? __cfi___vmalloc_node_range+0x10/0x10 [ 2261.361726][ T8937] ? __cfi_selinux_capable+0x10/0x10 [ 2261.367042][ T8937] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.372621][ T8937] __vmalloc+0x79/0x90 [ 2261.376716][ T8937] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.382295][ T8937] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.387697][ T8937] ? security_capable+0x99/0xc0 [ 2261.392581][ T8937] bpf_prog_alloc+0x22/0x1c0 [ 2261.397203][ T8937] bpf_prog_load+0x7c6/0x15a0 [ 2261.401906][ T8937] ? map_freeze+0x390/0x390 [ 2261.406615][ T8937] ? selinux_bpf+0xc7/0xf0 [ 2261.411060][ T8937] ? security_bpf+0x93/0xb0 [ 2261.415595][ T8937] __sys_bpf+0x504/0x780 [ 2261.419866][ T8937] ? bpf_link_show_fdinfo+0x320/0x320 [ 2261.425353][ T8937] ? __cfi_ksys_write+0x10/0x10 [ 2261.430240][ T8937] ? debug_smp_processor_id+0x17/0x20 [ 2261.435663][ T8937] __x64_sys_bpf+0x7c/0x90 [ 2261.440129][ T8937] x64_sys_call+0x488/0x9a0 [ 2261.444670][ T8937] do_syscall_64+0x4c/0xa0 [ 2261.449119][ T8937] ? clear_bhb_loop+0x30/0x80 [ 2261.453833][ T8937] ? clear_bhb_loop+0x30/0x80 [ 2261.458543][ T8937] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2261.464471][ T8937] RIP: 0033:0x7f691638f6c9 [ 2261.468913][ T8937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2261.488558][ T8937] RSP: 002b:00007f69172fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2261.497007][ T8937] RAX: ffffffffffffffda RBX: 00007f69165e5fa0 RCX: 00007f691638f6c9 [ 2261.505028][ T8937] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 2261.513030][ T8937] RBP: 00007f69172fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2261.521050][ T8937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2261.529064][ T8937] R13: 00007f69165e6038 R14: 00007f69165e5fa0 R15: 00007ffe1ebbb738 [ 2261.537168][ T8937] [ 2261.551355][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 2261.558496][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2261.578288][ T8952] FAULT_INJECTION: forcing a failure. [ 2261.578288][ T8952] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.591188][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2261.599385][ T8937] Mem-Info: [ 2261.602811][ T8937] active_anon:8541 inactive_anon:0 isolated_anon:0 [ 2261.602811][ T8937] active_file:26567 inactive_file:3166 isolated_file:0 [ 2261.602811][ T8937] unevictable:0 dirty:658 writeback:0 [ 2261.602811][ T8937] slab_reclaimable:7631 slab_unreclaimable:74398 [ 2261.602811][ T8937] mapped:29951 shmem:163 pagetables:571 [ 2261.602811][ T8937] sec_pagetables:0 bounce:0 [ 2261.602811][ T8937] kernel_misc_reclaimable:0 [ 2261.602811][ T8937] free:1512915 free_pcp:10236 free_cma:0 [ 2261.625388][ T8952] CPU: 1 PID: 8952 Comm: syz.0.12813 Tainted: G W syzkaller #0 [ 2261.654557][ T8937] Node 0 active_anon:34664kB inactive_anon:0kB active_file:106268kB inactive_file:12664kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:119804kB dirty:2632kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5212kB pagetables:2284kB sec_pagetables:0kB all_unreclaimable? no [ 2261.656689][ T8952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2261.656704][ T8952] Call Trace: [ 2261.656710][ T8952] [ 2261.656719][ T8952] __dump_stack+0x21/0x24 [ 2261.656747][ T8952] dump_stack_lvl+0xee/0x150 [ 2261.689698][ T8937] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974188kB mlocked:0kB bounce:0kB free_pcp:5656kB local_pcp:60kB free_cma:0kB [ 2261.698956][ T8952] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2261.698987][ T8952] ? kasan_set_track+0x60/0x70 [ 2261.702401][ T8937] lowmem_reserve[]: [ 2261.705216][ T8952] ? kasan_set_track+0x4b/0x70 [ 2261.705240][ T8952] ? kasan_save_alloc_info+0x25/0x30 [ 2261.709600][ T8937] 0 [ 2261.714142][ T8952] dump_stack+0x15/0x24 [ 2261.714165][ T8952] should_fail_ex+0x3d4/0x520 [ 2261.714194][ T8952] __should_failslab+0xac/0xf0 [ 2261.714218][ T8952] should_failslab+0x9/0x20 [ 2261.714236][ T8952] kmem_cache_alloc_node+0x42/0x340 [ 2261.714261][ T8952] ? alloc_vmap_area+0x17b/0x1870 [ 2261.714280][ T8952] alloc_vmap_area+0x17b/0x1870 [ 2261.752570][ T8937] 3932 [ 2261.752611][ T8952] ? vm_map_ram+0x930/0x930 [ 2261.756744][ T8937] 3932 [ 2261.761194][ T8952] ? __kasan_kmalloc+0x95/0xb0 [ 2261.766793][ T8937] 3932 [ 2261.768980][ T8952] ? kmalloc_node_trace+0x3d/0xb0 [ 2261.773437][ T8937] [ 2261.777834][ T8952] __get_vm_area_node+0x160/0x360 [ 2261.777863][ T8952] __vmalloc_node_range+0x326/0x13d0 [ 2261.782684][ T8937] Normal free:3083256kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:34664kB inactive_anon:0kB active_file:106268kB inactive_file:12664kB unevictable:0kB writepending:2632kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:34752kB local_pcp:15064kB free_cma:0kB [ 2261.787109][ T8952] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.787138][ T8952] ? arch_stack_walk+0xfc/0x150 [ 2261.793122][ T8937] lowmem_reserve[]: [ 2261.797423][ T8952] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 2261.802276][ T8937] 0 [ 2261.805079][ T8952] ? stack_trace_save+0x98/0xe0 [ 2261.805112][ T8952] ? __cfi___vmalloc_node_range+0x10/0x10 [ 2261.805134][ T8952] ? __cfi_selinux_capable+0x10/0x10 [ 2261.810110][ T8937] 0 [ 2261.812397][ T8952] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.817427][ T8937] 0 [ 2261.819934][ T8952] __vmalloc+0x79/0x90 [ 2261.819958][ T8952] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.825548][ T8937] 0 [ 2261.827323][ T8952] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 2261.832362][ T8937] [ 2261.832371][ T8937] DMA32: [ 2261.838007][ T8952] ? security_capable+0x99/0xc0 [ 2261.838047][ T8952] bpf_prog_alloc+0x22/0x1c0 [ 2261.868498][ T8937] 3*4kB [ 2261.873816][ T8952] bpf_prog_load+0x7c6/0x15a0 [ 2261.873848][ T8952] ? map_freeze+0x390/0x390 [ 2261.879031][ T8937] (M) [ 2261.882533][ T8952] ? selinux_bpf+0xc7/0xf0 [ 2261.888468][ T8937] 1*8kB [ 2261.890738][ T8952] ? security_bpf+0x93/0xb0 [ 2261.897167][ T8937] (M) [ 2261.901432][ T8952] __sys_bpf+0x504/0x780 [ 2261.907010][ T8937] 2*16kB [ 2261.909222][ T8952] ? bpf_link_show_fdinfo+0x320/0x320 [ 2261.915174][ T8937] (M) [ 2261.917513][ T8952] ? __cfi_ksys_write+0x10/0x10 [ 2261.921760][ T8937] 3*32kB [ 2261.927411][ T8952] ? debug_smp_processor_id+0x17/0x20 [ 2261.927435][ T8952] __x64_sys_bpf+0x7c/0x90 [ 2261.930445][ T8937] (M) [ 2261.935408][ T8952] x64_sys_call+0x488/0x9a0 [ 2261.935439][ T8952] do_syscall_64+0x4c/0xa0 [ 2261.938043][ T8937] 3*64kB [ 2261.940729][ T8952] ? clear_bhb_loop+0x30/0x80 [ 2261.945906][ T8937] (M) [ 2261.950188][ T8952] ? clear_bhb_loop+0x30/0x80 [ 2261.953350][ T8937] 3*128kB [ 2261.957759][ T8952] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2261.962322][ T8937] (M) [ 2261.964950][ T8952] RIP: 0033:0x7f474db8f6c9 [ 2261.964987][ T8952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2261.969885][ T8937] 3*256kB [ 2261.972274][ T8952] RSP: 002b:00007f474ea21038 EFLAGS: 00000246 [ 2261.976973][ T8937] (M) [ 2261.979452][ T8952] ORIG_RAX: 0000000000000141 [ 2261.983989][ T8937] 3*512kB [ 2261.986620][ T8952] RAX: ffffffffffffffda RBX: 00007f474dde5fa0 RCX: 00007f474db8f6c9 [ 2261.992126][ T8937] (M) [ 2261.994740][ T8952] RDX: 0000000000000094 RSI: 0000200000000200 RDI: 0000000000000005 [ 2261.994756][ T8952] RBP: 00007f474ea21090 R08: 0000000000000000 R09: 0000000000000000 [ 2261.994770][ T8952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2261.994783][ T8952] R13: 00007f474dde6038 R14: 00007f474dde5fa0 R15: 00007ffdc6a41db8 [ 2261.994804][ T8952] [ 2262.147289][ T8937] 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 2262.155177][ T8937] Normal: 198*4kB (UME) 563*8kB (UME) 625*16kB (UME) 605*32kB (UME) 862*64kB (UME) 313*128kB (UM) 68*256kB (UM) 33*512kB (UME) 19*1024kB (UME) 11*2048kB (UME) 703*4096kB (UM) = 3085664kB [ 2262.164824][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2262.174659][ T8937] 29896 total pagecache pages [ 2262.183530][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2262.195202][ T8937] 0 pages in swap cache [ 2262.200970][ T8937] Free swap = 124996kB [ 2262.205435][ T8937] Total swap = 124996kB [ 2262.209699][ T8937] 2097051 pages RAM [ 2262.213751][ T8937] 0 pages HighMem/MovableOnly [ 2262.215900][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2262.263043][ T8937] 346840 pages reserved [ 2262.267274][ T8937] 0 pages cma reserved [ 2262.293544][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2262.365219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2262.376457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2262.405918][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2262.436118][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2262.449101][ T8889] device veth0_vlan entered promiscuous mode [ 2262.496569][ T8965] device wg2 entered promiscuous mode [ 2262.502444][ T8965] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 2262.509932][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2262.518279][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2262.532312][ T8889] device veth1_macvtap entered promiscuous mode [ 2262.568555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2262.576846][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2262.585261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2262.629000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2262.638444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2262.647220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2262.655668][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2263.753868][ T1606] device bridge_slave_1 left promiscuous mode [ 2263.760014][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2263.767622][ T1606] device bridge_slave_0 left promiscuous mode [ 2263.773863][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2263.781845][ T1606] device veth1_macvtap left promiscuous mode [ 2263.787947][ T1606] device veth0_vlan left promiscuous mode [ 2264.062892][ T8984] FAULT_INJECTION: forcing a failure. [ 2264.062892][ T8984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2264.083496][ T8989] FAULT_INJECTION: forcing a failure. [ 2264.083496][ T8989] name failslab, interval 1, probability 0, space 0, times 0 [ 2264.096453][ T8984] CPU: 0 PID: 8984 Comm: syz.0.12820 Tainted: G W syzkaller #0 [ 2264.105422][ T8984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2264.115500][ T8984] Call Trace: [ 2264.118797][ T8984] [ 2264.121753][ T8984] __dump_stack+0x21/0x24 [ 2264.126112][ T8984] dump_stack_lvl+0xee/0x150 [ 2264.130725][ T8984] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2264.135776][ T8984] ? perf_swevent_hrtimer+0x465/0x530 [ 2264.141189][ T8984] ? memcpy+0x56/0x70 [ 2264.145201][ T8984] dump_stack+0x15/0x24 [ 2264.149386][ T8984] should_fail_ex+0x3d4/0x520 [ 2264.154121][ T8984] should_fail+0xb/0x10 [ 2264.158311][ T8984] should_fail_usercopy+0x1a/0x20 [ 2264.163398][ T8984] strncpy_from_user+0x24/0x2d0 [ 2264.168280][ T8984] bpf_prog_load+0x1bb/0x15a0 [ 2264.172984][ T8984] ? map_freeze+0x390/0x390 [ 2264.177512][ T8984] ? selinux_bpf+0xc7/0xf0 [ 2264.182038][ T8984] ? security_bpf+0x93/0xb0 [ 2264.186566][ T8984] __sys_bpf+0x504/0x780 [ 2264.190935][ T8984] ? bpf_link_show_fdinfo+0x320/0x320 [ 2264.196335][ T8984] ? __cfi_sched_clock_cpu+0x10/0x10 [ 2264.201660][ T8984] __x64_sys_bpf+0x7c/0x90 [ 2264.206115][ T8984] x64_sys_call+0x488/0x9a0 [ 2264.210641][ T8984] do_syscall_64+0x4c/0xa0 [ 2264.215064][ T8984] ? clear_bhb_loop+0x30/0x80 [ 2264.219752][ T8984] ? clear_bhb_loop+0x30/0x80 [ 2264.224440][ T8984] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2264.230340][ T8984] RIP: 0033:0x7f474db8f6c9 [ 2264.234751][ T8984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2264.254401][ T8984] RSP: 002b:00007f474ea21038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2264.262816][ T8984] RAX: ffffffffffffffda RBX: 00007f474dde5fa0 RCX: 00007f474db8f6c9 [ 2264.270818][ T8984] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 2264.278789][ T8984] RBP: 00007f474ea21090 R08: 0000000000000000 R09: 0000000000000000 [ 2264.286764][ T8984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2264.294745][ T8984] R13: 00007f474dde6038 R14: 00007f474dde5fa0 R15: 00007ffdc6a41db8 [ 2264.302733][ T8984] [ 2264.333329][ T8989] CPU: 0 PID: 8989 Comm: syz.4.12823 Tainted: G W syzkaller #0 [ 2264.342322][ T8989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2264.352386][ T8989] Call Trace: [ 2264.355664][ T8989] [ 2264.358619][ T8989] __dump_stack+0x21/0x24 [ 2264.362956][ T8989] dump_stack_lvl+0xee/0x150 [ 2264.367547][ T8989] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2264.372575][ T8989] ? __get_user_nocheck_8+0x10/0x13 [ 2264.377778][ T8989] dump_stack+0x15/0x24 [ 2264.381943][ T8989] should_fail_ex+0x3d4/0x520 [ 2264.386623][ T8989] __should_failslab+0xac/0xf0 [ 2264.391409][ T8989] should_failslab+0x9/0x20 [ 2264.395915][ T8989] kmem_cache_alloc_node+0x42/0x340 [ 2264.401130][ T8989] ? __cfi_get_perf_callchain+0x10/0x10 [ 2264.406683][ T8989] ? __alloc_skb+0xea/0x4b0 [ 2264.411185][ T8989] __alloc_skb+0xea/0x4b0 [ 2264.416134][ T8989] alloc_skb_with_frags+0xa8/0x620 [ 2264.421272][ T8989] sock_alloc_send_pskb+0x853/0x980 [ 2264.426490][ T8989] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 2264.432239][ T8989] ? kvm_sched_clock_read+0x18/0x40 [ 2264.437452][ T8989] ? __this_cpu_preempt_check+0x13/0x20 [ 2264.443000][ T8989] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 2264.449254][ T8989] tun_get_user+0x4e5/0x3320 [ 2264.453936][ T8989] ? kstrtoull+0x137/0x1d0 [ 2264.458883][ T8989] ? tun_do_read+0x1c20/0x1c20 [ 2264.463708][ T8989] ? __kasan_check_write+0x14/0x20 [ 2264.468845][ T8989] ? ref_tracker_alloc+0x30f/0x430 [ 2264.473982][ T8989] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 2264.479466][ T8989] ? irqentry_exit+0x37/0x40 [ 2264.484078][ T8989] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 2264.489916][ T8989] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 2264.496097][ T8989] tun_chr_write_iter+0x1fb/0x300 [ 2264.501131][ T8989] vfs_write+0x5db/0xca0 [ 2264.505400][ T8989] ? __cfi_vfs_write+0x10/0x10 [ 2264.510187][ T8989] ? __fget_files+0x2d5/0x330 [ 2264.514951][ T8989] ? __fdget_pos+0x1f2/0x380 [ 2264.519536][ T8989] ? ksys_write+0x71/0x240 [ 2264.523944][ T8989] ksys_write+0x140/0x240 [ 2264.528270][ T8989] ? __cfi_ksys_write+0x10/0x10 [ 2264.533121][ T8989] __x64_sys_write+0x7b/0x90 [ 2264.537707][ T8989] x64_sys_call+0x27b/0x9a0 [ 2264.542300][ T8989] do_syscall_64+0x4c/0xa0 [ 2264.546715][ T8989] ? clear_bhb_loop+0x30/0x80 [ 2264.551405][ T8989] ? clear_bhb_loop+0x30/0x80 [ 2264.556087][ T8989] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2264.562003][ T8989] RIP: 0033:0x7f8f56d8f6c9 [ 2264.566418][ T8989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2264.586028][ T8989] RSP: 002b:00007f8f57bba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2264.594475][ T8989] RAX: ffffffffffffffda RBX: 00007f8f56fe5fa0 RCX: 00007f8f56d8f6c9 [ 2264.602446][ T8989] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 2264.610424][ T8989] RBP: 00007f8f57bba090 R08: 0000000000000000 R09: 0000000000000000 [ 2264.618447][ T8989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2264.626432][ T8989] R13: 00007f8f56fe6038 R14: 00007f8f56fe5fa0 R15: 00007ffd4a227bf8 [ 2264.634415][ T8989] [ 2264.986574][ T9006] bridge0: port 1(bridge_slave_0) entered blocking state [ 2264.997254][ T9006] bridge0: port 1(bridge_slave_0) entered disabled state [ 2265.005333][ T9006] device bridge_slave_0 entered promiscuous mode [ 2265.013797][ T9006] bridge0: port 2(bridge_slave_1) entered blocking state [ 2265.021360][ T9006] bridge0: port 2(bridge_slave_1) entered disabled state [ 2265.029229][ T9006] device bridge_slave_1 entered promiscuous mode [ 2265.118668][ T9025] device sit0 entered promiscuous mode [ 2265.387038][ T9035] device veth1_macvtap left promiscuous mode [ 2265.405896][ T9035] device veth1_macvtap entered promiscuous mode [ 2265.412350][ T9035] device macsec0 entered promiscuous mode [ 2265.671580][ T9048] device wg2 entered promiscuous mode [ 2265.804553][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2265.832451][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2265.875037][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2265.910008][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2265.935200][T27575] bridge0: port 1(bridge_slave_0) entered blocking state [ 2265.942305][T27575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2265.950131][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2266.004293][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2266.051229][T27575] bridge0: port 2(bridge_slave_1) entered blocking state [ 2266.058366][T27575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2266.176303][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2266.220708][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2266.309051][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2266.321392][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2266.330193][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2266.401476][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2266.423853][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2266.521200][ T9069] device veth1_macvtap left promiscuous mode [ 2266.647907][ T9006] device veth0_vlan entered promiscuous mode [ 2266.661304][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2266.674561][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2266.721794][ T9069] device veth1_macvtap entered promiscuous mode [ 2266.729613][ T9069] device macsec0 entered promiscuous mode [ 2266.829881][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2266.843401][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2266.895950][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2266.904582][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2266.913418][ T9006] device veth1_macvtap entered promiscuous mode [ 2266.964434][ T9075] FAULT_INJECTION: forcing a failure. [ 2266.964434][ T9075] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2266.977579][ T9075] CPU: 0 PID: 9075 Comm: syz.2.12844 Tainted: G W syzkaller #0 [ 2266.986571][ T9075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2266.996631][ T9075] Call Trace: [ 2266.999907][ T9075] [ 2267.002836][ T9075] __dump_stack+0x21/0x24 [ 2267.007170][ T9075] dump_stack_lvl+0xee/0x150 [ 2267.011756][ T9075] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2267.016799][ T9075] dump_stack+0x15/0x24 [ 2267.020957][ T9075] should_fail_ex+0x3d4/0x520 [ 2267.025645][ T9075] should_fail+0xb/0x10 [ 2267.029812][ T9075] should_fail_usercopy+0x1a/0x20 [ 2267.034843][ T9075] _copy_to_user+0x1e/0x90 [ 2267.039277][ T9075] simple_read_from_buffer+0xe9/0x160 [ 2267.044650][ T9075] proc_fail_nth_read+0x19a/0x210 [ 2267.049757][ T9075] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2267.055300][ T9075] ? security_file_permission+0x94/0xb0 [ 2267.060848][ T9075] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2267.066399][ T9075] vfs_read+0x26e/0x8c0 [ 2267.070577][ T9075] ? __cfi_vfs_read+0x10/0x10 [ 2267.075258][ T9075] ? __kasan_check_write+0x14/0x20 [ 2267.080359][ T9075] ? mutex_lock+0x8d/0x1a0 [ 2267.084783][ T9075] ? __cfi_mutex_lock+0x10/0x10 [ 2267.089642][ T9075] ? __fdget_pos+0x2cd/0x380 [ 2267.094226][ T9075] ? ksys_read+0x71/0x240 [ 2267.098556][ T9075] ksys_read+0x140/0x240 [ 2267.102800][ T9075] ? __cfi_ksys_read+0x10/0x10 [ 2267.107568][ T9075] ? debug_smp_processor_id+0x17/0x20 [ 2267.112987][ T9075] __x64_sys_read+0x7b/0x90 [ 2267.117486][ T9075] x64_sys_call+0x2f/0x9a0 [ 2267.121898][ T9075] do_syscall_64+0x4c/0xa0 [ 2267.126313][ T9075] ? clear_bhb_loop+0x30/0x80 [ 2267.130989][ T9075] ? clear_bhb_loop+0x30/0x80 [ 2267.135665][ T9075] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2267.141558][ T9075] RIP: 0033:0x7f691638e0dc [ 2267.145989][ T9075] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2267.165674][ T9075] RSP: 002b:00007f69172fa030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2267.174089][ T9075] RAX: ffffffffffffffda RBX: 00007f69165e5fa0 RCX: 00007f691638e0dc [ 2267.182060][ T9075] RDX: 000000000000000f RSI: 00007f69172fa0a0 RDI: 0000000000000007 [ 2267.190028][ T9075] RBP: 00007f69172fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2267.197995][ T9075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2267.205961][ T9075] R13: 00007f69165e6038 R14: 00007f69165e5fa0 R15: 00007ffe1ebbb738 [ 2267.213944][ T9075] [ 2267.221303][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2267.233516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2267.242355][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2267.255854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2267.264578][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2267.378669][ T9083] FAULT_INJECTION: forcing a failure. [ 2267.378669][ T9083] name failslab, interval 1, probability 0, space 0, times 0 [ 2267.399094][ T9077] device pim6reg1 entered promiscuous mode [ 2267.405728][ T9083] CPU: 0 PID: 9083 Comm: syz.0.12847 Tainted: G W syzkaller #0 [ 2267.414705][ T9083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2267.424777][ T9083] Call Trace: [ 2267.428071][ T9083] [ 2267.431014][ T9083] __dump_stack+0x21/0x24 [ 2267.435363][ T9083] dump_stack_lvl+0xee/0x150 [ 2267.439971][ T9083] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2267.445012][ T9083] ? __kasan_check_write+0x14/0x20 [ 2267.450141][ T9083] dump_stack+0x15/0x24 [ 2267.454319][ T9083] should_fail_ex+0x3d4/0x520 [ 2267.459023][ T9083] ? getname_flags+0xb9/0x500 [ 2267.463721][ T9083] __should_failslab+0xac/0xf0 [ 2267.468506][ T9083] should_failslab+0x9/0x20 [ 2267.473023][ T9083] kmem_cache_alloc+0x3b/0x330 [ 2267.477815][ T9083] getname_flags+0xb9/0x500 [ 2267.482336][ T9083] ? debug_smp_processor_id+0x17/0x20 [ 2267.487725][ T9083] __x64_sys_mkdirat+0x7c/0xa0 [ 2267.492598][ T9083] x64_sys_call+0x73d/0x9a0 [ 2267.497124][ T9083] do_syscall_64+0x4c/0xa0 [ 2267.501558][ T9083] ? clear_bhb_loop+0x30/0x80 [ 2267.506263][ T9083] ? clear_bhb_loop+0x30/0x80 [ 2267.510974][ T9083] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2267.516896][ T9083] RIP: 0033:0x7f474db8f6c9 [ 2267.521333][ T9083] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2267.540954][ T9083] RSP: 002b:00007f474ea00038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2267.549407][ T9083] RAX: ffffffffffffffda RBX: 00007f474dde6090 RCX: 00007f474db8f6c9 [ 2267.557400][ T9083] RDX: 00000000000001ff RSI: 0000200000000000 RDI: ffffffffffffff9c [ 2267.565376][ T9083] RBP: 00007f474ea00090 R08: 0000000000000000 R09: 0000000000000000 [ 2267.573342][ T9083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2267.581310][ T9083] R13: 00007f474dde6128 R14: 00007f474dde6090 R15: 00007ffdc6a41db8 [ 2267.589285][ T9083] [ 2268.463880][ T1606] device bridge_slave_1 left promiscuous mode [ 2268.470027][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2268.477561][ T1606] device bridge_slave_0 left promiscuous mode [ 2268.484739][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2268.492521][ T1606] device veth1_macvtap left promiscuous mode [ 2268.498586][ T1606] device veth0_vlan left promiscuous mode [ 2268.966534][ T9102] FAULT_INJECTION: forcing a failure. [ 2268.966534][ T9102] name failslab, interval 1, probability 0, space 0, times 0 [ 2269.019669][ T9102] CPU: 1 PID: 9102 Comm: syz.2.12853 Tainted: G W syzkaller #0 [ 2269.028686][ T9102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2269.038779][ T9102] Call Trace: [ 2269.042081][ T9102] [ 2269.045027][ T9102] __dump_stack+0x21/0x24 [ 2269.049386][ T9102] dump_stack_lvl+0xee/0x150 [ 2269.054005][ T9102] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2269.059045][ T9102] ? kasan_quarantine_put+0x53/0x190 [ 2269.064350][ T9102] ? kasan_quarantine_put+0x34/0x190 [ 2269.069660][ T9102] dump_stack+0x15/0x24 [ 2269.073836][ T9102] should_fail_ex+0x3d4/0x520 [ 2269.078549][ T9102] __should_failslab+0xac/0xf0 [ 2269.083346][ T9102] ? create_local_trace_uprobe+0x147/0x6f0 [ 2269.089181][ T9102] should_failslab+0x9/0x20 [ 2269.093708][ T9102] __kmem_cache_alloc_node+0x3d/0x2c0 [ 2269.099131][ T9102] ? create_local_trace_uprobe+0x147/0x6f0 [ 2269.104965][ T9102] kmalloc_trace+0x29/0xb0 [ 2269.109401][ T9102] create_local_trace_uprobe+0x147/0x6f0 [ 2269.115084][ T9102] ? __cfi_create_local_trace_uprobe+0x10/0x10 [ 2269.121263][ T9102] ? __kasan_check_write+0x14/0x20 [ 2269.126418][ T9102] ? _copy_from_user+0x8f/0xc0 [ 2269.131214][ T9102] perf_uprobe_init+0xf9/0x1a0 [ 2269.136008][ T9102] perf_uprobe_event_init+0xe6/0x180 [ 2269.141315][ T9102] perf_try_init_event+0x15b/0x450 [ 2269.146447][ T9102] perf_event_alloc+0x10f7/0x1970 [ 2269.151514][ T9102] __se_sys_perf_event_open+0x6c5/0x1b80 [ 2269.157152][ T9102] ? __kasan_check_write+0x14/0x20 [ 2269.162264][ T9102] ? mutex_unlock+0x89/0x220 [ 2269.166861][ T9102] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 2269.172501][ T9102] ? __cfi_ksys_write+0x10/0x10 [ 2269.177359][ T9102] __x64_sys_perf_event_open+0xbf/0xd0 [ 2269.182849][ T9102] x64_sys_call+0x385/0x9a0 [ 2269.187366][ T9102] do_syscall_64+0x4c/0xa0 [ 2269.191801][ T9102] ? clear_bhb_loop+0x30/0x80 [ 2269.196478][ T9102] ? clear_bhb_loop+0x30/0x80 [ 2269.201169][ T9102] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2269.207058][ T9102] RIP: 0033:0x7f691638f6c9 [ 2269.211467][ T9102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2269.231072][ T9102] RSP: 002b:00007f69172fa038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2269.239516][ T9102] RAX: ffffffffffffffda RBX: 00007f69165e5fa0 RCX: 00007f691638f6c9 [ 2269.247500][ T9102] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 2269.255480][ T9102] RBP: 00007f69172fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2269.263451][ T9102] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2269.271419][ T9102] R13: 00007f69165e6038 R14: 00007f69165e5fa0 R15: 00007ffe1ebbb738 [ 2269.279430][ T9102] [ 2269.287274][ T9102] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 2270.560915][ T9109] bridge0: port 1(bridge_slave_0) entered blocking state [ 2270.569588][ T9109] bridge0: port 1(bridge_slave_0) entered disabled state [ 2270.577445][ T9109] device bridge_slave_0 entered promiscuous mode [ 2270.590195][ T9109] bridge0: port 2(bridge_slave_1) entered blocking state [ 2270.597792][ T9109] bridge0: port 2(bridge_slave_1) entered disabled state [ 2270.613258][ T9109] device bridge_slave_1 entered promiscuous mode [ 2270.646861][ T9137] FAULT_INJECTION: forcing a failure. [ 2270.646861][ T9137] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2270.665208][ T9137] CPU: 0 PID: 9137 Comm: syz.2.12864 Tainted: G W syzkaller #0 [ 2270.674202][ T9137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2270.684279][ T9137] Call Trace: [ 2270.687574][ T9137] [ 2270.690518][ T9137] __dump_stack+0x21/0x24 [ 2270.694875][ T9137] dump_stack_lvl+0xee/0x150 [ 2270.699494][ T9137] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2270.704536][ T9137] ? memcpy+0x56/0x70 [ 2270.708532][ T9137] dump_stack+0x15/0x24 [ 2270.712702][ T9137] should_fail_ex+0x3d4/0x520 [ 2270.717406][ T9137] should_fail+0xb/0x10 [ 2270.721584][ T9137] should_fail_usercopy+0x1a/0x20 [ 2270.726633][ T9137] strncpy_from_user+0x24/0x2d0 [ 2270.731542][ T9137] bpf_prog_load+0x1bb/0x15a0 [ 2270.736245][ T9137] ? map_freeze+0x390/0x390 [ 2270.740802][ T9137] ? selinux_bpf+0xc7/0xf0 [ 2270.745350][ T9137] ? security_bpf+0x93/0xb0 [ 2270.749885][ T9137] __sys_bpf+0x504/0x780 [ 2270.754166][ T9137] ? bpf_link_show_fdinfo+0x320/0x320 [ 2270.759576][ T9137] ? __cfi_ksys_write+0x10/0x10 [ 2270.764454][ T9137] ? debug_smp_processor_id+0x17/0x20 [ 2270.769858][ T9137] __x64_sys_bpf+0x7c/0x90 [ 2270.774332][ T9137] x64_sys_call+0x488/0x9a0 [ 2270.778875][ T9137] do_syscall_64+0x4c/0xa0 [ 2270.783360][ T9137] ? clear_bhb_loop+0x30/0x80 [ 2270.788085][ T9137] ? clear_bhb_loop+0x30/0x80 [ 2270.792796][ T9137] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2270.798717][ T9137] RIP: 0033:0x7f691638f6c9 [ 2270.803159][ T9137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2270.822790][ T9137] RSP: 002b:00007f69172fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2270.831236][ T9137] RAX: ffffffffffffffda RBX: 00007f69165e5fa0 RCX: 00007f691638f6c9 [ 2270.839234][ T9137] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 2270.847230][ T9137] RBP: 00007f69172fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2270.855225][ T9137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2270.863397][ T9137] R13: 00007f69165e6038 R14: 00007f69165e5fa0 R15: 00007ffe1ebbb738 [ 2270.871403][ T9137] [ 2271.459221][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2271.483496][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2271.549610][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2271.587948][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2271.596716][T27575] bridge0: port 1(bridge_slave_0) entered blocking state [ 2271.603796][T27575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2271.614169][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2271.628239][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2271.639456][T27575] bridge0: port 2(bridge_slave_1) entered blocking state [ 2271.646567][T27575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2271.672153][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2271.699900][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2271.721904][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2271.791057][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2271.823311][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2271.883963][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2271.934310][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2271.985817][ T9109] device veth0_vlan entered promiscuous mode [ 2272.038880][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2272.062911][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2272.129455][ T9109] device veth1_macvtap entered promiscuous mode [ 2272.223039][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2272.236603][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2272.257823][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2272.310095][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2272.319569][T27575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2272.442079][ T9177] device syzkaller0 entered promiscuous mode [ 2273.704134][T27575] device bridge_slave_1 left promiscuous mode [ 2273.710283][T27575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2273.717855][T27575] device bridge_slave_0 left promiscuous mode [ 2273.724103][T27575] bridge0: port 1(bridge_slave_0) entered disabled state [ 2273.732024][T27575] device veth1_macvtap left promiscuous mode [ 2273.738108][T27575] device veth0_vlan left promiscuous mode [ 2274.080711][ T28] audit: type=1400 audit(1762314970.247:149): avc: denied { create } for pid=9192 comm="syz.0.12877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 2276.427610][ T9208] bridge0: port 1(bridge_slave_0) entered blocking state [ 2276.456111][ T9208] bridge0: port 1(bridge_slave_0) entered disabled state [ 2276.463978][ T9208] device bridge_slave_0 entered promiscuous mode [ 2276.539817][ T9208] bridge0: port 2(bridge_slave_1) entered blocking state [ 2276.549083][ T9208] bridge0: port 2(bridge_slave_1) entered disabled state [ 2276.556997][ T9208] device bridge_slave_1 entered promiscuous mode [ 2276.739220][ T9208] bridge0: port 2(bridge_slave_1) entered blocking state [ 2276.746410][ T9208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2276.753679][ T9208] bridge0: port 1(bridge_slave_0) entered blocking state [ 2276.760711][ T9208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2276.825211][ T1606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2276.833069][ T1606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2276.841044][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2276.849136][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2276.899929][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2276.909289][ T1606] bridge0: port 1(bridge_slave_0) entered blocking state [ 2276.916393][ T1606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2276.929411][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2276.963323][ T1606] bridge0: port 2(bridge_slave_1) entered blocking state [ 2276.970435][ T1606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2276.982713][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2277.040617][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2277.992871][ T9253] bridge0: port 1(bridge_slave_0) entered blocking state [ 2278.017629][ T9253] bridge0: port 1(bridge_slave_0) entered disabled state [ 2278.025495][ T9253] device bridge_slave_0 entered promiscuous mode [ 2278.037086][ T9254] bridge0: port 1(bridge_slave_0) entered blocking state [ 2278.044734][ T9254] bridge0: port 1(bridge_slave_0) entered disabled state [ 2278.052305][ T9254] device bridge_slave_0 entered promiscuous mode [ 2278.060120][ T9253] bridge0: port 2(bridge_slave_1) entered blocking state [ 2278.067865][ T9253] bridge0: port 2(bridge_slave_1) entered disabled state [ 2278.075386][ T9253] device bridge_slave_1 entered promiscuous mode [ 2278.085105][ T9254] bridge0: port 2(bridge_slave_1) entered blocking state [ 2278.092168][ T9254] bridge0: port 2(bridge_slave_1) entered disabled state [ 2278.103121][ T9254] device bridge_slave_1 entered promiscuous mode [ 2278.310178][ T9267] bridge0: port 1(bridge_slave_0) entered blocking state [ 2278.319521][ T9267] bridge0: port 1(bridge_slave_0) entered disabled state [ 2278.327469][ T9267] device bridge_slave_0 entered promiscuous mode [ 2278.338631][ T9253] bridge0: port 2(bridge_slave_1) entered blocking state [ 2278.345817][ T9253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2278.353138][ T9253] bridge0: port 1(bridge_slave_0) entered blocking state [ 2278.360182][ T9253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2278.404847][ T9267] bridge0: port 2(bridge_slave_1) entered blocking state [ 2278.411945][ T9267] bridge0: port 2(bridge_slave_1) entered disabled state [ 2278.419842][ T9267] device bridge_slave_1 entered promiscuous mode [ 2278.444996][ T9265] bridge0: port 1(bridge_slave_0) entered blocking state [ 2278.452263][ T9265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2278.459880][ T9265] device bridge_slave_0 entered promiscuous mode [ 2278.468517][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 2278.475914][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 2278.518342][ T9265] bridge0: port 2(bridge_slave_1) entered blocking state [ 2278.525445][ T9265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2278.533197][ T9265] device bridge_slave_1 entered promiscuous mode [ 2278.695750][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2278.704327][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2278.749112][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2278.757784][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2278.766698][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 2278.773803][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2278.781515][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2278.790273][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2278.798867][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 2278.805945][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2279.031457][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2279.039784][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2279.049195][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2279.058186][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2279.086874][T27575] GPL: port 1(erspan0) entered disabled state [ 2279.098117][T27575] device erspan0 left promiscuous mode [ 2279.104039][T27575] GPL: port 1(erspan0) entered disabled state [ 2279.129108][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2279.138565][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2279.207633][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2279.215838][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2279.224099][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2279.231621][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2279.251997][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2279.259651][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2279.303356][ T9253] device veth0_vlan entered promiscuous mode [ 2279.328298][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2279.336808][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2279.345205][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 2279.352237][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2279.359745][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2279.368423][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2279.376683][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 2279.383722][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2279.391102][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2279.399337][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2279.407378][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2279.424559][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2279.432618][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2279.443708][ T9253] device veth1_macvtap entered promiscuous mode [ 2279.464971][T27575] device bridge_slave_1 left promiscuous mode [ 2279.471154][T27575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2279.479283][T27575] device bridge_slave_0 left promiscuous mode [ 2279.485950][T27575] bridge0: port 1(bridge_slave_0) entered disabled state [ 2279.493924][T27575] device bridge_slave_1 left promiscuous mode [ 2279.500220][T27575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2279.507931][T27575] device bridge_slave_0 left promiscuous mode [ 2279.514156][T27575] bridge0: port 1(bridge_slave_0) entered disabled state [ 2279.523644][T27575] device veth1_macvtap left promiscuous mode [ 2279.530192][T27575] device veth1_macvtap left promiscuous mode [ 2279.536257][T27575] device veth0_vlan left promiscuous mode [ 2279.542311][T27575] device veth1_macvtap left promiscuous mode [ 2279.576546][ T9316] FAULT_INJECTION: forcing a failure. [ 2279.576546][ T9316] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2279.589776][ T9316] CPU: 1 PID: 9316 Comm: syz.4.12907 Tainted: G W syzkaller #0 [ 2279.598740][ T9316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2279.608860][ T9316] Call Trace: [ 2279.612136][ T9316] [ 2279.615064][ T9316] __dump_stack+0x21/0x24 [ 2279.619393][ T9316] dump_stack_lvl+0xee/0x150 [ 2279.623976][ T9316] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2279.628992][ T9316] dump_stack+0x15/0x24 [ 2279.633148][ T9316] should_fail_ex+0x3d4/0x520 [ 2279.637827][ T9316] should_fail+0xb/0x10 [ 2279.641979][ T9316] should_fail_usercopy+0x1a/0x20 [ 2279.647002][ T9316] _copy_to_user+0x1e/0x90 [ 2279.651417][ T9316] simple_read_from_buffer+0xe9/0x160 [ 2279.656781][ T9316] proc_fail_nth_read+0x19a/0x210 [ 2279.661802][ T9316] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2279.667441][ T9316] ? security_file_permission+0x94/0xb0 [ 2279.673002][ T9316] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 2279.678557][ T9316] vfs_read+0x26e/0x8c0 [ 2279.682723][ T9316] ? __cfi_vfs_read+0x10/0x10 [ 2279.687397][ T9316] ? __kasan_check_write+0x14/0x20 [ 2279.692497][ T9316] ? mutex_lock+0x8d/0x1a0 [ 2279.696910][ T9316] ? __cfi_mutex_lock+0x10/0x10 [ 2279.701756][ T9316] ? __fdget_pos+0x2cd/0x380 [ 2279.706336][ T9316] ? ksys_read+0x71/0x240 [ 2279.710695][ T9316] ksys_read+0x140/0x240 [ 2279.714942][ T9316] ? fput+0x154/0x1a0 [ 2279.718923][ T9316] ? __cfi_ksys_read+0x10/0x10 [ 2279.723690][ T9316] ? debug_smp_processor_id+0x17/0x20 [ 2279.729060][ T9316] __x64_sys_read+0x7b/0x90 [ 2279.733567][ T9316] x64_sys_call+0x2f/0x9a0 [ 2279.737994][ T9316] do_syscall_64+0x4c/0xa0 [ 2279.742406][ T9316] ? clear_bhb_loop+0x30/0x80 [ 2279.747090][ T9316] ? clear_bhb_loop+0x30/0x80 [ 2279.751781][ T9316] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2279.757690][ T9316] RIP: 0033:0x7f8f56d8e0dc [ 2279.762125][ T9316] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2279.781739][ T9316] RSP: 002b:00007f8f57b78030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2279.790183][ T9316] RAX: ffffffffffffffda RBX: 00007f8f56fe6180 RCX: 00007f8f56d8e0dc [ 2279.798153][ T9316] RDX: 000000000000000f RSI: 00007f8f57b780a0 RDI: 000000000000000c [ 2279.806132][ T9316] RBP: 00007f8f57b78090 R08: 0000000000000000 R09: 0000000000000000 [ 2279.814093][ T9316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2279.822056][ T9316] R13: 00007f8f56fe6218 R14: 00007f8f56fe6180 R15: 00007ffd4a227bf8 [ 2279.830042][ T9316] [ 2280.197640][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2280.206008][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2280.214224][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2280.222737][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2280.231129][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2280.303093][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2280.311753][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2280.320108][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2280.327947][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2280.335530][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2280.343971][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2280.355163][ T9254] device veth0_vlan entered promiscuous mode [ 2280.378301][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2280.385835][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2280.394252][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2280.402145][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2280.410493][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2280.419055][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2280.427459][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 2280.434523][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2280.442088][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2280.450501][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2280.458964][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 2280.466045][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2280.473536][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2280.481961][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2280.490208][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 2280.497258][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2280.504887][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2280.513688][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2280.522131][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 2280.529224][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2280.536761][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2280.544296][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2280.551821][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2280.559738][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2280.609778][ T9319] device sit0 left promiscuous mode [ 2280.621726][ T9320] device sit0 entered promiscuous mode [ 2280.684972][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2280.693475][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2280.701656][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2280.709829][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2280.718137][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2280.726512][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2280.734788][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2280.743055][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2280.785252][ T9254] device veth1_macvtap entered promiscuous mode [ 2280.794110][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2280.807117][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2280.815421][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2280.868216][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2280.903929][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2280.946127][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2280.994252][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2281.052877][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2281.073875][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2281.128711][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2281.163465][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2281.219262][ T9265] device veth0_vlan entered promiscuous mode [ 2281.266104][ T9267] device veth0_vlan entered promiscuous mode [ 2281.274219][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2281.295213][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2281.325877][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2281.364550][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2281.403434][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2281.443441][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2281.473502][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2281.511813][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2281.537118][ T9265] device veth1_macvtap entered promiscuous mode [ 2281.559976][ T9267] device veth1_macvtap entered promiscuous mode [ 2281.582209][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2281.602371][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2281.620765][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2281.640416][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2281.654319][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2281.662720][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2281.699996][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2281.711137][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2281.720599][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2281.728893][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2281.737907][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2281.746342][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2281.803409][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2281.812641][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2281.915637][ T9341] device sit0 entered promiscuous mode [ 2282.086392][ T9342] device syzkaller0 entered promiscuous mode [ 2282.145976][ T9344] device veth0_vlan left promiscuous mode [ 2282.161399][ T9344] device veth0_vlan entered promiscuous mode [ 2282.336755][ T28] audit: type=1400 audit(1762314978.507:150): avc: denied { read } for pid=9357 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2282.486518][ T28] audit: type=1400 audit(1762314978.537:151): avc: denied { open } for pid=9357 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2283.798505][ T9357] bridge0: port 1(bridge_slave_0) entered blocking state [ 2283.805857][ T9357] bridge0: port 1(bridge_slave_0) entered disabled state [ 2283.813504][ T9357] device bridge_slave_0 entered promiscuous mode [ 2283.854953][ T9357] bridge0: port 2(bridge_slave_1) entered blocking state [ 2283.862166][ T9357] bridge0: port 2(bridge_slave_1) entered disabled state [ 2283.870818][ T9357] device bridge_slave_1 entered promiscuous mode [ 2284.219061][T27575] device bridge_slave_1 left promiscuous mode [ 2284.229753][T27575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2284.296425][T27575] device bridge_slave_0 left promiscuous mode [ 2284.306925][T27575] bridge0: port 1(bridge_slave_0) entered disabled state [ 2284.345667][T27575] device veth1_macvtap left promiscuous mode [ 2284.353734][T27575] device veth0_vlan left promiscuous mode [ 2284.930034][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2284.944439][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2284.994292][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2285.004820][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2285.014028][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 2285.021111][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2285.066580][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2285.108782][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2285.132321][ T9399] FAULT_INJECTION: forcing a failure. [ 2285.132321][ T9399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2285.182275][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 2285.189481][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2285.207314][ T9399] CPU: 0 PID: 9399 Comm: syz.4.12924 Tainted: G W syzkaller #0 [ 2285.216370][ T9399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2285.226460][ T9399] Call Trace: [ 2285.229760][ T9399] [ 2285.232712][ T9399] __dump_stack+0x21/0x24 [ 2285.237087][ T9399] dump_stack_lvl+0xee/0x150 [ 2285.241706][ T9399] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2285.246751][ T9399] ? vfs_write+0x75d/0xca0 [ 2285.251209][ T9399] dump_stack+0x15/0x24 [ 2285.255394][ T9399] should_fail_ex+0x3d4/0x520 [ 2285.260096][ T9399] should_fail+0xb/0x10 [ 2285.264286][ T9399] should_fail_usercopy+0x1a/0x20 [ 2285.269343][ T9399] _copy_from_user+0x1e/0xc0 [ 2285.273957][ T9399] __sys_bpf+0x277/0x780 [ 2285.278225][ T9399] ? bpf_link_show_fdinfo+0x320/0x320 [ 2285.283632][ T9399] ? __cfi_ksys_write+0x10/0x10 [ 2285.288502][ T9399] ? debug_smp_processor_id+0x17/0x20 [ 2285.293897][ T9399] __x64_sys_bpf+0x7c/0x90 [ 2285.298347][ T9399] x64_sys_call+0x488/0x9a0 [ 2285.302884][ T9399] do_syscall_64+0x4c/0xa0 [ 2285.307327][ T9399] ? clear_bhb_loop+0x30/0x80 [ 2285.312036][ T9399] ? clear_bhb_loop+0x30/0x80 [ 2285.316741][ T9399] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2285.322677][ T9399] RIP: 0033:0x7f8f56d8f6c9 [ 2285.327109][ T9399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2285.346738][ T9399] RSP: 002b:00007f8f57b99038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2285.355181][ T9399] RAX: ffffffffffffffda RBX: 00007f8f56fe6090 RCX: 00007f8f56d8f6c9 [ 2285.363180][ T9399] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 2285.371176][ T9399] RBP: 00007f8f57b99090 R08: 0000000000000000 R09: 0000000000000000 [ 2285.379175][ T9399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2285.387165][ T9399] R13: 00007f8f56fe6128 R14: 00007f8f56fe6090 R15: 00007ffd4a227bf8 [ 2285.395165][ T9399] [ 2285.483304][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2285.495566][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2285.504225][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2285.571391][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2285.583724][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2285.692387][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2285.705313][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2285.804255][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2285.823842][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2285.867836][ T9357] device veth0_vlan entered promiscuous mode [ 2285.875743][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2285.885100][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2286.031814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2286.048976][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2286.065622][ T9357] device veth1_macvtap entered promiscuous mode [ 2286.147922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2286.177973][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2286.188116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2286.270153][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2286.284043][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2287.142712][ T28] audit: type=1400 audit(1762314983.307:152): avc: denied { ioctl } for pid=9427 comm="syz.9.12934" path="uts:[4026532305]" dev="nsfs" ino=4026532305 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2287.952320][ T9433] bridge0: port 1(bridge_slave_0) entered blocking state [ 2287.985552][ T9433] bridge0: port 1(bridge_slave_0) entered disabled state [ 2288.015031][ T9433] device bridge_slave_0 entered promiscuous mode [ 2288.072735][ T9433] bridge0: port 2(bridge_slave_1) entered blocking state [ 2288.082468][ T9433] bridge0: port 2(bridge_slave_1) entered disabled state [ 2288.107992][ T9433] device bridge_slave_1 entered promiscuous mode [ 2288.251849][ T9433] bridge0: port 2(bridge_slave_1) entered blocking state [ 2288.258978][ T9433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2288.266304][ T9433] bridge0: port 1(bridge_slave_0) entered blocking state [ 2288.273375][ T9433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2288.380303][T27575] device bridge_slave_1 left promiscuous mode [ 2288.387451][T27575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2288.395644][T27575] device bridge_slave_0 left promiscuous mode [ 2288.402072][T27575] bridge0: port 1(bridge_slave_0) entered disabled state [ 2288.410549][T27575] device veth1_macvtap left promiscuous mode [ 2288.416670][T27575] device veth0_vlan left promiscuous mode [ 2288.475041][ T9480] FAULT_INJECTION: forcing a failure. [ 2288.475041][ T9480] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2288.583865][ T9480] CPU: 1 PID: 9480 Comm: syz.4.12946 Tainted: G W syzkaller #0 [ 2288.592877][ T9480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2288.602942][ T9480] Call Trace: [ 2288.606233][ T9480] [ 2288.609173][ T9480] __dump_stack+0x21/0x24 [ 2288.613507][ T9480] dump_stack_lvl+0xee/0x150 [ 2288.618099][ T9480] ? __cfi_dump_stack_lvl+0x8/0x8 [ 2288.623128][ T9480] dump_stack+0x15/0x24 [ 2288.627293][ T9480] should_fail_ex+0x3d4/0x520 [ 2288.631971][ T9480] should_fail_alloc_page+0x61/0x90 [ 2288.637178][ T9480] prepare_alloc_pages+0x148/0x5f0 [ 2288.642296][ T9480] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 2288.647494][ T9480] ? slab_post_alloc_hook+0x4f/0x2d0 [ 2288.652780][ T9480] ? alloc_vmap_area+0x17b/0x1870 [ 2288.657799][ T9480] ? __get_vm_area_node+0x160/0x360 [ 2288.663007][ T9480] ? __vmalloc_node_range+0x326/0x13d0 [ 2288.668468][ T9480] __alloc_pages+0x124/0x450 [ 2288.673058][ T9480] ? __cfi___alloc_pages+0x10/0x10 [ 2288.678171][ T9480] ? __kasan_check_write+0x14/0x20 [ 2288.683289][ T9480] ? _raw_spin_lock+0x8e/0xe0 [ 2288.687960][ T9480] ? __cfi__raw_spin_lock+0x10/0x10 [ 2288.693162][ T9480] __get_free_pages+0xe/0x30 [ 2288.697751][ T9480] kasan_populate_vmalloc_pte+0x29/0x120 [ 2288.703379][ T9480] __apply_to_page_range+0x8de/0xc80 [ 2288.708667][ T9480] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 2288.714908][ T9480] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 2288.721139][ T9480] apply_to_page_range+0x3b/0x50 [ 2288.726076][ T9480] kasan_populate_vmalloc+0x60/0x70 [ 2288.731273][ T9480] alloc_vmap_area+0x173e/0x1870 [ 2288.736207][ T9480] ? vm_map_ram+0x930/0x930 [ 2288.740703][ T9480] ? __kasan_kmalloc+0x95/0xb0 [ 2288.745475][ T9480] ? kmalloc_node_trace+0x3d/0xb0 [ 2288.750525][ T9480] __get_vm_area_node+0x160/0x360 [ 2288.755557][ T9480] __vmalloc_node_range+0x326/0x13d0 [ 2288.760834][ T9480] ? prealloc_init+0x146/0x8f0 [ 2288.765602][ T9480] ? pcpu_memcg_post_alloc_hook+0x177/0x270 [ 2288.771497][ T9480] ? __bitmap_weight+0xb3/0x100 [ 2288.776355][ T9480] ? __cfi___vmalloc_node_range+0x10/0x10 [ 2288.782071][ T9480] ? __alloc_percpu_gfp+0x25/0x30 [ 2288.787097][ T9480] ? pcpu_alloc+0x1108/0x16b0 [ 2288.791775][ T9480] bpf_map_area_alloc+0xd7/0xe0 [ 2288.796636][ T9480] ? prealloc_init+0x146/0x8f0 [ 2288.801419][ T9480] prealloc_init+0x146/0x8f0 [ 2288.806027][ T9480] htab_map_alloc+0xb24/0xfd0 [ 2288.810707][ T9480] map_create+0x49c/0xd80 [ 2288.815032][ T9480] __sys_bpf+0x30b/0x780 [ 2288.819266][ T9480] ? bpf_link_show_fdinfo+0x320/0x320 [ 2288.824636][ T9480] ? __cfi_ksys_write+0x10/0x10 [ 2288.829482][ T9480] ? debug_smp_processor_id+0x17/0x20 [ 2288.834864][ T9480] __x64_sys_bpf+0x7c/0x90 [ 2288.839282][ T9480] x64_sys_call+0x488/0x9a0 [ 2288.843785][ T9480] do_syscall_64+0x4c/0xa0 [ 2288.848199][ T9480] ? clear_bhb_loop+0x30/0x80 [ 2288.852880][ T9480] ? clear_bhb_loop+0x30/0x80 [ 2288.857558][ T9480] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2288.863468][ T9480] RIP: 0033:0x7f8f56d8f6c9 [ 2288.867880][ T9480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2288.887486][ T9480] RSP: 002b:00007f8f57bba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2288.895901][ T9480] RAX: ffffffffffffffda RBX: 00007f8f56fe5fa0 RCX: 00007f8f56d8f6c9 [ 2288.903871][ T9480] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 2288.911834][ T9480] RBP: 00007f8f57bba090 R08: 0000000000000000 R09: 0000000000000000 [ 2288.919800][ T9480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2288.927763][ T9480] R13: 00007f8f56fe6038 R14: 00007f8f56fe5fa0 R15: 00007ffd4a227bf8 [ 2288.935736][ T9480] [ 2289.017639][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 2289.025362][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 2289.096934][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2289.106157][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2289.146452][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2289.155167][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2289.179117][ T1606] bridge0: port 1(bridge_slave_0) entered blocking state [ 2289.186295][ T1606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2289.279357][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2289.289178][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2289.300927][ T1606] bridge0: port 2(bridge_slave_1) entered blocking state [ 2289.308002][ T1606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2289.378357][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2289.391631][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2289.428602][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2289.439530][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2289.567846][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2289.595524][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2289.666151][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2289.696460][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2289.704968][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2289.712619][ T1606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2289.721229][ T9433] device veth0_vlan entered promiscuous mode [ 2289.815635][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2289.827868][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2289.863801][ T9433] device veth1_macvtap entered promiscuous mode [ 2289.914139][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2289.936493][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2289.962357][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2289.984501][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2289.997508][ T4347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2291.783326][T27575] device bridge_slave_1 left promiscuous mode [ 2291.789585][T27575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2291.804934][T27575] device bridge_slave_0 left promiscuous mode [ 2291.811178][T27575] bridge0: port 1(bridge_slave_0) entered disabled state [ 2291.820243][T27575] device bridge_slave_1 left promiscuous mode [ 2291.826486][T27575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2291.834878][T27575] device bridge_slave_0 left promiscuous mode [ 2291.841021][T27575] bridge0: port 1(bridge_slave_0) entered disabled state [ 2291.849969][T27575] device veth1_macvtap left promiscuous mode [ 2291.856102][T27575] device veth0_vlan left promiscuous mode [ 2291.862688][T27575] device veth1_macvtap left promiscuous mode [ 2291.868770][T27575] device veth0_vlan left promiscuous mode [ 2292.885136][T27575] GPL: port 1(erspan0) entered disabled state [ 2292.893182][T27575] device erspan0 left promiscuous mode [ 2292.898642][T27575] GPL: port 1(erspan0) entered disabled state [ 2293.103990][T27575] device bridge_slave_1 left promiscuous mode [ 2293.110142][T27575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2293.117658][T27575] device bridge_slave_0 left promiscuous mode [ 2293.123896][T27575] bridge0: port 1(bridge_slave_0) entered disabled state [ 2293.132069][T27575] device bridge_slave_1 left promiscuous mode [ 2293.138288][T27575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2293.145724][T27575] device bridge_slave_0 left promiscuous mode [ 2293.151842][T27575] bridge0: port 1(bridge_slave_0) entered disabled state [ 2293.160227][T27575] device veth1_macvtap left promiscuous mode [ 2293.166261][T27575] device veth0_vlan left promiscuous mode [ 2293.172368][T27575] device veth0_vlan left promiscuous mode [ 2293.178414][T27575] device veth1_macvtap left promiscuous mode [ 2293.184459][T27575] device veth0_vlan left promiscuous mode