last executing test programs: 1m31.208169466s ago: executing program 1 (id=4696): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0x0, r0, 0x0) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0xfffffffffffffeb6) perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x8c, 0x5, 0x2, 0x0, 0x0, 0x100, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x100000001, 0x10001}, 0x10e40, 0x8000000000000000, 0x7, 0x2, 0x6, 0x1, 0x1, 0x0, 0x8}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={0x0, &(0x7f00000009c0)=""/74, 0x0, 0x4a, 0x0, 0xff, 0x10000, @value}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d40)=r4, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) 1m31.207101326s ago: executing program 0 (id=4697): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xfffffff5) 1m31.104003888s ago: executing program 0 (id=4699): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0076000000000000000000000000000000000000bebc97a6b05aa6527febd62956bb47d2ac86e2967a0b234cef"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x4e3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1m30.813491522s ago: executing program 0 (id=4701): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@restrict={0xb, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000600)=""/105, 0x28, 0x69, 0x1, 0x69, 0x0, @void, @value}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) (async, rerun: 64) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async, rerun: 32) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 32) r7 = openat$cgroup_ro(r6, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) (async, rerun: 32) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x401, 0x0}, 0x8) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r4, 0x0, 0x0, 0x0}, 0x30) (async) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e74424f", 0xb0, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) (async, rerun: 64) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)=@generic={&(0x7f0000000700)='./cgroup/../file0\x00', 0x0, 0x8}, 0x18) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r3, 0x58, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r14 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x2c, &(0x7f0000000a00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @generic={0xe, 0x5, 0xd, 0x1, 0x6}, @map_fd={0x18, 0x8, 0x1, 0x0, r1}, @alu={0x4, 0x1, 0x5, 0x0, 0x2, 0xffffffffffffffff, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000b80)='syzkaller\x00', 0x40e, 0x54, &(0x7f0000000bc0)=""/84, 0x0, 0x4c, '\x00', 0x0, 0x1b, r5, 0x8, &(0x7f0000000c40)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000c80)={0x0, 0xa, 0x80000000, 0x7}, 0x10, r9, 0x0, 0x9, &(0x7f0000000cc0)=[r7, r7], &(0x7f0000000d00)=[{0x0, 0x5, 0x6, 0xa}, {0x5, 0x5, 0x1, 0x3}, {0x3, 0x5, 0x5, 0x3}, {0x4, 0x4, 0xd, 0x9}, {0x0, 0x4, 0x8, 0x1}, {0x5, 0x2, 0x9, 0x1}, {0x5, 0x3, 0x3}, {0x8, 0x2, 0xa, 0xb}, {0x4, 0x5, 0xd, 0xb}], 0x10, 0x3ff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x7, 0x10, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@jmp={0x5, 0x1, 0x1, 0x5, 0x2, 0xfffffffffffffffe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000840)='GPL\x00', 0x3, 0x49, &(0x7f0000000880)=""/73, 0x41100, 0x29, '\x00', r13, @fallback=0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x8, 0x937e, 0x8001}, 0x10, 0xffffffffffffffff, r14, 0x5, 0x0, &(0x7f0000000e80)=[{0x1, 0x3, 0x8, 0x9}, {0x3, 0x3, 0x7, 0x2}, {0x1, 0x5, 0x4, 0x9}, {0x0, 0x5, 0xe, 0x3}, {0x4, 0x1, 0x0, 0xc}], 0x10, 0xfffffa8f, @void, @value}, 0x94) 1m30.794389555s ago: executing program 1 (id=4702): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="007065060fd05c65c25900f288a84a4788f7"], 0xfdef) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f00000000c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x25, &(0x7f0000000540)=ANY=[@ANYBLOB="98110000eecaf1b8f9a54a5b501c24b5a519ad4ce631a79c4ae245db72f8b5c091b09aa3795ab1bb3d0e78dc1a29416c621dfd38702305588785e0161bd50dbddaaa2989b30aac5ee12f115a6e435b6146b27aa1dd7eabee81c681a7bbc0a0834765ec", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000c414ffff040000009500000000000000b7080000000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4c, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000900)={'syz_tun\x00', @random='\x00\x00\x00 \x00'}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) 1m30.794093885s ago: executing program 3 (id=4703): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r4}, &(0x7f00000008c0), &(0x7f0000000900)=r3}, 0x20) 1m30.735818781s ago: executing program 0 (id=4705): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x24) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r6, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x429, 0x3, 0x10004, 0x2, r5, 0x800, '\x00', r7, r8, 0x5, 0x2, 0x0, 0x2, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x13, 0xffff, 0x80000000, 0x467a, 0x40054, r6, 0x8, '\x00', r7, r8, 0x0, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x18, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000540), &(0x7f0000000700), 0x8, 0x16, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r9, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1f, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x72, '\x00', r7, @fallback=0x2a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r11, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000340)=r4, 0x4) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xc, 0x4, 0xc4f, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000100), 0x6c7, r13}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000440), 0x23, r13}, 0x38) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 1m30.478242302s ago: executing program 3 (id=4706): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x3, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='rss_stat\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19) 1m29.844388277s ago: executing program 3 (id=4710): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r3}, 0x11) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="65a7a5b42a9ea5f313f8e364d31b00000000000104000000000080000000000000", @ANYRES8=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYRES32, @ANYRES8=0x0, @ANYRES32], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc020, 0xc8}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYRES8=r4], 0xcfa4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a5e827632f2c0bdb828a50cf0e224afc5105be6a4bb5562ec8c13198627022632c9885c4926a378212"], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="150000001000"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f0000000040), 0x2}, 0x20) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0xd, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3}, 0x460, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 1m29.800211072s ago: executing program 1 (id=4711): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0076000000000000000000000000000000000000bebc97a6b05aa6527febd62956bb47d2ac86e2967a0b234cef"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x4e3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1m29.799902232s ago: executing program 4 (id=4712): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x3}, 0x10, 0x0, 0x0, 0x0, 0xfff5}, 0x0) 1m29.799294722s ago: executing program 4 (id=4713): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r0}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.limit_in_bytes\x00', 0x2, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() syz_open_procfs$namespace(r1, &(0x7f0000000180)='ns/cgroup\x00') 1m29.771151716s ago: executing program 4 (id=4715): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000005640)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffff09, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='workqueue_activate_work\x00', r0}, 0x10) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e408"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x880, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) close(r5) 1m29.706711693s ago: executing program 2 (id=4718): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000800000002000000040000000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000ee"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000600000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffddd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xff7e) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180003000000000000000000000000009500"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r7, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x2, 0x13, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7fffffff}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x6, 0xda, &(0x7f00000008c0)=""/218, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x5, 0x5, 0xa, 0x58}, 0x10, r8, r5, 0x2, 0x0, &(0x7f0000000a80)=[{0x2, 0x1, 0xf, 0xb}, {0x0, 0x4, 0x8, 0xb}], 0x10, 0xfff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='hrtimer_init\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe95, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) 1m29.705745533s ago: executing program 1 (id=4719): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000800000002000000040000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000ee"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000600000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffddd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xff7e) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180003000000000000000000000000009500"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r7, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x2, 0x13, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7fffffff}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x6, 0xda, &(0x7f00000008c0)=""/218, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x5, 0x5, 0xa, 0x58}, 0x10, r8, r5, 0x2, 0x0, &(0x7f0000000a80)=[{0x2, 0x1, 0xf, 0xb}, {0x0, 0x4, 0x8, 0xb}], 0x10, 0xfff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='hrtimer_init\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe95, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) 1m29.705257593s ago: executing program 0 (id=4720): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000004000000b7eb94214a4eea46078c06c1eead6c3c12667f0f62618694ae3ee2a60748d9291564ab2a5729c87f16f4eec2daeef94e1a666987b001a5b022be454fd"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x6}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1c00000000000000ff0f00"/20, @ANYRES32, @ANYBLOB="0004000000000000000000000000000040000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r6 = syz_clone(0x10000000, &(0x7f0000000180)="5ca44104bacbd4ed9a63193f03d96fcefefd4c56923e051251f71eefebe02d822d2c0d9349613bfa55ccc1f6", 0x2c, 0x0, &(0x7f0000000280), &(0x7f0000000300)="1f81eef4ee181e80fb2a2d9e44a2ea6c3bb91cc12e751c9611191b10c80c12a93708fa0f91eafae5c80911") syz_open_procfs$namespace(r6, &(0x7f0000000380)='ns/user\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001240)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000000)="b9ff03076044238c9e9e15f088a84cb688a8", 0x0, 0x5b5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) 1m29.667258368s ago: executing program 2 (id=4721): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) sendmsg$tipc(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r2, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0xa7b4e2302cb15dac) sendmsg$tipc(r1, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 1m29.660001289s ago: executing program 1 (id=4722): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0x102fc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0xa, 0x4, 0x8, 0x9, 0x10, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000180)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x12, 0x1}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000240)=""/183, 0x26, 0xb7, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r4, 0xfffffffffffffe6d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 1m29.622260133s ago: executing program 3 (id=4723): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000200)=""/144, 0x2b, 0x90, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="0b0000000600000004000000a703000001000000", @ANYRES32, @ANYBLOB="000000000000000000001500000030ee00000000", @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="030000000100"/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000300), 0x20000000}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x2005, 0x10124, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x10000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r9, 0x40047440, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r7}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1m29.547793802s ago: executing program 2 (id=4724): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x105004, 0xc8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000002) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c45630002008daa29bf"], 0xfdef) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000280)={'bond_slave_0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x80000c, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x6, 0xf0, 0x6c, 0x7, 0x0, 0xd, 0x10c800, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0xffffffff, 0xff}, 0x2100, 0x64, 0x3, 0x7, 0x8, 0x80000000, 0x23f4, 0x0, 0xc, 0x0, 0x9}, r2, 0x6, r2, 0x4) ioctl$SIOCSIFHWADDR(r3, 0x89f1, &(0x7f0000000900)={'ip6_vti0\x00', @random="0600002000"}) bpf$ENABLE_STATS(0x20, &(0x7f0000000140), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000045000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000001c0)=""/124, 0x7c, 0x0, 0x0}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f00000000c0)='P', &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f0000000100), &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r6, &(0x7f0000000300)='@', 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000100)={r6, &(0x7f0000000400), 0x20000000}, 0x20) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) 1m29.547237032s ago: executing program 3 (id=4725): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open$cgroup(&(0x7f0000000340)={0x3, 0x80, 0x10, 0x7, 0x7, 0x2, 0x0, 0x9, 0x2402, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ce3, 0x1, @perf_config_ext={0x3, 0x5}, 0x20, 0xf9, 0x7, 0x5, 0x4, 0x3, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) 1m29.534710244s ago: executing program 4 (id=4726): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000580)="0081100000", 0x5}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000080b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa32"], 0xfdef) recvmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/230, 0xe6}], 0x1}, 0x0) 1m29.523834245s ago: executing program 4 (id=4727): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r4}, &(0x7f00000008c0), &(0x7f0000000900)=r3}, 0x20) 1m29.491076018s ago: executing program 2 (id=4728): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000000400200", @ANYRES32=0x1, @ANYBLOB="001b0002000000000000000000000000000000000e584d577db67bf5d87ce696097b1cf56bbc7f46111ca9a878aa8bc494047aa165d3c5dc4f3ae2e0e8973eb4c6ba8672b88d07f1", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) close(r2) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x24c602, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) write$cgroup_pid(r2, &(0x7f0000000300), 0x20000312) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) (async) close(0x4) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'rose0\x00', 0x112}) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x20, 0x0, 0x0, 0xfffff009}]}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="8500ff00000000070000001000000000"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe3, &(0x7f0000000240)=""/227, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1m29.485710269s ago: executing program 0 (id=4729): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r0}, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000180)=""/93) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c00)={{r3}, 0x0, 0x0}, 0x20) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x2a, &(0x7f0000000100)=r7, 0x4) sendmsg$unix(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="4d8e5ca74b", 0x5}], 0x1}, 0x0) recvmsg$unix(r5, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) close(r6) recvmsg$unix(r5, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x40000062) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b181", 0x1e}], 0x1}, 0x0) 1m29.485340859s ago: executing program 3 (id=4730): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0076000000000000000000000000000000000000bebc97a6b05aa6527febd62956bb47d2ac86e2967a0b234cef"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x4e3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1m29.450120544s ago: executing program 2 (id=4731): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000800000002000000040000000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000ee"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000600000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffddd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xff7e) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180003000000000000000000000000009500"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r7, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x2, 0x13, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7fffffff}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x6, 0xda, &(0x7f00000008c0)=""/218, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x5, 0x5, 0xa, 0x58}, 0x10, r8, r5, 0x2, 0x0, &(0x7f0000000a80)=[{0x2, 0x1, 0xf, 0xb}, {0x0, 0x4, 0x8, 0xb}], 0x10, 0xfff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='hrtimer_init\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe95, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) 1m29.449773494s ago: executing program 4 (id=4732): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_pid(r2, &(0x7f0000000900)=r0, 0x12) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1e000000b39d000002000000000000000000020008dc54d53aa55cf90e44670066a05c5811013bd124122425ae717c875973276c6c251b05f067d62a15190ee2071c132e2feb4fce7afe6d8b28d1cdcf94cb3fac809da9ca2cafea90e2e9874e8fdd2fcbc7b7b730ab96f37e8f4e65d40a153d5dc4181c885c7b8ff3855f0789a65f6405981f13fd9d42d3f4569b773a39ad2ebdc7b223178d07e6c20e6e94123fcab66d874770dd6a9217026d2e7580c07d603f95ac785ba8df146742e1aa52650992af4bd12c", @ANYRES32=0x1, @ANYBLOB='\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100000002000000050000000a00"/28], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r6) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9e, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x800000ce, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x25, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @ldst={0x0, 0x3, 0x6, 0x6, 0x0, 0xffffffffffffffe0, 0x4}, @map_val={0x18, 0xa, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xffffffa0}, @map_val={0x18, 0x7, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x100}, @jmp={0x5, 0x0, 0x9, 0x4, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xcb000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}]}, &(0x7f0000000200)='GPL\x00', 0x7f, 0xb0, &(0x7f0000000240)=""/176, 0x41000, 0x21, '\x00', r9, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0x4, 0x2, 0x7}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f00000006c0)=[{0x1, 0x1, 0x1, 0x18}, {0x1, 0x2, 0x8, 0x7}], 0x10, 0x1, @void, @value}, 0x94) 1m29.421711287s ago: executing program 1 (id=4733): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r3}, 0x11) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="65a7a5b42a9ea5f313f8e364d31b00000000000104000000000080000000000000", @ANYRES8=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYRES32, @ANYRES8=0x0, @ANYRES32], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc020, 0xc8}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYRES8=r4], 0xcfa4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a5e827632f2c0bdb828a50cf0e224afc5105be6a4bb5562ec8c13198627022632c9885c4926a378212"], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="150000001000"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f0000000040), 0x2}, 0x20) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0xd, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3}, 0x460, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 1m29.420906407s ago: executing program 2 (id=4734): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000006c0)=[0x0], &(0x7f0000000700)=[0x0], 0x0, 0xaf, &(0x7f0000000740)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000080)=[{0x7, 0x8, 0x30, 0x3}, {0xfffd, 0xa, 0x5, 0x101}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="02000005"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x3, 0x10004, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r7, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x3a, 0x7fffffff, 0x9, 0x20100, 0x1, 0x38, '\x00', r8, r7, 0x5, 0x5, 0x4, 0x2, @void, @value, @void, @value}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007300000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x2, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e0ff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r11}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c80)={{r10}, &(0x7f0000000c00), &(0x7f0000000c40)}, 0x20) 1m4.926008443s ago: executing program 32 (id=4729): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r0}, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000180)=""/93) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c00)={{r3}, 0x0, 0x0}, 0x20) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x2a, &(0x7f0000000100)=r7, 0x4) sendmsg$unix(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="4d8e5ca74b", 0x5}], 0x1}, 0x0) recvmsg$unix(r5, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) close(r6) recvmsg$unix(r5, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x40000062) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b181", 0x1e}], 0x1}, 0x0) 1m4.845575483s ago: executing program 33 (id=4733): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r3}, 0x11) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="65a7a5b42a9ea5f313f8e364d31b00000000000104000000000080000000000000", @ANYRES8=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYRES32, @ANYRES8=0x0, @ANYRES32], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc020, 0xc8}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYRES8=r4], 0xcfa4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a5e827632f2c0bdb828a50cf0e224afc5105be6a4bb5562ec8c13198627022632c9885c4926a378212"], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="150000001000"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f0000000040), 0x2}, 0x20) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0xd, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3}, 0x460, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 1m4.832251825s ago: executing program 34 (id=4734): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000006c0)=[0x0], &(0x7f0000000700)=[0x0], 0x0, 0xaf, &(0x7f0000000740)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000080)=[{0x7, 0x8, 0x30, 0x3}, {0xfffd, 0xa, 0x5, 0x101}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="02000005"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x3, 0x10004, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r7, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x3a, 0x7fffffff, 0x9, 0x20100, 0x1, 0x38, '\x00', r8, r7, 0x5, 0x5, 0x4, 0x2, @void, @value, @void, @value}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007300000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x2, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e0ff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r11}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c80)={{r10}, &(0x7f0000000c00), &(0x7f0000000c40)}, 0x20) 1m4.794541279s ago: executing program 35 (id=4730): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0076000000000000000000000000000000000000bebc97a6b05aa6527febd62956bb47d2ac86e2967a0b234cef"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x4e3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1m4.766449322s ago: executing program 36 (id=4732): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_pid(r2, &(0x7f0000000900)=r0, 0x12) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1e000000b39d000002000000000000000000020008dc54d53aa55cf90e44670066a05c5811013bd124122425ae717c875973276c6c251b05f067d62a15190ee2071c132e2feb4fce7afe6d8b28d1cdcf94cb3fac809da9ca2cafea90e2e9874e8fdd2fcbc7b7b730ab96f37e8f4e65d40a153d5dc4181c885c7b8ff3855f0789a65f6405981f13fd9d42d3f4569b773a39ad2ebdc7b223178d07e6c20e6e94123fcab66d874770dd6a9217026d2e7580c07d603f95ac785ba8df146742e1aa52650992af4bd12c", @ANYRES32=0x1, @ANYBLOB='\n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100000002000000050000000a00"/28], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r6) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9e, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x800000ce, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x25, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @ldst={0x0, 0x3, 0x6, 0x6, 0x0, 0xffffffffffffffe0, 0x4}, @map_val={0x18, 0xa, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xffffffa0}, @map_val={0x18, 0x7, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x100}, @jmp={0x5, 0x0, 0x9, 0x4, 0x5, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xcb000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}]}, &(0x7f0000000200)='GPL\x00', 0x7f, 0xb0, &(0x7f0000000240)=""/176, 0x41000, 0x21, '\x00', r9, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0x4, 0x2, 0x7}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f00000006c0)=[{0x1, 0x1, 0x1, 0x18}, {0x1, 0x2, 0x8, 0x7}], 0x10, 0x1, @void, @value}, 0x94) 16.339038608s ago: executing program 9 (id=5478): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66, 0x0, 0x0, 0x0, 0x1000000}, @initr0, @exit, @alu={0x6, 0x0, 0xa, 0xa, 0x0, 0x1, 0x7000000}, @printk={@llu, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5, 0x1, 0xb, 0x1, 0x5}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x121, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 13.817365606s ago: executing program 9 (id=5478): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66, 0x0, 0x0, 0x0, 0x1000000}, @initr0, @exit, @alu={0x6, 0x0, 0xa, 0xa, 0x0, 0x1, 0x7000000}, @printk={@llu, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5, 0x1, 0xb, 0x1, 0x5}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x121, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 10.775297226s ago: executing program 9 (id=5478): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66, 0x0, 0x0, 0x0, 0x1000000}, @initr0, @exit, @alu={0x6, 0x0, 0xa, 0xa, 0x0, 0x1, 0x7000000}, @printk={@llu, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5, 0x1, 0xb, 0x1, 0x5}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x121, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 7.917479964s ago: executing program 9 (id=5478): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66, 0x0, 0x0, 0x0, 0x1000000}, @initr0, @exit, @alu={0x6, 0x0, 0xa, 0xa, 0x0, 0x1, 0x7000000}, @printk={@llu, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5, 0x1, 0xb, 0x1, 0x5}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x121, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 4.218808411s ago: executing program 9 (id=5478): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66, 0x0, 0x0, 0x0, 0x1000000}, @initr0, @exit, @alu={0x6, 0x0, 0xa, 0xa, 0x0, 0x1, 0x7000000}, @printk={@llu, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5, 0x1, 0xb, 0x1, 0x5}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x121, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 2.614135521s ago: executing program 9 (id=5478): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66, 0x0, 0x0, 0x0, 0x1000000}, @initr0, @exit, @alu={0x6, 0x0, 0xa, 0xa, 0x0, 0x1, 0x7000000}, @printk={@llu, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5, 0x1, 0xb, 0x1, 0x5}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x121, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 1.994384525s ago: executing program 7 (id=5640): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r2, 0x0, 0x3, 0x6, &(0x7f0000000300)="d7d9e3", &(0x7f0000000340)=""/6, 0x7fffffff, 0x0, 0x1000, 0x39, &(0x7f0000001340)="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", &(0x7f00000003c0)="0267f69896107f6c98cb8188833c08eddcadf99f25817c85d2725e815de6fe4f410a38baaf7960c306f8660fa14aeff68eee31a23eb615de3b", 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r4, 0xb701, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="058030000100000018000000070000000000000001000000186200000900000000000008080000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703"], &(0x7f0000000400)='GPL\x00', 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x10, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x6, 0x0, 0x9062d06}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r6, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0], 0x0, 0x40000008, &(0x7f0000000d00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000980), &(0x7f0000000a40), 0x8, 0xa, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000c00)=r8, 0x4) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0107000004000000040000000800000040100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r5, @ANYRES32, @ANYRES8=r2], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=ANY=[@ANYRESHEX=r9, @ANYRES32=r0, @ANYBLOB='\a\x00'/20, @ANYRES32=r7, @ANYRES32=r0, @ANYBLOB="05000000030000000200"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe00181100", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="7a0a00ff00000000711065000000000095000000100000005e55e7009e471ad400844a795b22bd0e1b33fe875c3b52b6a4e68134fa72b27eb8b390f3242fa62ade943733f12b8b6aaa444370f5cc0220624be51cf4ad7a9031"], &(0x7f0000000c40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r11}, 0x10) close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000000)={'ip6tnl0\x00', @random="010000201000"}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x10, r2}, 0x18) 1.823969445s ago: executing program 7 (id=5645): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xa, 0x1, 0xff, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b000000f9ffffff010001000800000001000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000004c45000000000000000000000000000080000000000000000000"], 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=@framed={{}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x51) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x80800, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7d767aa29af7e8f6a0200000000000085"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x0, 0x10, 0x6, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000580), 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.734936815s ago: executing program 8 (id=5647): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="fdffffffffffffff000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x10) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000fcffff0d010000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r8}, 0xfffffe91) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8922, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xffffff09, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], 0x0, 0xf5, &(0x7f0000000380), 0x10, 0x10, &(0x7f0000000300), &(0x7f00000005c0), 0x8, 0xcb, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) 1.342044342s ago: executing program 7 (id=5649): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r3 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000c40)=r4, 0x12) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x14}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0xfeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='memory.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r9, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x429, 0x3, 0x10004, 0x2, 0xffffffffffffffff, 0x800, '\x00', r10, r11, 0x5, 0x2, 0x0, 0x2, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x13, 0xffff, 0x80000000, 0x467a, 0x40054, r9, 0x8, '\x00', r10, r11, 0x0, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x5, '\x00', r10, r7, 0x5, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNSETOFFLOAD(r8, 0x8901, 0x2000ff04) syz_clone(0x24001100, 0x0, 0x8, 0x0, 0x0, 0x0) 1.313638585s ago: executing program 6 (id=5650): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f0000000780)=ANY=[@ANYBLOB], 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000173114100000000008510000002000000b7000000000000009500c200000000009500001200"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000400)='jbd2_update_log_tail\x00', r5, 0x0, 0x2}, 0x18) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000180)={'pimreg1\x00', 0x400}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000001740)=ANY=[], 0x0, 0x4d, 0x0, 0x3, 0x10000, 0x0, @void, @value}, 0x20) (async) openat$cgroup_freezer_state(r4, &(0x7f00000001c0), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a2, &(0x7f0000000080)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a3, &(0x7f0000000080)) (async) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) 1.280983979s ago: executing program 5 (id=5651): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB="000000000000000001080000000000ac07000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00'}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x401, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.236171104s ago: executing program 6 (id=5652): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r3}, 0x18) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1e"], 0x10) 1.234479104s ago: executing program 8 (id=5653): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r4}, &(0x7f00000008c0), &(0x7f0000000900)=r3}, 0x20) 1.181333781s ago: executing program 8 (id=5654): bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x7b, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) write$cgroup_pid(r2, 0x0, 0x7ffffffff000) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c1, 0x0, &(0x7f00000001c0)='{', 0x0}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000680), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000010000000000000000d200950000000000000080ba3bdf9959cb175ef54debfc48d1d02bb7e650a520bf130cee2b69808663d35842263af6abc46462cd16097b028862119ef2949c12ae88b23893e735020e7f901173449f9061c5f8cd412ea28cf62af0d3e17627321dddb7b28c15a3d20376f3170fc4796760b41fead473fe4e4c314c2f73480dc97326a4a5cfc48cb5a431ded00cd1bcf82f47054f2d3adec558188ed3d819f88d00"/188], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000850000000e0000009500000000000000805ce542c39cea51c7cf068ac50748af7d3f090c14c9bcd6526b7820b09d0be1229bcb28b5a54215ac7d1589e17590cce08c7ce1c0c9529900ef6c99d76a0dadde3a76788681e43590e4654f09ae7a6a3277829eae330b"], &(0x7f0000000000)='GPL\x00', 0x4, 0xb9, &(0x7f0000000080)=""/185, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffefb, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7fffffff, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x1a8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r3, @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)=@o_path={&(0x7f00000003c0)='./file0\x00', 0x0, 0x4000}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = getpid() syz_open_procfs$namespace(r8, &(0x7f0000000440)='ns/pid_for_children\x00') perf_event_open$cgroup(&(0x7f0000000700)={0x5, 0x80, 0x1, 0x7f, 0x1, 0x8, 0x0, 0x99, 0x0, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x74e, 0x97a}, 0x400, 0x1, 0x7, 0x7, 0x10, 0x5, 0x52, 0x0, 0x6, 0x0, 0x5}, r5, 0x8, r3, 0xc76e8063ebe60076) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) 1.050540776s ago: executing program 6 (id=5655): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r5, 0x0, 0x8000004) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) unlink(0x0) socketpair(0x1f, 0x4, 0x4, &(0x7f00000002c0)={0xffffffffffffffff}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={&(0x7f0000000080), 0x6e, &(0x7f0000001980)=[{&(0x7f0000000300)=""/214, 0xd6}, {&(0x7f00000004c0)=""/152, 0x98}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000580)=""/255, 0xff}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/79, 0x4f}, {&(0x7f0000001880)=""/84, 0x54}, {&(0x7f0000001900)=""/120, 0x78}], 0x8}, 0x1) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0x1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x2, 0x0, 0x0, 0x2, 0x5}]}}, 0x0, 0x26, 0x0, 0x1, 0x4, 0x0, @void, @value}, 0x20) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000980)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x9, '\x00', r9, r10, 0x1, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000003500)={r3, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000003600)={0x9, 0x1a, &(0x7f0000001e80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}], &(0x7f0000001f80)='GPL\x00', 0x6d, 0xeb, &(0x7f0000001fc0)=""/235, 0x40f00, 0xe, '\x00', r9, @fallback=0x27, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f00000020c0)={0x4, 0x3, 0x7f, 0x6}, 0x10, 0x0, r0, 0x5, &(0x7f0000003540)=[r11, r8, r11, 0xffffffffffffffff, r3, r12, r3], &(0x7f0000003580)=[{0x2, 0x4, 0x1, 0x5}, {0x5, 0x3, 0x5, 0x3}, {0x5, 0x4, 0x8, 0x5}, {0x5, 0x4, 0xd, 0xb}, {0x2, 0x2, 0x2, 0xe}], 0x10, 0x400, @void, @value}, 0x94) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b40)={&(0x7f0000001ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x7fff}}, @fwd={0x6}, @typedef={0x7, 0x0, 0x0, 0x8, 0x4}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000002480)=""/4096, 0x61, 0x1000, 0x0, 0xb45, 0x10000, @value}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001c00)={0x8, 0x0}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001cc0)={{r3, 0xffffffffffffffff}, &(0x7f0000001c40), &(0x7f0000001c80)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0xa, 0x10, &(0x7f0000001a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x8}]}, &(0x7f0000001a80)='syzkaller\x00', 0x1000, 0x0, 0x0, 0x41000, 0x20, '\x00', r9, @fallback=0x23, r13, 0x8, &(0x7f0000001b80)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000001bc0)={0x1, 0x8, 0x10000, 0xb}, 0x10, r14, r4, 0x6, &(0x7f0000001d00)=[r3, r15, r3, r5], &(0x7f0000001d40)=[{0x0, 0x3, 0x7, 0x9}, {0x3, 0x4, 0x4, 0xc}, {0x0, 0x3, 0x9, 0x5}, {0x5, 0x5, 0xb, 0xd}, {0x5, 0x4, 0xd, 0x7}, {0x0, 0x4, 0x5, 0x8}], 0x10, 0x6, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r3}, 0x4) 990.725743ms ago: executing program 5 (id=5656): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000005000000020000000400000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000001b000000000000000000000079a0ca18"], 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000400000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000004000000a36103eca752ef795d1ce7dc0191d051ad4f24f773cc88b9e2798cc6c732d60205654b3f19e350063667f3ad051d622d410041f34ab4ff4086d2c287192a67ebb956c2a924712431adfadb54bd1993eab24f82121916cbf72ce70f15b0073e4687be5e92b15e7c98d934bdb2e80ed003cc4c5bcc8cbeff", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000010000e1850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000000000000000000a153000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000017008500000003000000950000000000000021dd3238"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r9}, &(0x7f00000003c0), &(0x7f0000000540)=r7}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c250000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x50885000, &(0x7f0000000580)="94cf0a83fa095b34615b3ed56352641a998d68ceb275abc0883d541a6e802ea49c75ce377fc1aa1fcdc06044b10e0c24030683c7d262dd2581be10bd92169d71cf37674533ace2fd67105c3a83fd56ebb299d9086a0238dbe5430f1a636f77556d2551f1cc7d3fb6864486d4e64c708825db1ffb41a637aa38c6fd717cff5603225dc4351169d828aa8dec169f73fe86636615fe341fc072a95cf9db96064802", 0xa0, &(0x7f0000000300), &(0x7f0000000380), &(0x7f0000000640)="10e03f61770d56219071437c005380cb2c96a7bbcfab2e9a16e3a63ee275d8d1e2a9d18838e241d4ad6748491903b92369914f773a5d00775bc5125fe27ca7aee2d0772839fef74c041d601aea4d4d385319fce8ef951672") r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000340)='tlb_flush\x00', r11}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000deffffff00"/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r12}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r13}, 0x10) 898.965924ms ago: executing program 5 (id=5657): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000800000002000000040000000000", @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000ee"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000008000085000000060000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffddd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xff7e) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180003000000000000000000000000009500"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r7, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x2, 0x13, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7fffffff}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x6, 0xda, &(0x7f00000008c0)=""/218, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x5, 0x5, 0xa, 0x58}, 0x10, r8, r5, 0x2, 0x0, &(0x7f0000000a80)=[{0x2, 0x1, 0xf, 0xb}, {0x0, 0x4, 0x8, 0xb}], 0x10, 0xfff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='hrtimer_init\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe95, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) 875.202087ms ago: executing program 7 (id=5658): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r1, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000580)}], 0x2, &(0x7f0000000b80)=ANY=[@ANYBLOB="1400000000000000000000000100000061000000000000001c00"/35, @ANYRES32=r2, @ANYBLOB="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"], 0x118}, 0x20000004) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000001cc0)=ANY=[@ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', r2, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r0, &(0x7f0000002d80)=ANY=[@ANYBLOB="1e033000dd5c980128856306008e0200000000d801c9e07f85b9d70e037a282b8a24d4d12db481dedfc0f434db6d2ce54e0000000000000101"], 0xffdd) 801.394466ms ago: executing program 5 (id=5659): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@fallback=r0, 0x14, 0x0, 0x8f, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001200), 0x0, 0xa2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x8, 0x8, &(0x7f0000001300)}}, 0x52) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001480)=ANY=[@ANYRES16=r8, @ANYRESDEC=r6, @ANYRES16=r7, @ANYRES64=r6], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000680)=@bloom_filter={0x1e, 0x8, 0x8, 0x9, 0x4, r4, 0x404, '\x00', r7, 0xffffffffffffffff, 0x2, 0x0, 0x5, 0xf, @void, @value, @void, @value}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000480)={@fallback=r3, r2, 0x2, 0x20, 0x0, @void, @void, @void, @value=r6, r5}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='rxrpc_retransmit\x00', 0xffffffffffffffff, 0x0, 0xffffffff80000001}, 0x18) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c00)=ANY=[@ANYRES32=r0, @ANYRESOCT=0x0, @ANYBLOB="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", @ANYBLOB="2b7501", @ANYRESOCT=0x0, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r11}, &(0x7f0000000540), &(0x7f0000000580)=r12}, 0x20) 736.125253ms ago: executing program 8 (id=5660): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x3, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='rss_stat\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 735.713803ms ago: executing program 6 (id=5661): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1e"], 0x10) 435.302279ms ago: executing program 6 (id=5662): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x20, &(0x7f0000000200)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4b1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x1, 0x3, 0x2, 0x4, 0x4, 0xc, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xec}, @map_fd={0x18, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], &(0x7f0000000100)='syzkaller\x00', 0xa0000000, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x2, 0x0, 0x8, 0x100}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000380)=[{0x3, 0x2, 0xf, 0x2}, {0x3, 0x5, 0x5, 0x7}], 0x10, 0x71, @void, @value}, 0x94) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="100000000400000008e1b1771efa0e2dac00000008", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0xc, &(0x7f0000000840)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@fallback=r2, 0xe, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup, r3, 0x1f, 0x2000, 0x0, @value, @void, @void, @void, r4}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0x1, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000500)={@ifindex=r5, r0, 0x2a, 0x0, r1, @void, @value, @void, @void, r4}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@base={0x12, 0x7, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r6, &(0x7f0000000240), 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x4, &(0x7f00000000c0)={r6, &(0x7f0000000100), 0x20000000}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 435.041469ms ago: executing program 7 (id=5663): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x6, 0x40, 0x40, 0x41, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r0, 0x0, 0x8000000}, 0x38) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x89f0, &(0x7f0000000380)={'bridge0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x3}, @float={0x5, 0x0, 0x0, 0x10, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0x8}}, @func={0xc, 0x0, 0x0, 0xc, 0x4}, @fwd={0xe}]}, {0x0, [0x2e, 0x61, 0x30]}}, &(0x7f0000000680)=""/4096, 0x65, 0x1000, 0x1, 0xe14c, 0x10000, @value=r1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x4, &(0x7f0000000200)=ANY=[@ANYRESDEC=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='xdp_cpumap_kthread\x00', r4, 0x0, 0x7}, 0x18) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'gretap0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x34}}) 368.540867ms ago: executing program 8 (id=5664): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r4}, &(0x7f00000008c0), &(0x7f0000000900)=r3}, 0x20) 320.093542ms ago: executing program 5 (id=5665): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r3}, 0x18) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1e"], 0x10) 319.424383ms ago: executing program 6 (id=5666): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x4, 0x0, 0x0, 0x8000000}, 0x0, 0x4, r0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x62a83200, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001540)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000e12020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000006fd6850000002d000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a000000030000000000000007000000011800007cb03a", @ANYRES32=r4, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000001000000ffffffff00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0xa, [@enum={0x10, 0x2, 0x0, 0x6, 0x4, [{0xd, 0x6}, {0x5, 0xf}]}, @restrict={0x10, 0x0, 0x0, 0xb, 0x1}, @decl_tag={0x6, 0x0, 0x0, 0x11, 0x5, 0xffffffffffffffff}]}, {0x0, [0x0, 0x61, 0x5f, 0x30, 0x0, 0x5f, 0x61, 0x2e]}}, &(0x7f0000000280)=""/3, 0x5a, 0x3, 0x0, 0x2, 0x10000, @value=r3}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0xcf, 0x7602, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x65) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 313.033013ms ago: executing program 8 (id=5667): r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.stat\x00', 0x60ff, 0x0) syz_clone(0x8000, &(0x7f0000000380)="24cd664a6177b709f2b39a6b389f7a1dcb88212204b6f1b319fbfbc08bc8f922c7bdc0ce2f7efc61c0f31d83f87ab078ee2e5783b67cb09db3fffc6d0c4cbe5c81b80c986d74602a32d1851ef54b7a753b7a62e54473debb55f462dd54733579102912a09f854243f4f185d55dc747abd5e08c5f48c74c8bf11f52f88d843437754b02f38717a9a69739b4bb575fc2b8fb36197322d12ae951b374bd10fc5624cad68b06bf44ded726b09dd4bcd764edebdce3a9ca820a6461e983a5dcbeaddc7a8c0636", 0xc4, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000580)="f536988eccdd3fef6dbb2f02b9b5940f283f0928ed7f73e02698c8905d7b07af4c41e82e404fd5f44bbdff8094f71af0f5a71eeaf89cc4d9cec81ca1cc28db2eba0bcbd942607a48ced373be2aa6ff4450814197a3c83c0dd8ba0fcc4ba7606e199a0901179939ffabb41cbe1a2894fbe14dca43470ddec1f3581d66cbc4d2d162dc190119ac88ea577864a7763b558ec9d431e15bcb9121d180f064ae027a4a2501d4c6ecc612002ee3c1bf7688323bf0d215df8be812887974fa51eb2a768fc409e1f8b5de18b009fcf7148ec7bbf0") socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000300d2e69e250b8470000000000000000000000000000ee77e42174b8f4101269bbf23e8e1d576984cc9d1dc0991becbd7ee1b06716fb979d772156e4ab7c7f2f34e5d5"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000004a4d00000000fed8564ac0690000000000000000f20000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) close(0x3) 207.036826ms ago: executing program 7 (id=5668): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0e00000004000000080000000300000000000000", @ANYRES32, @ANYBLOB="ffffffff000000000000009b180000e100000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe96, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v\x00'/20, @ANYRES32, @ANYBLOB="0000f7ffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000000000000200000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000009d2ebd3bcdfb5777ea152ec7c58383fb22a231c77542064e50807ac02c082d914ac22570d646663afd68c8aa726504129e19928ac202aee17746c7790e892907011f66f30bcd5433d0cefb97596b0870678ab17f05d2fe1c7110d4394da54cc98d44134a8a52c224bfdcbfc31e252e3253519ed96304cc0ba00f801dc9810dcbd14cf3122371f0d3653bd154fce7144d92915e825d2816c9397f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000540)=r3, 0x4) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8000000000, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 0s ago: executing program 5 (id=5669): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/23], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000800000002000000040000000000", @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000ee"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000008000085000000060000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffddd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xff7e) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180003000000000000000000000000009500"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r7, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x2, 0x13, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7fffffff}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x6, 0xda, &(0x7f00000008c0)=""/218, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x5, 0x5, 0xa, 0x58}, 0x10, r8, r5, 0x2, 0x0, &(0x7f0000000a80)=[{0x2, 0x1, 0xf, 0xb}, {0x0, 0x4, 0x8, 0xb}], 0x10, 0xfff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='hrtimer_init\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe95, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) kernel console output (not intermixed with test programs): : 0000000000000000 R09: 0000000000000000 [ 243.515576][T13127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 243.523388][T13127] R13: 0000000000000000 R14: 00007f741c135f80 R15: 00007fff0f155c48 [ 243.531215][T13127] [ 243.703815][T13143] device pim6reg1 entered promiscuous mode [ 243.920209][T13168] FAULT_INJECTION: forcing a failure. [ 243.920209][T13168] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 243.951434][T13168] CPU: 0 PID: 13168 Comm: syz.8.5216 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 243.962903][T13168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 243.972807][T13168] Call Trace: [ 243.975920][T13168] [ 243.978729][T13168] dump_stack_lvl+0x151/0x1c0 [ 243.983215][T13168] ? io_uring_drop_tctx_refs+0x190/0x190 [ 243.988681][T13168] dump_stack+0x15/0x20 [ 243.992675][T13168] should_fail+0x3c6/0x510 [ 243.996930][T13168] should_fail_usercopy+0x1a/0x20 [ 244.001793][T13168] _copy_from_user+0x20/0xd0 [ 244.006222][T13168] ___sys_recvmsg+0x150/0x690 [ 244.010728][T13168] ? __sys_recvmsg+0x260/0x260 [ 244.015420][T13168] ? __fdget+0x1bc/0x240 [ 244.019491][T13168] __x64_sys_recvmsg+0x1dc/0x2b0 [ 244.024265][T13168] ? ___sys_recvmsg+0x690/0x690 [ 244.028955][T13168] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 244.034860][T13168] ? exit_to_user_mode_prepare+0x39/0xa0 [ 244.040320][T13168] x64_sys_call+0x171/0x9a0 [ 244.044658][T13168] do_syscall_64+0x3b/0xb0 [ 244.048913][T13168] ? clear_bhb_loop+0x35/0x90 [ 244.053426][T13168] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 244.059153][T13168] RIP: 0033:0x7f4161dfd719 [ 244.063410][T13168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.082851][T13168] RSP: 002b:00007f4160a76038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 244.091091][T13168] RAX: ffffffffffffffda RBX: 00007f4161fb4f80 RCX: 00007f4161dfd719 [ 244.098902][T13168] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000003 [ 244.106719][T13168] RBP: 00007f4160a76090 R08: 0000000000000000 R09: 0000000000000000 [ 244.114612][T13168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.122425][T13168] R13: 0000000000000000 R14: 00007f4161fb4f80 R15: 00007ffd53e26f48 [ 244.130248][T13168] [ 244.250042][T13181] FAULT_INJECTION: forcing a failure. [ 244.250042][T13181] name failslab, interval 1, probability 0, space 0, times 0 [ 244.278415][T13176] device pim6reg1 entered promiscuous mode [ 244.295010][T13181] CPU: 1 PID: 13181 Comm: syz.5.5223 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 244.306476][T13181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 244.316369][T13181] Call Trace: [ 244.319494][T13181] [ 244.322282][T13181] dump_stack_lvl+0x151/0x1c0 [ 244.326795][T13181] ? io_uring_drop_tctx_refs+0x190/0x190 [ 244.332261][T13181] dump_stack+0x15/0x20 [ 244.336247][T13181] should_fail+0x3c6/0x510 [ 244.340497][T13181] __should_failslab+0xa4/0xe0 [ 244.345101][T13181] ? anon_vma_fork+0xf7/0x4e0 [ 244.349610][T13181] should_failslab+0x9/0x20 [ 244.353952][T13181] slab_pre_alloc_hook+0x37/0xd0 [ 244.358726][T13181] ? anon_vma_fork+0xf7/0x4e0 [ 244.363236][T13181] kmem_cache_alloc+0x44/0x200 [ 244.367844][T13181] anon_vma_fork+0xf7/0x4e0 [ 244.372185][T13181] ? anon_vma_name+0x4c/0x70 [ 244.376605][T13181] ? vm_area_dup+0x17a/0x230 [ 244.381032][T13181] copy_mm+0xa3a/0x13e0 [ 244.385042][T13181] ? copy_signal+0x610/0x610 [ 244.389456][T13181] ? __init_rwsem+0xfe/0x1d0 [ 244.393879][T13181] ? copy_signal+0x4e3/0x610 [ 244.398306][T13181] copy_process+0x1149/0x3290 [ 244.402814][T13181] ? __kasan_check_write+0x14/0x20 [ 244.407770][T13181] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 244.412710][T13181] ? vfs_write+0x94d/0x1110 [ 244.417053][T13181] kernel_clone+0x21e/0x9e0 [ 244.421389][T13181] ? __kasan_check_write+0x14/0x20 [ 244.426333][T13181] ? create_io_thread+0x1e0/0x1e0 [ 244.431201][T13181] __x64_sys_clone+0x23f/0x290 [ 244.435883][T13181] ? __do_sys_vfork+0x130/0x130 [ 244.440570][T13181] ? debug_smp_processor_id+0x17/0x20 [ 244.445778][T13181] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 244.451677][T13181] ? exit_to_user_mode_prepare+0x39/0xa0 [ 244.457149][T13181] x64_sys_call+0x1b0/0x9a0 [ 244.461488][T13181] do_syscall_64+0x3b/0xb0 [ 244.465740][T13181] ? clear_bhb_loop+0x35/0x90 [ 244.470263][T13181] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 244.476155][T13181] RIP: 0033:0x7f741bf7e719 [ 244.480507][T13181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.499934][T13181] RSP: 002b:00007f741abf6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 244.508183][T13181] RAX: ffffffffffffffda RBX: 00007f741c135f80 RCX: 00007f741bf7e719 [ 244.515990][T13181] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 244.523801][T13181] RBP: 00007f741abf7090 R08: 0000000000000000 R09: 0000000000000000 [ 244.531615][T13181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 244.539423][T13181] R13: 0000000000000000 R14: 00007f741c135f80 R15: 00007fff0f155c48 [ 244.547244][T13181] [ 244.633997][T13193] device pim6reg1 entered promiscuous mode [ 244.748268][T13211] FAULT_INJECTION: forcing a failure. [ 244.748268][T13211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 244.765580][T13211] CPU: 0 PID: 13211 Comm: syz.9.5235 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 244.777051][T13211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 244.786950][T13211] Call Trace: [ 244.790070][T13211] [ 244.792851][T13211] dump_stack_lvl+0x151/0x1c0 [ 244.797370][T13211] ? io_uring_drop_tctx_refs+0x190/0x190 [ 244.802832][T13211] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 244.808122][T13211] ? kmem_cache_free+0x116/0x2e0 [ 244.812897][T13211] ? putname+0xfa/0x150 [ 244.816897][T13211] dump_stack+0x15/0x20 [ 244.820884][T13211] should_fail+0x3c6/0x510 [ 244.825135][T13211] should_fail_usercopy+0x1a/0x20 [ 244.830080][T13211] _copy_from_user+0x20/0xd0 [ 244.834511][T13211] iovec_from_user+0xc7/0x330 [ 244.839021][T13211] __import_iovec+0x6d/0x420 [ 244.843449][T13211] import_iovec+0xe5/0x120 [ 244.847703][T13211] ___sys_recvmsg+0x56b/0x690 [ 244.852218][T13211] ? __sys_recvmsg+0x260/0x260 [ 244.856822][T13211] ? __fdget+0x1bc/0x240 [ 244.860893][T13211] __x64_sys_recvmsg+0x1dc/0x2b0 [ 244.865666][T13211] ? ___sys_recvmsg+0x690/0x690 [ 244.870356][T13211] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 244.876255][T13211] ? exit_to_user_mode_prepare+0x39/0xa0 [ 244.881728][T13211] x64_sys_call+0x171/0x9a0 [ 244.886068][T13211] do_syscall_64+0x3b/0xb0 [ 244.890312][T13211] ? clear_bhb_loop+0x35/0x90 [ 244.894830][T13211] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 244.900556][T13211] RIP: 0033:0x7f4874e3b719 [ 244.904812][T13211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.924250][T13211] RSP: 002b:00007f4873ab4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 244.932495][T13211] RAX: ffffffffffffffda RBX: 00007f4874ff2f80 RCX: 00007f4874e3b719 [ 244.940305][T13211] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000003 [ 244.948121][T13211] RBP: 00007f4873ab4090 R08: 0000000000000000 R09: 0000000000000000 [ 244.955939][T13211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.963742][T13211] R13: 0000000000000000 R14: 00007f4874ff2f80 R15: 00007ffe46b37f78 [ 244.971562][T13211] [ 245.102009][T13226] FAULT_INJECTION: forcing a failure. [ 245.102009][T13226] name failslab, interval 1, probability 0, space 0, times 0 [ 245.115653][T13226] CPU: 1 PID: 13226 Comm: syz.7.5240 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 245.127115][T13226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 245.137178][T13226] Call Trace: [ 245.140301][T13226] [ 245.143080][T13226] dump_stack_lvl+0x151/0x1c0 [ 245.147593][T13226] ? io_uring_drop_tctx_refs+0x190/0x190 [ 245.153079][T13226] dump_stack+0x15/0x20 [ 245.157054][T13226] should_fail+0x3c6/0x510 [ 245.161305][T13226] __should_failslab+0xa4/0xe0 [ 245.165906][T13226] ? anon_vma_fork+0x1df/0x4e0 [ 245.170506][T13226] should_failslab+0x9/0x20 [ 245.174845][T13226] slab_pre_alloc_hook+0x37/0xd0 [ 245.179618][T13226] ? anon_vma_fork+0x1df/0x4e0 [ 245.184215][T13226] kmem_cache_alloc+0x44/0x200 [ 245.188840][T13226] anon_vma_fork+0x1df/0x4e0 [ 245.193246][T13226] copy_mm+0xa3a/0x13e0 [ 245.197242][T13226] ? copy_signal+0x610/0x610 [ 245.201669][T13226] ? __init_rwsem+0xfe/0x1d0 [ 245.206090][T13226] ? copy_signal+0x4e3/0x610 [ 245.210521][T13226] copy_process+0x1149/0x3290 [ 245.215037][T13226] ? __kasan_check_write+0x14/0x20 [ 245.219983][T13226] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 245.224926][T13226] ? vfs_write+0x94d/0x1110 [ 245.229268][T13226] kernel_clone+0x21e/0x9e0 [ 245.233625][T13226] ? __kasan_check_write+0x14/0x20 [ 245.238553][T13226] ? create_io_thread+0x1e0/0x1e0 [ 245.243415][T13226] __x64_sys_clone+0x23f/0x290 [ 245.248014][T13226] ? __do_sys_vfork+0x130/0x130 [ 245.252701][T13226] ? debug_smp_processor_id+0x17/0x20 [ 245.257905][T13226] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 245.263809][T13226] ? exit_to_user_mode_prepare+0x39/0xa0 [ 245.269275][T13226] x64_sys_call+0x1b0/0x9a0 [ 245.273615][T13226] do_syscall_64+0x3b/0xb0 [ 245.277866][T13226] ? clear_bhb_loop+0x35/0x90 [ 245.282383][T13226] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 245.288112][T13226] RIP: 0033:0x7fd2fda3b719 [ 245.292366][T13226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.311806][T13226] RSP: 002b:00007fd2fc6b3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 245.320048][T13226] RAX: ffffffffffffffda RBX: 00007fd2fdbf2f80 RCX: 00007fd2fda3b719 [ 245.327907][T13226] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 245.335680][T13226] RBP: 00007fd2fc6b4090 R08: 0000000000000000 R09: 0000000000000000 [ 245.343482][T13226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.351295][T13226] R13: 0000000000000000 R14: 00007fd2fdbf2f80 R15: 00007fff2d66bc88 [ 245.359115][T13226] [ 245.393054][T13232] tun0: tun_chr_ioctl cmd 1074025675 [ 245.415481][T13232] tun0: persist disabled [ 245.423281][ T30] audit: type=1400 audit(1730021225.093:169): avc: denied { create } for pid=13235 comm="syz.7.5245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 245.492299][T13250] FAULT_INJECTION: forcing a failure. [ 245.492299][T13250] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 245.506339][T13248] device pim6reg1 entered promiscuous mode [ 245.518325][T13250] CPU: 1 PID: 13250 Comm: syz.9.5250 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 245.529813][T13250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 245.539687][T13250] Call Trace: [ 245.542810][T13250] [ 245.545587][T13250] dump_stack_lvl+0x151/0x1c0 [ 245.550100][T13250] ? io_uring_drop_tctx_refs+0x190/0x190 [ 245.555577][T13250] dump_stack+0x15/0x20 [ 245.559562][T13250] should_fail+0x3c6/0x510 [ 245.563812][T13250] should_fail_usercopy+0x1a/0x20 [ 245.568672][T13250] _copy_to_iter+0x22f/0xde0 [ 245.573106][T13250] ? __x64_sys_openat+0x243/0x290 [ 245.577968][T13250] ? iov_iter_init+0x190/0x190 [ 245.582566][T13250] ? __check_object_size+0x2ec/0x3d0 [ 245.587684][T13250] simple_copy_to_iter+0x50/0x70 [ 245.592455][T13250] __skb_datagram_iter+0xd4/0x780 [ 245.597319][T13250] ? skb_copy_datagram_iter+0x170/0x170 [ 245.602699][T13250] skb_copy_datagram_iter+0x43/0x170 [ 245.607820][T13250] unix_stream_read_actor+0x70/0xb0 [ 245.612856][T13250] unix_stream_read_generic+0xe65/0x2540 [ 245.618327][T13250] ? unix_stream_read_actor+0xb0/0xb0 [ 245.623528][T13250] ? stack_trace_save+0x113/0x1c0 [ 245.628826][T13250] ? selinux_socket_recvmsg+0x243/0x340 [ 245.634201][T13250] ? selinux_socket_sendmsg+0x340/0x340 [ 245.639583][T13250] unix_stream_recvmsg+0x22d/0x2c0 [ 245.644531][T13250] ? unix_stream_sendmsg+0x1060/0x1060 [ 245.649823][T13250] ? __unix_stream_recvmsg+0x210/0x210 [ 245.655118][T13250] ? _kstrtoull+0x3a0/0x4a0 [ 245.659462][T13250] ? security_socket_recvmsg+0x87/0xb0 [ 245.664751][T13250] ? unix_stream_sendmsg+0x1060/0x1060 [ 245.670048][T13250] ____sys_recvmsg+0x286/0x530 [ 245.674665][T13250] ? __sys_recvmsg_sock+0x50/0x50 [ 245.679510][T13250] ? import_iovec+0xe5/0x120 [ 245.683935][T13250] ___sys_recvmsg+0x1ec/0x690 [ 245.688451][T13250] ? __sys_recvmsg+0x260/0x260 [ 245.693058][T13250] ? __fdget+0x1bc/0x240 [ 245.697126][T13250] __x64_sys_recvmsg+0x1dc/0x2b0 [ 245.701904][T13250] ? ___sys_recvmsg+0x690/0x690 [ 245.706587][T13250] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 245.712491][T13250] ? exit_to_user_mode_prepare+0x39/0xa0 [ 245.717965][T13250] x64_sys_call+0x171/0x9a0 [ 245.722297][T13250] do_syscall_64+0x3b/0xb0 [ 245.726643][T13250] ? clear_bhb_loop+0x35/0x90 [ 245.731150][T13250] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 245.736886][T13250] RIP: 0033:0x7f4874e3b719 [ 245.741135][T13250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.760572][T13250] RSP: 002b:00007f4873ab4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 245.768817][T13250] RAX: ffffffffffffffda RBX: 00007f4874ff2f80 RCX: 00007f4874e3b719 [ 245.776640][T13250] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000003 [ 245.784443][T13250] RBP: 00007f4873ab4090 R08: 0000000000000000 R09: 0000000000000000 [ 245.792248][T13250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.800059][T13250] R13: 0000000000000000 R14: 00007f4874ff2f80 R15: 00007ffe46b37f78 [ 245.807884][T13250] [ 245.832002][T13266] FAULT_INJECTION: forcing a failure. [ 245.832002][T13266] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 245.845447][T13266] CPU: 1 PID: 13266 Comm: syz.6.5255 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 245.856904][T13266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 245.866795][T13266] Call Trace: [ 245.869915][T13266] [ 245.872698][T13266] dump_stack_lvl+0x151/0x1c0 [ 245.877210][T13266] ? io_uring_drop_tctx_refs+0x190/0x190 [ 245.882679][T13266] dump_stack+0x15/0x20 [ 245.886668][T13266] should_fail+0x3c6/0x510 [ 245.890922][T13266] should_fail_alloc_page+0x5a/0x80 [ 245.895953][T13266] prepare_alloc_pages+0x15c/0x700 [ 245.900911][T13266] ? __alloc_pages_bulk+0xe40/0xe40 [ 245.905937][T13266] __alloc_pages+0x18c/0x8f0 [ 245.910360][T13266] ? prep_new_page+0x110/0x110 [ 245.914967][T13266] get_zeroed_page+0x1b/0x40 [ 245.919391][T13266] __pud_alloc+0x8b/0x260 [ 245.923554][T13266] ? stack_trace_snprint+0xf0/0xf0 [ 245.928500][T13266] ? do_handle_mm_fault+0x2400/0x2400 [ 245.933708][T13266] ? __stack_depot_save+0x34/0x470 [ 245.938656][T13266] ? anon_vma_clone+0x9a/0x500 [ 245.943257][T13266] copy_page_range+0x2bcf/0x2f90 [ 245.948031][T13266] ? __kasan_slab_alloc+0xb1/0xe0 [ 245.952889][T13266] ? slab_post_alloc_hook+0x53/0x2c0 [ 245.958013][T13266] ? copy_mm+0xa3a/0x13e0 [ 245.962175][T13266] ? copy_process+0x1149/0x3290 [ 245.966863][T13266] ? kernel_clone+0x21e/0x9e0 [ 245.971375][T13266] ? __x64_sys_clone+0x23f/0x290 [ 245.976147][T13266] ? x64_sys_call+0x1b0/0x9a0 [ 245.980665][T13266] ? do_syscall_64+0x3b/0xb0 [ 245.985091][T13266] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 245.991006][T13266] ? pfn_valid+0x1e0/0x1e0 [ 245.995247][T13266] ? rwsem_write_trylock+0x153/0x340 [ 246.000367][T13266] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 246.006624][T13266] copy_mm+0xc7e/0x13e0 [ 246.010621][T13266] ? copy_signal+0x610/0x610 [ 246.015036][T13266] ? __init_rwsem+0xfe/0x1d0 [ 246.019467][T13266] ? copy_signal+0x4e3/0x610 [ 246.023896][T13266] copy_process+0x1149/0x3290 [ 246.028408][T13266] ? __kasan_check_write+0x14/0x20 [ 246.033358][T13266] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 246.038460][T13266] ? vfs_write+0x94d/0x1110 [ 246.042799][T13266] kernel_clone+0x21e/0x9e0 [ 246.047161][T13266] ? __kasan_check_write+0x14/0x20 [ 246.052081][T13266] ? create_io_thread+0x1e0/0x1e0 [ 246.056945][T13266] __x64_sys_clone+0x23f/0x290 [ 246.061540][T13266] ? __do_sys_vfork+0x130/0x130 [ 246.066227][T13266] ? debug_smp_processor_id+0x17/0x20 [ 246.071431][T13266] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 246.077356][T13266] ? exit_to_user_mode_prepare+0x39/0xa0 [ 246.082803][T13266] x64_sys_call+0x1b0/0x9a0 [ 246.087266][T13266] do_syscall_64+0x3b/0xb0 [ 246.091522][T13266] ? clear_bhb_loop+0x35/0x90 [ 246.096040][T13266] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 246.101768][T13266] RIP: 0033:0x7fcefb22d719 [ 246.106018][T13266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.125456][T13266] RSP: 002b:00007fcef9ea5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 246.133701][T13266] RAX: ffffffffffffffda RBX: 00007fcefb3e4f80 RCX: 00007fcefb22d719 [ 246.141510][T13266] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 246.149326][T13266] RBP: 00007fcef9ea6090 R08: 0000000000000000 R09: 0000000000000000 [ 246.157144][T13266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 246.164952][T13266] R13: 0000000000000000 R14: 00007fcefb3e4f80 R15: 00007ffc9fc00758 [ 246.172774][T13266] [ 246.472476][T13295] FAULT_INJECTION: forcing a failure. [ 246.472476][T13295] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 246.571285][T13295] CPU: 1 PID: 13295 Comm: syz.9.5267 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 246.582756][T13295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 246.592642][T13295] Call Trace: [ 246.595767][T13295] [ 246.598545][T13295] dump_stack_lvl+0x151/0x1c0 [ 246.603059][T13295] ? io_uring_drop_tctx_refs+0x190/0x190 [ 246.608524][T13295] ? security_socket_recvmsg+0x87/0xb0 [ 246.613822][T13295] dump_stack+0x15/0x20 [ 246.617814][T13295] should_fail+0x3c6/0x510 [ 246.622066][T13295] should_fail_usercopy+0x1a/0x20 [ 246.626931][T13295] _copy_to_user+0x20/0x90 [ 246.631182][T13295] simple_read_from_buffer+0xc7/0x150 [ 246.636391][T13295] proc_fail_nth_read+0x1a3/0x210 [ 246.641252][T13295] ? proc_fault_inject_write+0x390/0x390 [ 246.646716][T13295] ? fsnotify_perm+0x269/0x5b0 [ 246.651317][T13295] ? security_file_permission+0x86/0xb0 [ 246.656695][T13295] ? proc_fault_inject_write+0x390/0x390 [ 246.662165][T13295] vfs_read+0x27d/0xd40 [ 246.666158][T13295] ? kernel_read+0x1f0/0x1f0 [ 246.670591][T13295] ? __kasan_check_write+0x14/0x20 [ 246.675540][T13295] ? mutex_lock+0xb6/0x1e0 [ 246.679780][T13295] ? wait_for_completion_killable_timeout+0x10/0x10 [ 246.686206][T13295] ? __fdget_pos+0x2e7/0x3a0 [ 246.690630][T13295] ? ksys_read+0x77/0x2c0 [ 246.694797][T13295] ksys_read+0x199/0x2c0 [ 246.698879][T13295] ? vfs_write+0x1110/0x1110 [ 246.703300][T13295] ? debug_smp_processor_id+0x17/0x20 [ 246.708506][T13295] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 246.714413][T13295] __x64_sys_read+0x7b/0x90 [ 246.718838][T13295] x64_sys_call+0x28/0x9a0 [ 246.723106][T13295] do_syscall_64+0x3b/0xb0 [ 246.727340][T13295] ? clear_bhb_loop+0x35/0x90 [ 246.731860][T13295] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 246.737583][T13295] RIP: 0033:0x7f4874e3a15c [ 246.741843][T13295] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 246.761279][T13295] RSP: 002b:00007f4873ab4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 246.769526][T13295] RAX: ffffffffffffffda RBX: 00007f4874ff2f80 RCX: 00007f4874e3a15c [ 246.777336][T13295] RDX: 000000000000000f RSI: 00007f4873ab40a0 RDI: 0000000000000008 [ 246.785242][T13295] RBP: 00007f4873ab4090 R08: 0000000000000000 R09: 0000000000000000 [ 246.793052][T13295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.800864][T13295] R13: 0000000000000000 R14: 00007f4874ff2f80 R15: 00007ffe46b37f78 [ 246.808692][T13295] [ 246.922889][T13311] FAULT_INJECTION: forcing a failure. [ 246.922889][T13311] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 246.966940][T13311] CPU: 1 PID: 13311 Comm: syz.5.5272 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 246.978421][T13311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 246.988308][T13311] Call Trace: [ 246.991432][T13311] [ 246.994210][T13311] dump_stack_lvl+0x151/0x1c0 [ 246.998722][T13311] ? io_uring_drop_tctx_refs+0x190/0x190 [ 247.004191][T13311] ? sched_clock+0x9/0x10 [ 247.008355][T13311] dump_stack+0x15/0x20 [ 247.012343][T13311] should_fail+0x3c6/0x510 [ 247.016601][T13311] should_fail_alloc_page+0x5a/0x80 [ 247.021642][T13311] prepare_alloc_pages+0x15c/0x700 [ 247.026582][T13311] ? __alloc_pages_bulk+0xe40/0xe40 [ 247.031621][T13311] __alloc_pages+0x18c/0x8f0 [ 247.036039][T13311] ? prep_new_page+0x110/0x110 [ 247.040645][T13311] get_zeroed_page+0x1b/0x40 [ 247.045065][T13311] __pud_alloc+0x8b/0x260 [ 247.049230][T13311] ? stack_trace_snprint+0xf0/0xf0 [ 247.054177][T13311] ? do_handle_mm_fault+0x2400/0x2400 [ 247.059383][T13311] ? __stack_depot_save+0x34/0x470 [ 247.064331][T13311] ? anon_vma_clone+0x9a/0x500 [ 247.068932][T13311] copy_page_range+0x2bcf/0x2f90 [ 247.073707][T13311] ? __kasan_slab_alloc+0xb1/0xe0 [ 247.078563][T13311] ? slab_post_alloc_hook+0x53/0x2c0 [ 247.083686][T13311] ? copy_mm+0xa3a/0x13e0 [ 247.087851][T13311] ? copy_process+0x1149/0x3290 [ 247.092537][T13311] ? kernel_clone+0x21e/0x9e0 [ 247.097049][T13311] ? __x64_sys_clone+0x23f/0x290 [ 247.101826][T13311] ? x64_sys_call+0x1b0/0x9a0 [ 247.106345][T13311] ? do_syscall_64+0x3b/0xb0 [ 247.110765][T13311] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 247.116676][T13311] ? pfn_valid+0x1e0/0x1e0 [ 247.120922][T13311] ? rwsem_write_trylock+0x153/0x340 [ 247.126040][T13311] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 247.132300][T13311] copy_mm+0xc7e/0x13e0 [ 247.136289][T13311] ? copy_signal+0x610/0x610 [ 247.140708][T13311] ? __init_rwsem+0xfe/0x1d0 [ 247.145135][T13311] ? copy_signal+0x4e3/0x610 [ 247.149562][T13311] copy_process+0x1149/0x3290 [ 247.154075][T13311] ? __kasan_check_write+0x14/0x20 [ 247.159026][T13311] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 247.163967][T13311] ? vfs_write+0x94d/0x1110 [ 247.168323][T13311] kernel_clone+0x21e/0x9e0 [ 247.172652][T13311] ? __kasan_check_write+0x14/0x20 [ 247.177598][T13311] ? create_io_thread+0x1e0/0x1e0 [ 247.182460][T13311] __x64_sys_clone+0x23f/0x290 [ 247.187073][T13311] ? __do_sys_vfork+0x130/0x130 [ 247.191746][T13311] ? debug_smp_processor_id+0x17/0x20 [ 247.196952][T13311] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 247.202855][T13311] ? exit_to_user_mode_prepare+0x39/0xa0 [ 247.208325][T13311] x64_sys_call+0x1b0/0x9a0 [ 247.212663][T13311] do_syscall_64+0x3b/0xb0 [ 247.216912][T13311] ? clear_bhb_loop+0x35/0x90 [ 247.221427][T13311] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 247.227153][T13311] RIP: 0033:0x7f741bf7e719 [ 247.231408][T13311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.250848][T13311] RSP: 002b:00007f741abf6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 247.259097][T13311] RAX: ffffffffffffffda RBX: 00007f741c135f80 RCX: 00007f741bf7e719 [ 247.266993][T13311] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 247.274801][T13311] RBP: 00007f741abf7090 R08: 0000000000000000 R09: 0000000000000000 [ 247.282700][T13311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 247.290511][T13311] R13: 0000000000000000 R14: 00007f741c135f80 R15: 00007fff0f155c48 [ 247.298334][T13311] [ 247.603331][T13348] syz.8.5286[13348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.603451][T13348] syz.8.5286[13348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.727104][T13355] FAULT_INJECTION: forcing a failure. [ 247.727104][T13355] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 247.772277][T13348] Y­4`Ò˜: renamed from lo [ 247.800139][T13355] CPU: 0 PID: 13355 Comm: syz.6.5288 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 247.811605][T13355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 247.821500][T13355] Call Trace: [ 247.824627][T13355] [ 247.827398][T13355] dump_stack_lvl+0x151/0x1c0 [ 247.832002][T13355] ? io_uring_drop_tctx_refs+0x190/0x190 [ 247.837472][T13355] dump_stack+0x15/0x20 [ 247.841456][T13355] should_fail+0x3c6/0x510 [ 247.845714][T13355] should_fail_alloc_page+0x5a/0x80 [ 247.850773][T13355] prepare_alloc_pages+0x15c/0x700 [ 247.855693][T13355] ? __alloc_pages_bulk+0xe40/0xe40 [ 247.860726][T13355] __alloc_pages+0x18c/0x8f0 [ 247.865151][T13355] ? prep_new_page+0x110/0x110 [ 247.869761][T13355] ? __alloc_pages+0x27e/0x8f0 [ 247.874466][T13355] ? __kasan_check_write+0x14/0x20 [ 247.879411][T13355] ? _raw_spin_lock+0xa4/0x1b0 [ 247.884011][T13355] pte_alloc_one+0x73/0x1b0 [ 247.888352][T13355] ? pfn_modify_allowed+0x2f0/0x2f0 [ 247.893385][T13355] ? __pmd_alloc+0x48d/0x550 [ 247.897814][T13355] __pte_alloc+0x86/0x350 [ 247.901979][T13355] ? __pud_alloc+0x260/0x260 [ 247.906405][T13355] ? __pud_alloc+0x213/0x260 [ 247.910830][T13355] ? free_pgtables+0x280/0x280 [ 247.915429][T13355] ? do_handle_mm_fault+0x2400/0x2400 [ 247.920644][T13355] ? __stack_depot_save+0x34/0x470 [ 247.925589][T13355] ? anon_vma_clone+0x9a/0x500 [ 247.930197][T13355] copy_page_range+0x28a8/0x2f90 [ 247.934958][T13355] ? __kasan_slab_alloc+0xb1/0xe0 [ 247.939818][T13355] ? slab_post_alloc_hook+0x53/0x2c0 [ 247.944940][T13355] ? kernel_clone+0x21e/0x9e0 [ 247.949454][T13355] ? x64_sys_call+0x1b0/0x9a0 [ 247.953971][T13355] ? do_syscall_64+0x3b/0xb0 [ 247.958423][T13355] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 247.964309][T13355] ? pfn_valid+0x1e0/0x1e0 [ 247.968552][T13355] ? rwsem_write_trylock+0x153/0x340 [ 247.973668][T13355] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 247.979914][T13355] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 247.985485][T13355] ? __rb_insert_augmented+0x5de/0x610 [ 247.990770][T13355] copy_mm+0xc7e/0x13e0 [ 247.994768][T13355] ? copy_signal+0x610/0x610 [ 247.999188][T13355] ? __init_rwsem+0xfe/0x1d0 [ 248.003611][T13355] ? copy_signal+0x4e3/0x610 [ 248.008041][T13355] copy_process+0x1149/0x3290 [ 248.012553][T13355] ? __kasan_check_write+0x14/0x20 [ 248.017503][T13355] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 248.022445][T13355] ? vfs_write+0x94d/0x1110 [ 248.026789][T13355] kernel_clone+0x21e/0x9e0 [ 248.031125][T13355] ? __kasan_check_write+0x14/0x20 [ 248.036074][T13355] ? create_io_thread+0x1e0/0x1e0 [ 248.040936][T13355] __x64_sys_clone+0x23f/0x290 [ 248.045537][T13355] ? __do_sys_vfork+0x130/0x130 [ 248.050224][T13355] ? debug_smp_processor_id+0x17/0x20 [ 248.055530][T13355] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 248.061428][T13355] ? exit_to_user_mode_prepare+0x39/0xa0 [ 248.066900][T13355] x64_sys_call+0x1b0/0x9a0 [ 248.071244][T13355] do_syscall_64+0x3b/0xb0 [ 248.075490][T13355] ? clear_bhb_loop+0x35/0x90 [ 248.080002][T13355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 248.085730][T13355] RIP: 0033:0x7fcefb22d719 [ 248.089999][T13355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.109427][T13355] RSP: 002b:00007fcef9ea5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 248.117676][T13355] RAX: ffffffffffffffda RBX: 00007fcefb3e4f80 RCX: 00007fcefb22d719 [ 248.125479][T13355] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 248.133295][T13355] RBP: 00007fcef9ea6090 R08: 0000000000000000 R09: 0000000000000000 [ 248.141108][T13355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 248.148926][T13355] R13: 0000000000000000 R14: 00007fcefb3e4f80 R15: 00007ffc9fc00758 [ 248.156745][T13355] [ 248.226569][T13370] device pim6reg1 entered promiscuous mode [ 248.985687][T13410] FAULT_INJECTION: forcing a failure. [ 248.985687][T13410] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 249.111350][T13410] CPU: 0 PID: 13410 Comm: syz.7.5305 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 249.122830][T13410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 249.132802][T13410] Call Trace: [ 249.135929][T13410] [ 249.138702][T13410] dump_stack_lvl+0x151/0x1c0 [ 249.143221][T13410] ? io_uring_drop_tctx_refs+0x190/0x190 [ 249.148690][T13410] dump_stack+0x15/0x20 [ 249.152677][T13410] should_fail+0x3c6/0x510 [ 249.156930][T13410] should_fail_alloc_page+0x5a/0x80 [ 249.161965][T13410] prepare_alloc_pages+0x15c/0x700 [ 249.166913][T13410] ? __alloc_pages_bulk+0xe40/0xe40 [ 249.171952][T13410] __alloc_pages+0x18c/0x8f0 [ 249.176465][T13410] ? prep_new_page+0x110/0x110 [ 249.181184][T13410] ? __alloc_pages+0x27e/0x8f0 [ 249.185794][T13410] ? __kasan_check_write+0x14/0x20 [ 249.190732][T13410] ? _raw_spin_lock+0xa4/0x1b0 [ 249.195337][T13410] pte_alloc_one+0x73/0x1b0 [ 249.199670][T13410] ? pfn_modify_allowed+0x2f0/0x2f0 [ 249.204704][T13410] ? __pmd_alloc+0x48d/0x550 [ 249.209131][T13410] __pte_alloc+0x86/0x350 [ 249.213298][T13410] ? __pud_alloc+0x260/0x260 [ 249.217723][T13410] ? __pud_alloc+0x213/0x260 [ 249.222150][T13410] ? free_pgtables+0x280/0x280 [ 249.226749][T13410] ? do_handle_mm_fault+0x2400/0x2400 [ 249.231956][T13410] ? __stack_depot_save+0x34/0x470 [ 249.236902][T13410] ? anon_vma_clone+0x9a/0x500 [ 249.241509][T13410] copy_page_range+0x28a8/0x2f90 [ 249.246287][T13410] ? __kasan_slab_alloc+0xb1/0xe0 [ 249.251140][T13410] ? slab_post_alloc_hook+0x53/0x2c0 [ 249.256258][T13410] ? kernel_clone+0x21e/0x9e0 [ 249.260768][T13410] ? x64_sys_call+0x1b0/0x9a0 [ 249.265292][T13410] ? do_syscall_64+0x3b/0xb0 [ 249.269710][T13410] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 249.275631][T13410] ? pfn_valid+0x1e0/0x1e0 [ 249.279865][T13410] ? rwsem_write_trylock+0x153/0x340 [ 249.284987][T13410] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 249.291246][T13410] copy_mm+0xc7e/0x13e0 [ 249.295236][T13410] ? copy_signal+0x610/0x610 [ 249.299776][T13410] ? __init_rwsem+0xfe/0x1d0 [ 249.304190][T13410] ? copy_signal+0x4e3/0x610 [ 249.308619][T13410] copy_process+0x1149/0x3290 [ 249.313304][T13410] ? __kasan_check_write+0x14/0x20 [ 249.318256][T13410] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 249.323198][T13410] ? vfs_write+0x94d/0x1110 [ 249.327542][T13410] kernel_clone+0x21e/0x9e0 [ 249.331892][T13410] ? __kasan_check_write+0x14/0x20 [ 249.336821][T13410] ? create_io_thread+0x1e0/0x1e0 [ 249.341683][T13410] __x64_sys_clone+0x23f/0x290 [ 249.346283][T13410] ? __do_sys_vfork+0x130/0x130 [ 249.350970][T13410] ? debug_smp_processor_id+0x17/0x20 [ 249.356178][T13410] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 249.362110][T13410] ? exit_to_user_mode_prepare+0x39/0xa0 [ 249.367546][T13410] x64_sys_call+0x1b0/0x9a0 [ 249.371886][T13410] do_syscall_64+0x3b/0xb0 [ 249.376137][T13410] ? clear_bhb_loop+0x35/0x90 [ 249.380652][T13410] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 249.386384][T13410] RIP: 0033:0x7fd2fda3b719 [ 249.390633][T13410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 249.410163][T13410] RSP: 002b:00007fd2fc692fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 249.418405][T13410] RAX: ffffffffffffffda RBX: 00007fd2fdbf3058 RCX: 00007fd2fda3b719 [ 249.426216][T13410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 249.434027][T13410] RBP: 00007fd2fc693090 R08: 0000000000000000 R09: 0000000000000000 [ 249.441839][T13410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 249.449650][T13410] R13: 0000000000000000 R14: 00007fd2fdbf3058 R15: 00007fff2d66bc88 [ 249.457473][T13410] [ 249.756424][T13454] device pim6reg1 entered promiscuous mode [ 249.800048][T13457] FAULT_INJECTION: forcing a failure. [ 249.800048][T13457] name failslab, interval 1, probability 0, space 0, times 0 [ 249.891776][T13457] CPU: 1 PID: 13457 Comm: syz.9.5322 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 249.903247][T13457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 249.913146][T13457] Call Trace: [ 249.916264][T13457] [ 249.919047][T13457] dump_stack_lvl+0x151/0x1c0 [ 249.923562][T13457] ? io_uring_drop_tctx_refs+0x190/0x190 [ 249.929029][T13457] dump_stack+0x15/0x20 [ 249.933015][T13457] should_fail+0x3c6/0x510 [ 249.937275][T13457] __should_failslab+0xa4/0xe0 [ 249.941870][T13457] ? vm_area_dup+0x26/0x230 [ 249.946206][T13457] should_failslab+0x9/0x20 [ 249.950544][T13457] slab_pre_alloc_hook+0x37/0xd0 [ 249.955320][T13457] ? vm_area_dup+0x26/0x230 [ 249.959658][T13457] kmem_cache_alloc+0x44/0x200 [ 249.964261][T13457] vm_area_dup+0x26/0x230 [ 249.968431][T13457] copy_mm+0x9a1/0x13e0 [ 249.972428][T13457] ? copy_signal+0x610/0x610 [ 249.976842][T13457] ? __init_rwsem+0xfe/0x1d0 [ 249.981269][T13457] ? copy_signal+0x4e3/0x610 [ 249.985700][T13457] copy_process+0x1149/0x3290 [ 249.990213][T13457] ? __kasan_check_write+0x14/0x20 [ 249.995169][T13457] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 250.000104][T13457] ? vfs_write+0x94d/0x1110 [ 250.004452][T13457] kernel_clone+0x21e/0x9e0 [ 250.008784][T13457] ? __kasan_check_write+0x14/0x20 [ 250.013731][T13457] ? create_io_thread+0x1e0/0x1e0 [ 250.018593][T13457] __x64_sys_clone+0x23f/0x290 [ 250.023193][T13457] ? __do_sys_vfork+0x130/0x130 [ 250.027890][T13457] ? debug_smp_processor_id+0x17/0x20 [ 250.033084][T13457] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 250.038992][T13457] ? exit_to_user_mode_prepare+0x39/0xa0 [ 250.044463][T13457] x64_sys_call+0x1b0/0x9a0 [ 250.048796][T13457] do_syscall_64+0x3b/0xb0 [ 250.053055][T13457] ? clear_bhb_loop+0x35/0x90 [ 250.057562][T13457] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 250.063289][T13457] RIP: 0033:0x7f4874e3b719 [ 250.067543][T13457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 250.086993][T13457] RSP: 002b:00007f4873ab3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 250.095313][T13457] RAX: ffffffffffffffda RBX: 00007f4874ff2f80 RCX: 00007f4874e3b719 [ 250.103125][T13457] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 250.110938][T13457] RBP: 00007f4873ab4090 R08: 0000000000000000 R09: 0000000000000000 [ 250.118749][T13457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 250.126563][T13457] R13: 0000000000000000 R14: 00007f4874ff2f80 R15: 00007ffe46b37f78 [ 250.134466][T13457] [ 250.501375][T13489] FAULT_INJECTION: forcing a failure. [ 250.501375][T13489] name failslab, interval 1, probability 0, space 0, times 0 [ 250.551358][T13489] CPU: 0 PID: 13489 Comm: syz.6.5335 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 250.562822][T13489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 250.572722][T13489] Call Trace: [ 250.575840][T13489] [ 250.578619][T13489] dump_stack_lvl+0x151/0x1c0 [ 250.583134][T13489] ? io_uring_drop_tctx_refs+0x190/0x190 [ 250.588606][T13489] dump_stack+0x15/0x20 [ 250.592595][T13489] should_fail+0x3c6/0x510 [ 250.596845][T13489] __should_failslab+0xa4/0xe0 [ 250.601445][T13489] ? anon_vma_clone+0x9a/0x500 [ 250.606047][T13489] should_failslab+0x9/0x20 [ 250.610385][T13489] slab_pre_alloc_hook+0x37/0xd0 [ 250.615163][T13489] ? anon_vma_clone+0x9a/0x500 [ 250.619759][T13489] kmem_cache_alloc+0x44/0x200 [ 250.624360][T13489] anon_vma_clone+0x9a/0x500 [ 250.628788][T13489] anon_vma_fork+0x91/0x4e0 [ 250.633137][T13489] ? anon_vma_name+0x4c/0x70 [ 250.637553][T13489] ? vm_area_dup+0x17a/0x230 [ 250.641977][T13489] copy_mm+0xa3a/0x13e0 [ 250.645976][T13489] ? copy_signal+0x610/0x610 [ 250.650395][T13489] ? __init_rwsem+0xfe/0x1d0 [ 250.654832][T13489] ? copy_signal+0x4e3/0x610 [ 250.659250][T13489] copy_process+0x1149/0x3290 [ 250.663773][T13489] ? __kasan_check_write+0x14/0x20 [ 250.668714][T13489] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 250.673655][T13489] ? vfs_write+0x94d/0x1110 [ 250.678005][T13489] kernel_clone+0x21e/0x9e0 [ 250.682353][T13489] ? __kasan_check_write+0x14/0x20 [ 250.687284][T13489] ? create_io_thread+0x1e0/0x1e0 [ 250.692150][T13489] __x64_sys_clone+0x23f/0x290 [ 250.696749][T13489] ? __do_sys_vfork+0x130/0x130 [ 250.701436][T13489] ? debug_smp_processor_id+0x17/0x20 [ 250.706635][T13489] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 250.712569][T13489] ? exit_to_user_mode_prepare+0x39/0xa0 [ 250.718008][T13489] x64_sys_call+0x1b0/0x9a0 [ 250.722348][T13489] do_syscall_64+0x3b/0xb0 [ 250.726598][T13489] ? clear_bhb_loop+0x35/0x90 [ 250.731113][T13489] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 250.736843][T13489] RIP: 0033:0x7fcefb22d719 [ 250.741098][T13489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 250.760534][T13489] RSP: 002b:00007fcef9ea5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 250.768874][T13489] RAX: ffffffffffffffda RBX: 00007fcefb3e4f80 RCX: 00007fcefb22d719 [ 250.776683][T13489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 250.784490][T13489] RBP: 00007fcef9ea6090 R08: 0000000000000000 R09: 0000000000000000 [ 250.792304][T13489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 250.800198][T13489] R13: 0000000000000000 R14: 00007fcefb3e4f80 R15: 00007ffc9fc00758 [ 250.808021][T13489] [ 250.939310][T13503] ªªªªªª: renamed from vlan0 [ 251.383279][T13538] FAULT_INJECTION: forcing a failure. [ 251.383279][T13538] name failslab, interval 1, probability 0, space 0, times 0 [ 251.421472][T13538] CPU: 1 PID: 13538 Comm: syz.6.5353 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 251.432947][T13538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 251.442836][T13538] Call Trace: [ 251.445961][T13538] [ 251.448746][T13538] dump_stack_lvl+0x151/0x1c0 [ 251.453264][T13538] ? io_uring_drop_tctx_refs+0x190/0x190 [ 251.458721][T13538] dump_stack+0x15/0x20 [ 251.462723][T13538] should_fail+0x3c6/0x510 [ 251.466985][T13538] __should_failslab+0xa4/0xe0 [ 251.471724][T13538] ? anon_vma_clone+0x9a/0x500 [ 251.476318][T13538] should_failslab+0x9/0x20 [ 251.480658][T13538] slab_pre_alloc_hook+0x37/0xd0 [ 251.485432][T13538] ? anon_vma_clone+0x9a/0x500 [ 251.490037][T13538] kmem_cache_alloc+0x44/0x200 [ 251.494646][T13538] anon_vma_clone+0x9a/0x500 [ 251.499062][T13538] anon_vma_fork+0x91/0x4e0 [ 251.503396][T13538] ? anon_vma_name+0x4c/0x70 [ 251.507834][T13538] ? vm_area_dup+0x17a/0x230 [ 251.512252][T13538] copy_mm+0xa3a/0x13e0 [ 251.516246][T13538] ? copy_signal+0x610/0x610 [ 251.520674][T13538] ? __init_rwsem+0xfe/0x1d0 [ 251.525098][T13538] ? copy_signal+0x4e3/0x610 [ 251.529520][T13538] copy_process+0x1149/0x3290 [ 251.534038][T13538] ? __kasan_check_write+0x14/0x20 [ 251.538989][T13538] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 251.543930][T13538] ? vfs_write+0x94d/0x1110 [ 251.548272][T13538] kernel_clone+0x21e/0x9e0 [ 251.552698][T13538] ? __kasan_check_write+0x14/0x20 [ 251.557641][T13538] ? create_io_thread+0x1e0/0x1e0 [ 251.562506][T13538] __x64_sys_clone+0x23f/0x290 [ 251.567111][T13538] ? __do_sys_vfork+0x130/0x130 [ 251.571794][T13538] ? debug_smp_processor_id+0x17/0x20 [ 251.576999][T13538] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 251.582899][T13538] ? exit_to_user_mode_prepare+0x39/0xa0 [ 251.588369][T13538] x64_sys_call+0x1b0/0x9a0 [ 251.592790][T13538] do_syscall_64+0x3b/0xb0 [ 251.597043][T13538] ? clear_bhb_loop+0x35/0x90 [ 251.601556][T13538] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 251.607288][T13538] RIP: 0033:0x7fcefb22d719 [ 251.611540][T13538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 251.630981][T13538] RSP: 002b:00007fcef9ea5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 251.639225][T13538] RAX: ffffffffffffffda RBX: 00007fcefb3e4f80 RCX: 00007fcefb22d719 [ 251.647037][T13538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 251.654845][T13538] RBP: 00007fcef9ea6090 R08: 0000000000000000 R09: 0000000000000000 [ 251.662659][T13538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 251.670471][T13538] R13: 0000000000000000 R14: 00007fcefb3e4f80 R15: 00007ffc9fc00758 [ 251.678293][T13538] [ 251.905120][T13574] FAULT_INJECTION: forcing a failure. [ 251.905120][T13574] name failslab, interval 1, probability 0, space 0, times 0 [ 251.919828][T13574] CPU: 1 PID: 13574 Comm: syz.8.5368 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 251.931292][T13574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 251.941190][T13574] Call Trace: [ 251.944306][T13574] [ 251.947087][T13574] dump_stack_lvl+0x151/0x1c0 [ 251.951597][T13574] ? io_uring_drop_tctx_refs+0x190/0x190 [ 251.957067][T13574] dump_stack+0x15/0x20 [ 251.961055][T13574] should_fail+0x3c6/0x510 [ 251.965312][T13574] __should_failslab+0xa4/0xe0 [ 251.969919][T13574] ? anon_vma_fork+0xf7/0x4e0 [ 251.974422][T13574] should_failslab+0x9/0x20 [ 251.978764][T13574] slab_pre_alloc_hook+0x37/0xd0 [ 251.983542][T13574] ? anon_vma_fork+0xf7/0x4e0 [ 251.988050][T13574] kmem_cache_alloc+0x44/0x200 [ 251.992649][T13574] anon_vma_fork+0xf7/0x4e0 [ 251.996991][T13574] ? anon_vma_name+0x4c/0x70 [ 252.001418][T13574] ? vm_area_dup+0x17a/0x230 [ 252.005842][T13574] copy_mm+0xa3a/0x13e0 [ 252.009837][T13574] ? copy_signal+0x610/0x610 [ 252.014262][T13574] ? __init_rwsem+0xfe/0x1d0 [ 252.018690][T13574] ? copy_signal+0x4e3/0x610 [ 252.023115][T13574] copy_process+0x1149/0x3290 [ 252.027630][T13574] ? __kasan_check_write+0x14/0x20 [ 252.032577][T13574] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 252.037521][T13574] ? vfs_write+0x94d/0x1110 [ 252.041863][T13574] kernel_clone+0x21e/0x9e0 [ 252.046200][T13574] ? __kasan_check_write+0x14/0x20 [ 252.051147][T13574] ? create_io_thread+0x1e0/0x1e0 [ 252.056014][T13574] __x64_sys_clone+0x23f/0x290 [ 252.060609][T13574] ? __do_sys_vfork+0x130/0x130 [ 252.065299][T13574] ? debug_smp_processor_id+0x17/0x20 [ 252.070503][T13574] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 252.076408][T13574] ? exit_to_user_mode_prepare+0x39/0xa0 [ 252.081873][T13574] x64_sys_call+0x1b0/0x9a0 [ 252.086215][T13574] do_syscall_64+0x3b/0xb0 [ 252.090464][T13574] ? clear_bhb_loop+0x35/0x90 [ 252.094983][T13574] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 252.100703][T13574] RIP: 0033:0x7f4161dfd719 [ 252.104963][T13574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 252.124398][T13574] RSP: 002b:00007f4160a75fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 252.132644][T13574] RAX: ffffffffffffffda RBX: 00007f4161fb4f80 RCX: 00007f4161dfd719 [ 252.140552][T13574] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 252.148364][T13574] RBP: 00007f4160a76090 R08: 0000000000000000 R09: 0000000000000000 [ 252.156174][T13574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 252.163985][T13574] R13: 0000000000000000 R14: 00007f4161fb4f80 R15: 00007ffd53e26f48 [ 252.171807][T13574] [ 252.318464][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.431731][T13595] device pim6reg1 entered promiscuous mode [ 252.469542][T13601] FAULT_INJECTION: forcing a failure. [ 252.469542][T13601] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 252.521314][T13601] CPU: 0 PID: 13601 Comm: syz.9.5380 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 252.532817][T13601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 252.542712][T13601] Call Trace: [ 252.545836][T13601] [ 252.548611][T13601] dump_stack_lvl+0x151/0x1c0 [ 252.553130][T13601] ? io_uring_drop_tctx_refs+0x190/0x190 [ 252.558599][T13601] dump_stack+0x15/0x20 [ 252.562587][T13601] should_fail+0x3c6/0x510 [ 252.566840][T13601] should_fail_alloc_page+0x5a/0x80 [ 252.571875][T13601] prepare_alloc_pages+0x15c/0x700 [ 252.576824][T13601] ? __alloc_pages+0x8f0/0x8f0 [ 252.581522][T13601] ? __alloc_pages_bulk+0xe40/0xe40 [ 252.586555][T13601] __alloc_pages+0x18c/0x8f0 [ 252.590977][T13601] ? prep_new_page+0x110/0x110 [ 252.595576][T13601] ? htab_map_hash+0x356/0x7e0 [ 252.600190][T13601] ? __htab_map_lookup_elem+0x1c6/0x240 [ 252.605570][T13601] pte_alloc_one+0x73/0x1b0 [ 252.609902][T13601] ? pfn_modify_allowed+0x2f0/0x2f0 [ 252.614955][T13601] ? bpf_trace_run2+0x210/0x210 [ 252.619617][T13601] ? arch_stack_walk+0xf3/0x140 [ 252.624310][T13601] __pte_alloc+0x86/0x350 [ 252.628471][T13601] ? free_pgtables+0x280/0x280 [ 252.633070][T13601] ? __bpf_trace_rss_stat+0x95/0xc0 [ 252.638112][T13601] copy_page_range+0x28a8/0x2f90 [ 252.642882][T13601] ? __kasan_slab_alloc+0xb1/0xe0 [ 252.647756][T13601] ? pfn_valid+0x1e0/0x1e0 [ 252.651997][T13601] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 252.657551][T13601] ? __rb_insert_augmented+0x5de/0x610 [ 252.662848][T13601] copy_mm+0xc7e/0x13e0 [ 252.666842][T13601] ? copy_signal+0x610/0x610 [ 252.671260][T13601] ? __init_rwsem+0xfe/0x1d0 [ 252.675698][T13601] ? copy_signal+0x4e3/0x610 [ 252.680115][T13601] copy_process+0x1149/0x3290 [ 252.684718][T13601] ? __kasan_check_write+0x14/0x20 [ 252.689665][T13601] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 252.694703][T13601] ? vfs_write+0x94d/0x1110 [ 252.699057][T13601] kernel_clone+0x21e/0x9e0 [ 252.703386][T13601] ? __kasan_check_write+0x14/0x20 [ 252.708351][T13601] ? create_io_thread+0x1e0/0x1e0 [ 252.713314][T13601] __x64_sys_clone+0x23f/0x290 [ 252.717913][T13601] ? __do_sys_vfork+0x130/0x130 [ 252.722599][T13601] ? debug_smp_processor_id+0x17/0x20 [ 252.727806][T13601] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 252.733834][T13601] ? exit_to_user_mode_prepare+0x39/0xa0 [ 252.739304][T13601] x64_sys_call+0x1b0/0x9a0 [ 252.743640][T13601] do_syscall_64+0x3b/0xb0 [ 252.747893][T13601] ? clear_bhb_loop+0x35/0x90 [ 252.752407][T13601] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 252.758134][T13601] RIP: 0033:0x7f4874e3b719 [ 252.762392][T13601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 252.781830][T13601] RSP: 002b:00007f4873ab3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 252.790183][T13601] RAX: ffffffffffffffda RBX: 00007f4874ff2f80 RCX: 00007f4874e3b719 [ 252.797993][T13601] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 252.805802][T13601] RBP: 00007f4873ab4090 R08: 0000000000000000 R09: 0000000000000000 [ 252.813609][T13601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 252.821426][T13601] R13: 0000000000000000 R14: 00007f4874ff2f80 R15: 00007ffe46b37f78 [ 252.829241][T13601] [ 252.840220][T13604] device pim6reg1 entered promiscuous mode [ 252.876418][T13608] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.883475][T13608] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.911289][T13609] device bridge_slave_1 left promiscuous mode [ 252.917531][T13609] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.933493][T13609] device bridge_slave_0 left promiscuous mode [ 252.939460][T13609] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.128707][T13635] FAULT_INJECTION: forcing a failure. [ 253.128707][T13635] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 253.170418][T13635] CPU: 0 PID: 13635 Comm: syz.8.5395 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 253.181890][T13635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 253.191784][T13635] Call Trace: [ 253.194902][T13635] [ 253.197687][T13635] dump_stack_lvl+0x151/0x1c0 [ 253.202201][T13635] ? io_uring_drop_tctx_refs+0x190/0x190 [ 253.207662][T13635] dump_stack+0x15/0x20 [ 253.211652][T13635] should_fail+0x3c6/0x510 [ 253.215907][T13635] should_fail_alloc_page+0x5a/0x80 [ 253.220940][T13635] prepare_alloc_pages+0x15c/0x700 [ 253.225888][T13635] ? __alloc_pages+0x8f0/0x8f0 [ 253.230489][T13635] ? __alloc_pages_bulk+0xe40/0xe40 [ 253.235524][T13635] __alloc_pages+0x18c/0x8f0 [ 253.239949][T13635] ? prep_new_page+0x110/0x110 [ 253.244548][T13635] ? htab_map_hash+0x356/0x7e0 [ 253.249149][T13635] ? __htab_map_lookup_elem+0x1c6/0x240 [ 253.254532][T13635] pte_alloc_one+0x73/0x1b0 [ 253.258867][T13635] ? pfn_modify_allowed+0x2f0/0x2f0 [ 253.263906][T13635] ? bpf_trace_run2+0x210/0x210 [ 253.268589][T13635] ? arch_stack_walk+0xf3/0x140 [ 253.273277][T13635] __pte_alloc+0x86/0x350 [ 253.277441][T13635] ? free_pgtables+0x280/0x280 [ 253.282040][T13635] ? __bpf_trace_rss_stat+0x95/0xc0 [ 253.287080][T13635] copy_page_range+0x28a8/0x2f90 [ 253.291862][T13635] ? __kasan_slab_alloc+0xb1/0xe0 [ 253.296720][T13635] ? pfn_valid+0x1e0/0x1e0 [ 253.300966][T13635] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 253.306519][T13635] ? __rb_insert_augmented+0x5de/0x610 [ 253.311820][T13635] copy_mm+0xc7e/0x13e0 [ 253.315811][T13635] ? copy_signal+0x610/0x610 [ 253.320231][T13635] ? __init_rwsem+0xfe/0x1d0 [ 253.324662][T13635] ? copy_signal+0x4e3/0x610 [ 253.329094][T13635] copy_process+0x1149/0x3290 [ 253.333602][T13635] ? __kasan_check_write+0x14/0x20 [ 253.338552][T13635] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 253.343493][T13635] ? vfs_write+0x94d/0x1110 [ 253.347837][T13635] kernel_clone+0x21e/0x9e0 [ 253.352172][T13635] ? __kasan_check_write+0x14/0x20 [ 253.357131][T13635] ? create_io_thread+0x1e0/0x1e0 [ 253.361984][T13635] __x64_sys_clone+0x23f/0x290 [ 253.366583][T13635] ? __do_sys_vfork+0x130/0x130 [ 253.371266][T13635] ? debug_smp_processor_id+0x17/0x20 [ 253.376478][T13635] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 253.382383][T13635] ? exit_to_user_mode_prepare+0x39/0xa0 [ 253.387846][T13635] x64_sys_call+0x1b0/0x9a0 [ 253.392186][T13635] do_syscall_64+0x3b/0xb0 [ 253.396441][T13635] ? clear_bhb_loop+0x35/0x90 [ 253.400947][T13635] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 253.406678][T13635] RIP: 0033:0x7f4161dfd719 [ 253.410930][T13635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.430382][T13635] RSP: 002b:00007f4160a75fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 253.438618][T13635] RAX: ffffffffffffffda RBX: 00007f4161fb4f80 RCX: 00007f4161dfd719 [ 253.446429][T13635] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 253.454238][T13635] RBP: 00007f4160a76090 R08: 0000000000000000 R09: 0000000000000000 [ 253.462173][T13635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 253.470113][T13635] R13: 0000000000000000 R14: 00007f4161fb4f80 R15: 00007ffd53e26f48 [ 253.477930][T13635] [ 253.992556][T13697] FAULT_INJECTION: forcing a failure. [ 253.992556][T13697] name failslab, interval 1, probability 0, space 0, times 0 [ 254.005125][T13697] CPU: 0 PID: 13697 Comm: syz.9.5417 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 254.016575][T13697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 254.026468][T13697] Call Trace: [ 254.029592][T13697] [ 254.032368][T13697] dump_stack_lvl+0x151/0x1c0 [ 254.036881][T13697] ? io_uring_drop_tctx_refs+0x190/0x190 [ 254.042359][T13697] dump_stack+0x15/0x20 [ 254.046347][T13697] should_fail+0x3c6/0x510 [ 254.050598][T13697] __should_failslab+0xa4/0xe0 [ 254.055196][T13697] ? anon_vma_clone+0x9a/0x500 [ 254.059815][T13697] should_failslab+0x9/0x20 [ 254.064142][T13697] slab_pre_alloc_hook+0x37/0xd0 [ 254.068910][T13697] ? anon_vma_clone+0x9a/0x500 [ 254.073511][T13697] kmem_cache_alloc+0x44/0x200 [ 254.078126][T13697] anon_vma_clone+0x9a/0x500 [ 254.082541][T13697] anon_vma_fork+0x91/0x4e0 [ 254.086878][T13697] ? anon_vma_name+0x4c/0x70 [ 254.091303][T13697] ? vm_area_dup+0x17a/0x230 [ 254.095729][T13697] copy_mm+0xa3a/0x13e0 [ 254.099734][T13697] ? copy_signal+0x610/0x610 [ 254.104269][T13697] ? __init_rwsem+0xfe/0x1d0 [ 254.108697][T13697] ? copy_signal+0x4e3/0x610 [ 254.113122][T13697] copy_process+0x1149/0x3290 [ 254.117638][T13697] ? __kasan_check_write+0x14/0x20 [ 254.122586][T13697] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 254.127529][T13697] ? vfs_write+0x94d/0x1110 [ 254.131882][T13697] kernel_clone+0x21e/0x9e0 [ 254.136209][T13697] ? __kasan_check_write+0x14/0x20 [ 254.141156][T13697] ? create_io_thread+0x1e0/0x1e0 [ 254.146021][T13697] __x64_sys_clone+0x23f/0x290 [ 254.150618][T13697] ? __do_sys_vfork+0x130/0x130 [ 254.155305][T13697] ? debug_smp_processor_id+0x17/0x20 [ 254.160512][T13697] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 254.166419][T13697] ? exit_to_user_mode_prepare+0x39/0xa0 [ 254.171881][T13697] x64_sys_call+0x1b0/0x9a0 [ 254.176219][T13697] do_syscall_64+0x3b/0xb0 [ 254.180473][T13697] ? clear_bhb_loop+0x35/0x90 [ 254.184988][T13697] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 254.190714][T13697] RIP: 0033:0x7f4874e3b719 [ 254.194968][T13697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 254.214417][T13697] RSP: 002b:00007f4873ab3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 254.222656][T13697] RAX: ffffffffffffffda RBX: 00007f4874ff2f80 RCX: 00007f4874e3b719 [ 254.230465][T13697] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 254.238280][T13697] RBP: 00007f4873ab4090 R08: 0000000000000000 R09: 0000000000000000 [ 254.246087][T13697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 254.253899][T13697] R13: 0000000000000000 R14: 00007f4874ff2f80 R15: 00007ffe46b37f78 [ 254.261807][T13697] [ 254.463494][T13725] FAULT_INJECTION: forcing a failure. [ 254.463494][T13725] name failslab, interval 1, probability 0, space 0, times 0 [ 254.476775][T13725] CPU: 1 PID: 13725 Comm: syz.5.5429 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 254.488246][T13725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 254.498143][T13725] Call Trace: [ 254.501269][T13725] [ 254.504042][T13725] dump_stack_lvl+0x151/0x1c0 [ 254.508562][T13725] ? io_uring_drop_tctx_refs+0x190/0x190 [ 254.514028][T13725] dump_stack+0x15/0x20 [ 254.518014][T13725] should_fail+0x3c6/0x510 [ 254.522268][T13725] __should_failslab+0xa4/0xe0 [ 254.526868][T13725] ? vm_area_dup+0x26/0x230 [ 254.531206][T13725] should_failslab+0x9/0x20 [ 254.535543][T13725] slab_pre_alloc_hook+0x37/0xd0 [ 254.540416][T13725] ? vm_area_dup+0x26/0x230 [ 254.544765][T13725] kmem_cache_alloc+0x44/0x200 [ 254.549360][T13725] vm_area_dup+0x26/0x230 [ 254.553521][T13725] copy_mm+0x9a1/0x13e0 [ 254.557519][T13725] ? copy_signal+0x610/0x610 [ 254.561940][T13725] ? __init_rwsem+0xfe/0x1d0 [ 254.566368][T13725] ? copy_signal+0x4e3/0x610 [ 254.570793][T13725] copy_process+0x1149/0x3290 [ 254.575308][T13725] ? __kasan_check_write+0x14/0x20 [ 254.580258][T13725] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 254.585201][T13725] ? vfs_write+0x94d/0x1110 [ 254.589544][T13725] kernel_clone+0x21e/0x9e0 [ 254.593881][T13725] ? __kasan_check_write+0x14/0x20 [ 254.598828][T13725] ? create_io_thread+0x1e0/0x1e0 [ 254.603693][T13725] __x64_sys_clone+0x23f/0x290 [ 254.608291][T13725] ? __do_sys_vfork+0x130/0x130 [ 254.612981][T13725] ? debug_smp_processor_id+0x17/0x20 [ 254.618186][T13725] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 254.624086][T13725] ? exit_to_user_mode_prepare+0x39/0xa0 [ 254.629557][T13725] x64_sys_call+0x1b0/0x9a0 [ 254.633894][T13725] do_syscall_64+0x3b/0xb0 [ 254.638148][T13725] ? clear_bhb_loop+0x35/0x90 [ 254.642675][T13725] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 254.648385][T13725] RIP: 0033:0x7f741bf7e719 [ 254.652645][T13725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 254.672427][T13725] RSP: 002b:00007f741abf6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 254.680672][T13725] RAX: ffffffffffffffda RBX: 00007f741c135f80 RCX: 00007f741bf7e719 [ 254.688488][T13725] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 254.696295][T13725] RBP: 00007f741abf7090 R08: 0000000000000000 R09: 0000000000000000 [ 254.704194][T13725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 254.712009][T13725] R13: 0000000000000000 R14: 00007f741c135f80 R15: 00007fff0f155c48 [ 254.719823][T13725] [ 254.972840][T13750] syz.6.5437[13750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.972914][T13750] syz.6.5437[13750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.975538][T13751] syz.6.5437[13751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.995944][T13751] syz.6.5437[13751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.313964][T13767] FAULT_INJECTION: forcing a failure. [ 255.313964][T13767] name failslab, interval 1, probability 0, space 0, times 0 [ 255.391262][T13767] CPU: 0 PID: 13767 Comm: syz.5.5442 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 255.402916][T13767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 255.412794][T13767] Call Trace: [ 255.415916][T13767] [ 255.418696][T13767] dump_stack_lvl+0x151/0x1c0 [ 255.423212][T13767] ? io_uring_drop_tctx_refs+0x190/0x190 [ 255.428678][T13767] dump_stack+0x15/0x20 [ 255.432669][T13767] should_fail+0x3c6/0x510 [ 255.436930][T13767] __should_failslab+0xa4/0xe0 [ 255.441527][T13767] ? vm_area_dup+0x26/0x230 [ 255.445867][T13767] should_failslab+0x9/0x20 [ 255.450203][T13767] slab_pre_alloc_hook+0x37/0xd0 [ 255.454978][T13767] ? vm_area_dup+0x26/0x230 [ 255.459326][T13767] kmem_cache_alloc+0x44/0x200 [ 255.463918][T13767] vm_area_dup+0x26/0x230 [ 255.468084][T13767] copy_mm+0x9a1/0x13e0 [ 255.472078][T13767] ? copy_signal+0x610/0x610 [ 255.476499][T13767] ? __init_rwsem+0xfe/0x1d0 [ 255.480926][T13767] ? copy_signal+0x4e3/0x610 [ 255.485350][T13767] copy_process+0x1149/0x3290 [ 255.490212][T13767] ? __kasan_check_write+0x14/0x20 [ 255.495250][T13767] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 255.500189][T13767] ? vfs_write+0x94d/0x1110 [ 255.504552][T13767] kernel_clone+0x21e/0x9e0 [ 255.508871][T13767] ? __kasan_check_write+0x14/0x20 [ 255.513820][T13767] ? create_io_thread+0x1e0/0x1e0 [ 255.518684][T13767] __x64_sys_clone+0x23f/0x290 [ 255.523280][T13767] ? __do_sys_vfork+0x130/0x130 [ 255.527968][T13767] ? debug_smp_processor_id+0x17/0x20 [ 255.533190][T13767] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 255.539074][T13767] ? exit_to_user_mode_prepare+0x39/0xa0 [ 255.544553][T13767] x64_sys_call+0x1b0/0x9a0 [ 255.548882][T13767] do_syscall_64+0x3b/0xb0 [ 255.553132][T13767] ? clear_bhb_loop+0x35/0x90 [ 255.557649][T13767] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 255.563376][T13767] RIP: 0033:0x7f741bf7e719 [ 255.567630][T13767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 255.587072][T13767] RSP: 002b:00007f741abf6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 255.595315][T13767] RAX: ffffffffffffffda RBX: 00007f741c135f80 RCX: 00007f741bf7e719 [ 255.603124][T13767] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 255.610944][T13767] RBP: 00007f741abf7090 R08: 0000000000000000 R09: 0000000000000000 [ 255.618751][T13767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 255.626562][T13767] R13: 0000000000000000 R14: 00007f741c135f80 R15: 00007fff0f155c48 [ 255.634380][T13767] [ 255.887222][T13800] device sit0 entered promiscuous mode [ 256.232294][T13811] FAULT_INJECTION: forcing a failure. [ 256.232294][T13811] name failslab, interval 1, probability 0, space 0, times 0 [ 256.311401][T13811] CPU: 0 PID: 13811 Comm: syz.9.5457 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 256.322886][T13811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 256.332770][T13811] Call Trace: [ 256.335892][T13811] [ 256.338759][T13811] dump_stack_lvl+0x151/0x1c0 [ 256.343266][T13811] ? io_uring_drop_tctx_refs+0x190/0x190 [ 256.348740][T13811] dump_stack+0x15/0x20 [ 256.352740][T13811] should_fail+0x3c6/0x510 [ 256.356983][T13811] __should_failslab+0xa4/0xe0 [ 256.361580][T13811] ? anon_vma_fork+0x1df/0x4e0 [ 256.366180][T13811] should_failslab+0x9/0x20 [ 256.370518][T13811] slab_pre_alloc_hook+0x37/0xd0 [ 256.375380][T13811] ? anon_vma_fork+0x1df/0x4e0 [ 256.379978][T13811] kmem_cache_alloc+0x44/0x200 [ 256.384580][T13811] anon_vma_fork+0x1df/0x4e0 [ 256.389010][T13811] copy_mm+0xa3a/0x13e0 [ 256.393004][T13811] ? copy_signal+0x610/0x610 [ 256.397428][T13811] ? __init_rwsem+0xfe/0x1d0 [ 256.401854][T13811] ? copy_signal+0x4e3/0x610 [ 256.406277][T13811] copy_process+0x1149/0x3290 [ 256.410791][T13811] ? __kasan_check_write+0x14/0x20 [ 256.415742][T13811] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 256.420693][T13811] ? vfs_write+0x94d/0x1110 [ 256.425030][T13811] kernel_clone+0x21e/0x9e0 [ 256.429364][T13811] ? __kasan_check_write+0x14/0x20 [ 256.434312][T13811] ? create_io_thread+0x1e0/0x1e0 [ 256.439264][T13811] __x64_sys_clone+0x23f/0x290 [ 256.443862][T13811] ? __do_sys_vfork+0x130/0x130 [ 256.448548][T13811] ? debug_smp_processor_id+0x17/0x20 [ 256.453757][T13811] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 256.459745][T13811] ? exit_to_user_mode_prepare+0x39/0xa0 [ 256.465414][T13811] x64_sys_call+0x1b0/0x9a0 [ 256.469837][T13811] do_syscall_64+0x3b/0xb0 [ 256.474085][T13811] ? clear_bhb_loop+0x35/0x90 [ 256.478599][T13811] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 256.484323][T13811] RIP: 0033:0x7f4874e3b719 [ 256.488579][T13811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.508021][T13811] RSP: 002b:00007f4873ab3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 256.516266][T13811] RAX: ffffffffffffffda RBX: 00007f4874ff2f80 RCX: 00007f4874e3b719 [ 256.524073][T13811] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 256.531887][T13811] RBP: 00007f4873ab4090 R08: 0000000000000000 R09: 0000000000000000 [ 256.539700][T13811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 256.547509][T13811] R13: 0000000000000000 R14: 00007f4874ff2f80 R15: 00007ffe46b37f78 [ 256.555328][T13811] [ 256.942761][ T30] audit: type=1400 audit(1730021236.613:170): avc: denied { create } for pid=13859 comm="syz.7.5474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 257.036790][T13866] FAULT_INJECTION: forcing a failure. [ 257.036790][T13866] name failslab, interval 1, probability 0, space 0, times 0 [ 257.112354][T13866] CPU: 0 PID: 13866 Comm: syz.6.5477 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 257.123825][T13866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 257.133729][T13866] Call Trace: [ 257.136854][T13866] [ 257.139622][T13866] dump_stack_lvl+0x151/0x1c0 [ 257.144139][T13866] ? io_uring_drop_tctx_refs+0x190/0x190 [ 257.149641][T13866] dump_stack+0x15/0x20 [ 257.153612][T13866] should_fail+0x3c6/0x510 [ 257.157848][T13866] __should_failslab+0xa4/0xe0 [ 257.162451][T13866] ? vm_area_dup+0x26/0x230 [ 257.166785][T13866] should_failslab+0x9/0x20 [ 257.171128][T13866] slab_pre_alloc_hook+0x37/0xd0 [ 257.175918][T13866] ? vm_area_dup+0x26/0x230 [ 257.180240][T13866] kmem_cache_alloc+0x44/0x200 [ 257.184845][T13866] vm_area_dup+0x26/0x230 [ 257.189008][T13866] copy_mm+0x9a1/0x13e0 [ 257.193011][T13866] ? copy_signal+0x610/0x610 [ 257.197435][T13866] ? __init_rwsem+0xfe/0x1d0 [ 257.201852][T13866] ? copy_signal+0x4e3/0x610 [ 257.206276][T13866] copy_process+0x1149/0x3290 [ 257.210792][T13866] ? __kasan_check_write+0x14/0x20 [ 257.215829][T13866] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 257.220769][T13866] ? vfs_write+0x94d/0x1110 [ 257.225118][T13866] kernel_clone+0x21e/0x9e0 [ 257.229453][T13866] ? __kasan_check_write+0x14/0x20 [ 257.234400][T13866] ? create_io_thread+0x1e0/0x1e0 [ 257.239266][T13866] __x64_sys_clone+0x23f/0x290 [ 257.244007][T13866] ? __do_sys_vfork+0x130/0x130 [ 257.248695][T13866] ? debug_smp_processor_id+0x17/0x20 [ 257.253900][T13866] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 257.259807][T13866] ? exit_to_user_mode_prepare+0x39/0xa0 [ 257.265275][T13866] x64_sys_call+0x1b0/0x9a0 [ 257.269608][T13866] do_syscall_64+0x3b/0xb0 [ 257.273866][T13866] ? clear_bhb_loop+0x35/0x90 [ 257.278377][T13866] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 257.284107][T13866] RIP: 0033:0x7fcefb22d719 [ 257.288357][T13866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.307901][T13866] RSP: 002b:00007fcef9ea5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 257.316142][T13866] RAX: ffffffffffffffda RBX: 00007fcefb3e4f80 RCX: 00007fcefb22d719 [ 257.323953][T13866] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 257.331774][T13866] RBP: 00007fcef9ea6090 R08: 0000000000000000 R09: 0000000000000000 [ 257.339680][T13866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 257.347473][T13866] R13: 0000000000000000 R14: 00007fcefb3e4f80 R15: 00007ffc9fc00758 [ 257.355295][T13866] [ 257.749026][T13876] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.766149][T13876] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.802126][T13876] device bridge_slave_0 entered promiscuous mode [ 257.881178][T13876] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.888758][T13876] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.899153][T13876] device bridge_slave_1 entered promiscuous mode [ 257.978749][ T8] device bridge_slave_1 left promiscuous mode [ 257.994699][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.007619][ T8] device bridge_slave_0 left promiscuous mode [ 258.022976][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.056331][ T8] device veth1_macvtap left promiscuous mode [ 258.606274][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.616737][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.662138][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.681685][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.689792][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.696680][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.714199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.731638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.743161][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.750043][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.767578][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.829795][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.846489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.949575][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.965075][T13926] FAULT_INJECTION: forcing a failure. [ 258.965075][T13926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 258.969219][T13876] device veth0_vlan entered promiscuous mode [ 258.984024][T13926] CPU: 0 PID: 13926 Comm: syz.8.5497 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 258.993086][T13876] device veth1_macvtap entered promiscuous mode [ 258.995468][T13926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 258.995483][T13926] Call Trace: [ 258.995490][T13926] [ 258.995499][T13926] dump_stack_lvl+0x151/0x1c0 [ 259.021866][T13926] ? io_uring_drop_tctx_refs+0x190/0x190 [ 259.027409][T13926] dump_stack+0x15/0x20 [ 259.031401][T13926] should_fail+0x3c6/0x510 [ 259.035741][T13926] should_fail_alloc_page+0x5a/0x80 [ 259.040772][T13926] prepare_alloc_pages+0x15c/0x700 [ 259.045721][T13926] ? __alloc_pages+0x8f0/0x8f0 [ 259.050322][T13926] ? __alloc_pages_bulk+0xe40/0xe40 [ 259.055354][T13926] __alloc_pages+0x18c/0x8f0 [ 259.059787][T13926] ? prep_new_page+0x110/0x110 [ 259.064379][T13926] ? __htab_map_lookup_elem+0x1c6/0x240 [ 259.069759][T13926] ? bpf_trace_run3+0x123/0x250 [ 259.074471][T13926] pte_alloc_one+0x73/0x1b0 [ 259.078786][T13926] ? pfn_modify_allowed+0x2f0/0x2f0 [ 259.083824][T13926] ? arch_stack_walk+0xf3/0x140 [ 259.088510][T13926] __pte_alloc+0x86/0x350 [ 259.092674][T13926] ? __bpf_trace_rss_stat+0x95/0xc0 [ 259.097708][T13926] ? free_pgtables+0x280/0x280 [ 259.102308][T13926] ? __traceiter_rss_stat+0x32/0x50 [ 259.107345][T13926] copy_page_range+0x28a8/0x2f90 [ 259.112118][T13926] ? __kasan_slab_alloc+0xb1/0xe0 [ 259.116984][T13926] ? pfn_valid+0x1e0/0x1e0 [ 259.121237][T13926] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 259.126785][T13926] ? __rb_insert_augmented+0x5de/0x610 [ 259.132083][T13926] copy_mm+0xc7e/0x13e0 [ 259.136088][T13926] ? copy_signal+0x610/0x610 [ 259.140493][T13926] ? __init_rwsem+0xfe/0x1d0 [ 259.144927][T13926] ? copy_signal+0x4e3/0x610 [ 259.149358][T13926] copy_process+0x1149/0x3290 [ 259.153870][T13926] ? __kasan_check_write+0x14/0x20 [ 259.158813][T13926] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 259.163768][T13926] ? vfs_write+0x94d/0x1110 [ 259.168102][T13926] kernel_clone+0x21e/0x9e0 [ 259.172542][T13926] ? __kasan_check_write+0x14/0x20 [ 259.177489][T13926] ? create_io_thread+0x1e0/0x1e0 [ 259.182351][T13926] __x64_sys_clone+0x23f/0x290 [ 259.186951][T13926] ? __do_sys_vfork+0x130/0x130 [ 259.191653][T13926] ? debug_smp_processor_id+0x17/0x20 [ 259.196839][T13926] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 259.202745][T13926] ? exit_to_user_mode_prepare+0x39/0xa0 [ 259.208213][T13926] x64_sys_call+0x1b0/0x9a0 [ 259.212551][T13926] do_syscall_64+0x3b/0xb0 [ 259.216803][T13926] ? clear_bhb_loop+0x35/0x90 [ 259.221318][T13926] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 259.227046][T13926] RIP: 0033:0x7f4161dfd719 [ 259.231307][T13926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.251002][T13926] RSP: 002b:00007f4160a75fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 259.259334][T13926] RAX: ffffffffffffffda RBX: 00007f4161fb4f80 RCX: 00007f4161dfd719 [ 259.267144][T13926] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 259.274954][T13926] RBP: 00007f4160a76090 R08: 0000000000000000 R09: 0000000000000000 [ 259.282771][T13926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 259.290578][T13926] R13: 0000000000000000 R14: 00007f4161fb4f80 R15: 00007ffd53e26f48 [ 259.298407][T13926] [ 259.307284][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.318079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 259.328740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.338450][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.345868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.353431][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.870820][T13959] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.877803][T13959] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.884923][T13959] device bridge_slave_0 entered promiscuous mode [ 259.892330][T13959] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.899324][T13959] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.906947][T13959] device bridge_slave_1 entered promiscuous mode [ 259.941422][T13967] FAULT_INJECTION: forcing a failure. [ 259.941422][T13967] name failslab, interval 1, probability 0, space 0, times 0 [ 259.971809][T13967] CPU: 1 PID: 13967 Comm: syz.5.5510 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 259.983361][T13967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 259.993255][T13967] Call Trace: [ 259.996378][T13967] [ 259.999157][T13967] dump_stack_lvl+0x151/0x1c0 [ 260.003759][T13967] ? io_uring_drop_tctx_refs+0x190/0x190 [ 260.009230][T13967] dump_stack+0x15/0x20 [ 260.013216][T13967] should_fail+0x3c6/0x510 [ 260.017476][T13967] __should_failslab+0xa4/0xe0 [ 260.022071][T13967] ? vm_area_dup+0x26/0x230 [ 260.026409][T13967] should_failslab+0x9/0x20 [ 260.030749][T13967] slab_pre_alloc_hook+0x37/0xd0 [ 260.035523][T13967] ? vm_area_dup+0x26/0x230 [ 260.039870][T13967] kmem_cache_alloc+0x44/0x200 [ 260.044466][T13967] vm_area_dup+0x26/0x230 [ 260.048639][T13967] copy_mm+0x9a1/0x13e0 [ 260.052630][T13967] ? copy_signal+0x610/0x610 [ 260.057135][T13967] ? __init_rwsem+0xfe/0x1d0 [ 260.061565][T13967] ? copy_signal+0x4e3/0x610 [ 260.065990][T13967] copy_process+0x1149/0x3290 [ 260.070501][T13967] ? __kasan_check_write+0x14/0x20 [ 260.075451][T13967] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 260.080395][T13967] ? vfs_write+0x94d/0x1110 [ 260.084744][T13967] kernel_clone+0x21e/0x9e0 [ 260.089070][T13967] ? __kasan_check_write+0x14/0x20 [ 260.094036][T13967] ? create_io_thread+0x1e0/0x1e0 [ 260.098883][T13967] __x64_sys_clone+0x23f/0x290 [ 260.103481][T13967] ? __do_sys_vfork+0x130/0x130 [ 260.108255][T13967] ? debug_smp_processor_id+0x17/0x20 [ 260.113583][T13967] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 260.119535][T13967] ? exit_to_user_mode_prepare+0x39/0xa0 [ 260.125004][T13967] x64_sys_call+0x1b0/0x9a0 [ 260.129344][T13967] do_syscall_64+0x3b/0xb0 [ 260.133603][T13967] ? clear_bhb_loop+0x35/0x90 [ 260.138109][T13967] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 260.143835][T13967] RIP: 0033:0x7f741bf7e719 [ 260.148092][T13967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 260.167531][T13967] RSP: 002b:00007f741abf6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 260.175786][T13967] RAX: ffffffffffffffda RBX: 00007f741c135f80 RCX: 00007f741bf7e719 [ 260.183590][T13967] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 260.191489][T13967] RBP: 00007f741abf7090 R08: 0000000000000000 R09: 0000000000000000 [ 260.199297][T13967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 260.207110][T13967] R13: 0000000000000000 R14: 00007f741c135f80 R15: 00007fff0f155c48 [ 260.214931][T13967] [ 260.395053][T13959] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.401948][T13959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.409067][T13959] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.415938][T13959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.502878][ T9968] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.541881][ T9968] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.780694][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.796047][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.839801][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.915363][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.987003][ T9968] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.993897][ T9968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.109698][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.167124][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.180912][ T9968] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.187800][ T9968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.250005][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 261.268787][T14004] FAULT_INJECTION: forcing a failure. [ 261.268787][T14004] name failslab, interval 1, probability 0, space 0, times 0 [ 261.294440][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.303104][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 261.311091][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.361515][T14004] CPU: 0 PID: 14004 Comm: syz.8.5523 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 261.372985][T14004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 261.382876][T14004] Call Trace: [ 261.386000][T14004] [ 261.388776][T14004] dump_stack_lvl+0x151/0x1c0 [ 261.393313][T14004] ? io_uring_drop_tctx_refs+0x190/0x190 [ 261.398759][T14004] dump_stack+0x15/0x20 [ 261.402750][T14004] should_fail+0x3c6/0x510 [ 261.407006][T14004] __should_failslab+0xa4/0xe0 [ 261.411603][T14004] ? vm_area_dup+0x26/0x230 [ 261.415941][T14004] should_failslab+0x9/0x20 [ 261.420296][T14004] slab_pre_alloc_hook+0x37/0xd0 [ 261.425053][T14004] ? vm_area_dup+0x26/0x230 [ 261.429392][T14004] kmem_cache_alloc+0x44/0x200 [ 261.433995][T14004] vm_area_dup+0x26/0x230 [ 261.438162][T14004] copy_mm+0x9a1/0x13e0 [ 261.442154][T14004] ? copy_signal+0x610/0x610 [ 261.446577][T14004] ? __init_rwsem+0xfe/0x1d0 [ 261.451003][T14004] ? copy_signal+0x4e3/0x610 [ 261.455432][T14004] copy_process+0x1149/0x3290 [ 261.459944][T14004] ? __kasan_check_write+0x14/0x20 [ 261.464897][T14004] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 261.469839][T14004] ? vfs_write+0x94d/0x1110 [ 261.474181][T14004] kernel_clone+0x21e/0x9e0 [ 261.478519][T14004] ? __kasan_check_write+0x14/0x20 [ 261.483465][T14004] ? create_io_thread+0x1e0/0x1e0 [ 261.488332][T14004] __x64_sys_clone+0x23f/0x290 [ 261.492928][T14004] ? __do_sys_vfork+0x130/0x130 [ 261.497620][T14004] ? debug_smp_processor_id+0x17/0x20 [ 261.502817][T14004] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 261.508721][T14004] ? exit_to_user_mode_prepare+0x39/0xa0 [ 261.514280][T14004] x64_sys_call+0x1b0/0x9a0 [ 261.518614][T14004] do_syscall_64+0x3b/0xb0 [ 261.523562][T14004] ? clear_bhb_loop+0x35/0x90 [ 261.528075][T14004] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 261.533803][T14004] RIP: 0033:0x7f4161dfd719 [ 261.538060][T14004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 261.557499][T14004] RSP: 002b:00007f4160a75fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 261.565741][T14004] RAX: ffffffffffffffda RBX: 00007f4161fb4f80 RCX: 00007f4161dfd719 [ 261.573573][T14004] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 261.581365][T14004] RBP: 00007f4160a76090 R08: 0000000000000000 R09: 0000000000000000 [ 261.589177][T14004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 261.596987][T14004] R13: 0000000000000000 R14: 00007f4161fb4f80 R15: 00007ffd53e26f48 [ 261.604810][T14004] [ 261.654755][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 261.682219][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.735403][ T10] device bridge_slave_1 left promiscuous mode [ 261.751841][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.813532][ T10] device bridge_slave_0 left promiscuous mode [ 261.862486][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.892181][ T10] device veth1_macvtap left promiscuous mode [ 261.909926][ T10] device veth0_vlan left promiscuous mode [ 262.054482][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 262.071664][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.079922][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.087349][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.097911][T14021] device veth1_macvtap left promiscuous mode [ 262.117948][T13959] device veth0_vlan entered promiscuous mode [ 262.157522][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 262.167747][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.179523][T13959] device veth1_macvtap entered promiscuous mode [ 262.209217][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 262.218399][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.227716][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.296559][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.360260][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.406498][T14048] bond_slave_1: mtu less than device minimum [ 262.522072][T14050] FAULT_INJECTION: forcing a failure. [ 262.522072][T14050] name failslab, interval 1, probability 0, space 0, times 0 [ 262.572030][T14050] CPU: 0 PID: 14050 Comm: syz.6.5540 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 262.583499][T14050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 262.593411][T14050] Call Trace: [ 262.596517][T14050] [ 262.599295][T14050] dump_stack_lvl+0x151/0x1c0 [ 262.603814][T14050] ? io_uring_drop_tctx_refs+0x190/0x190 [ 262.609421][T14050] ? avc_denied+0x1b0/0x1b0 [ 262.613750][T14050] dump_stack+0x15/0x20 [ 262.617748][T14050] should_fail+0x3c6/0x510 [ 262.622079][T14050] __should_failslab+0xa4/0xe0 [ 262.626680][T14050] ? vm_area_dup+0x26/0x230 [ 262.631016][T14050] should_failslab+0x9/0x20 [ 262.635359][T14050] slab_pre_alloc_hook+0x37/0xd0 [ 262.640133][T14050] ? vm_area_dup+0x26/0x230 [ 262.644472][T14050] kmem_cache_alloc+0x44/0x200 [ 262.649072][T14050] vm_area_dup+0x26/0x230 [ 262.653240][T14050] copy_mm+0x9a1/0x13e0 [ 262.657238][T14050] ? copy_signal+0x610/0x610 [ 262.661658][T14050] ? __init_rwsem+0xfe/0x1d0 [ 262.666082][T14050] ? copy_signal+0x4e3/0x610 [ 262.670510][T14050] copy_process+0x1149/0x3290 [ 262.675023][T14050] ? __kasan_check_write+0x14/0x20 [ 262.679976][T14050] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 262.684920][T14050] ? vfs_write+0x94d/0x1110 [ 262.689260][T14050] kernel_clone+0x21e/0x9e0 [ 262.693597][T14050] ? __kasan_check_write+0x14/0x20 [ 262.698542][T14050] ? create_io_thread+0x1e0/0x1e0 [ 262.703415][T14050] __x64_sys_clone+0x23f/0x290 [ 262.708004][T14050] ? __do_sys_vfork+0x130/0x130 [ 262.712693][T14050] ? debug_smp_processor_id+0x17/0x20 [ 262.717898][T14050] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 262.723800][T14050] ? exit_to_user_mode_prepare+0x39/0xa0 [ 262.729272][T14050] x64_sys_call+0x1b0/0x9a0 [ 262.733606][T14050] do_syscall_64+0x3b/0xb0 [ 262.737863][T14050] ? clear_bhb_loop+0x35/0x90 [ 262.742375][T14050] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 262.748101][T14050] RIP: 0033:0x7fcefb22d719 [ 262.752360][T14050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 262.771796][T14050] RSP: 002b:00007fcef9ea5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 262.780047][T14050] RAX: ffffffffffffffda RBX: 00007fcefb3e4f80 RCX: 00007fcefb22d719 [ 262.787850][T14050] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 262.795668][T14050] RBP: 00007fcef9ea6090 R08: 0000000000000000 R09: 0000000000000000 [ 262.803472][T14050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 262.811285][T14050] R13: 0000000000000000 R14: 00007fcefb3e4f80 R15: 00007ffc9fc00758 [ 262.819101][T14050] [ 262.943488][T14056] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.950379][T14056] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.957824][T14056] device bridge_slave_0 entered promiscuous mode [ 262.978763][T14056] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.016355][T14056] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.025383][T14056] device bridge_slave_1 entered promiscuous mode [ 263.200153][T14056] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.207056][T14056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.214202][T14056] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.221044][T14056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.365668][T14085] FAULT_INJECTION: forcing a failure. [ 263.365668][T14085] name failslab, interval 1, probability 0, space 0, times 0 [ 263.391274][T14085] CPU: 0 PID: 14085 Comm: syz.8.5553 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 263.402735][T14085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 263.412631][T14085] Call Trace: [ 263.415755][T14085] [ 263.418534][T14085] dump_stack_lvl+0x151/0x1c0 [ 263.423050][T14085] ? io_uring_drop_tctx_refs+0x190/0x190 [ 263.428517][T14085] dump_stack+0x15/0x20 [ 263.432505][T14085] should_fail+0x3c6/0x510 [ 263.436758][T14085] __should_failslab+0xa4/0xe0 [ 263.441385][T14085] ? vm_area_dup+0x26/0x230 [ 263.445698][T14085] should_failslab+0x9/0x20 [ 263.450035][T14085] slab_pre_alloc_hook+0x37/0xd0 [ 263.454810][T14085] ? vm_area_dup+0x26/0x230 [ 263.459149][T14085] kmem_cache_alloc+0x44/0x200 [ 263.463749][T14085] vm_area_dup+0x26/0x230 [ 263.467915][T14085] copy_mm+0x9a1/0x13e0 [ 263.472103][T14085] ? copy_signal+0x610/0x610 [ 263.476526][T14085] ? __init_rwsem+0xfe/0x1d0 [ 263.480960][T14085] ? copy_signal+0x4e3/0x610 [ 263.485399][T14085] copy_process+0x1149/0x3290 [ 263.489890][T14085] ? __kasan_check_write+0x14/0x20 [ 263.494839][T14085] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 263.499782][T14085] ? vfs_write+0x94d/0x1110 [ 263.504124][T14085] kernel_clone+0x21e/0x9e0 [ 263.508461][T14085] ? __kasan_check_write+0x14/0x20 [ 263.513406][T14085] ? create_io_thread+0x1e0/0x1e0 [ 263.518273][T14085] __x64_sys_clone+0x23f/0x290 [ 263.522876][T14085] ? __do_sys_vfork+0x130/0x130 [ 263.527560][T14085] ? debug_smp_processor_id+0x17/0x20 [ 263.532757][T14085] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 263.538659][T14085] ? exit_to_user_mode_prepare+0x39/0xa0 [ 263.544215][T14085] x64_sys_call+0x1b0/0x9a0 [ 263.548560][T14085] do_syscall_64+0x3b/0xb0 [ 263.552807][T14085] ? clear_bhb_loop+0x35/0x90 [ 263.557324][T14085] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 263.563047][T14085] RIP: 0033:0x7f4161dfd719 [ 263.567303][T14085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 263.586741][T14085] RSP: 002b:00007f4160a75fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 263.594988][T14085] RAX: ffffffffffffffda RBX: 00007f4161fb4f80 RCX: 00007f4161dfd719 [ 263.602814][T14085] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 263.610620][T14085] RBP: 00007f4160a76090 R08: 0000000000000000 R09: 0000000000000000 [ 263.618423][T14085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 263.626255][T14085] R13: 0000000000000000 R14: 00007f4161fb4f80 R15: 00007ffd53e26f48 [ 263.634056][T14085] [ 263.783320][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.802562][ T9968] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.814643][ T9968] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.824518][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.832684][ T9968] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.839567][ T9968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.996863][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 264.015289][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.024536][ T9968] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.031418][ T9968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.051157][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 264.059775][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.082881][T14120] FAULT_INJECTION: forcing a failure. [ 264.082881][T14120] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 264.096053][T14120] CPU: 1 PID: 14120 Comm: syz.5.5565 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 264.107502][T14120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 264.117397][T14120] Call Trace: [ 264.120521][T14120] [ 264.123302][T14120] dump_stack_lvl+0x151/0x1c0 [ 264.127823][T14120] ? io_uring_drop_tctx_refs+0x190/0x190 [ 264.133283][T14120] ? __update_load_avg_cfs_rq+0xb1/0x2f0 [ 264.138754][T14120] dump_stack+0x15/0x20 [ 264.142745][T14120] should_fail+0x3c6/0x510 [ 264.147006][T14120] should_fail_alloc_page+0x5a/0x80 [ 264.152035][T14120] prepare_alloc_pages+0x15c/0x700 [ 264.156979][T14120] ? __alloc_pages_bulk+0xe40/0xe40 [ 264.162016][T14120] ? native_set_ldt+0x360/0x360 [ 264.166700][T14120] __alloc_pages+0x18c/0x8f0 [ 264.171122][T14120] ? _raw_spin_unlock+0x4d/0x70 [ 264.175815][T14120] ? prep_new_page+0x110/0x110 [ 264.180415][T14120] ? htab_map_hash+0x356/0x7e0 [ 264.185019][T14120] ? __htab_map_lookup_elem+0x1c6/0x240 [ 264.190395][T14120] pte_alloc_one+0x73/0x1b0 [ 264.194734][T14120] ? pfn_modify_allowed+0x2f0/0x2f0 [ 264.199765][T14120] ? bpf_trace_run2+0x210/0x210 [ 264.204456][T14120] __pte_alloc+0x86/0x350 [ 264.208624][T14120] ? free_pgtables+0x280/0x280 [ 264.213221][T14120] ? __bpf_trace_rss_stat+0x95/0xc0 [ 264.218260][T14120] copy_page_range+0x28a8/0x2f90 [ 264.223030][T14120] ? __kasan_slab_alloc+0xb1/0xe0 [ 264.227904][T14120] ? pfn_valid+0x1e0/0x1e0 [ 264.232150][T14120] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 264.237703][T14120] ? __rb_insert_augmented+0x5de/0x610 [ 264.242997][T14120] copy_mm+0xc7e/0x13e0 [ 264.247167][T14120] ? copy_signal+0x610/0x610 [ 264.251578][T14120] ? __init_rwsem+0xfe/0x1d0 [ 264.256005][T14120] ? copy_signal+0x4e3/0x610 [ 264.260436][T14120] copy_process+0x1149/0x3290 [ 264.264948][T14120] ? __kasan_check_write+0x14/0x20 [ 264.269896][T14120] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 264.274849][T14120] ? vfs_write+0x94d/0x1110 [ 264.279184][T14120] kernel_clone+0x21e/0x9e0 [ 264.283527][T14120] ? __kasan_check_write+0x14/0x20 [ 264.288464][T14120] ? create_io_thread+0x1e0/0x1e0 [ 264.293334][T14120] __x64_sys_clone+0x23f/0x290 [ 264.297928][T14120] ? __do_sys_vfork+0x130/0x130 [ 264.302618][T14120] ? debug_smp_processor_id+0x17/0x20 [ 264.307818][T14120] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 264.313720][T14120] ? exit_to_user_mode_prepare+0x39/0xa0 [ 264.319191][T14120] x64_sys_call+0x1b0/0x9a0 [ 264.323530][T14120] do_syscall_64+0x3b/0xb0 [ 264.327796][T14120] ? clear_bhb_loop+0x35/0x90 [ 264.332298][T14120] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 264.338029][T14120] RIP: 0033:0x7f741bf7e719 [ 264.342276][T14120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.361724][T14120] RSP: 002b:00007f741abf6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 264.369961][T14120] RAX: ffffffffffffffda RBX: 00007f741c135f80 RCX: 00007f741bf7e719 [ 264.377772][T14120] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 264.385584][T14120] RBP: 00007f741abf7090 R08: 0000000000000000 R09: 0000000000000000 [ 264.393398][T14120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 264.401295][T14120] R13: 0000000000000000 R14: 00007f741c135f80 R15: 00007fff0f155c48 [ 264.409115][T14120] [ 264.426293][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 264.442554][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.460865][T14056] device veth0_vlan entered promiscuous mode [ 264.518125][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 264.528725][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.537174][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 264.545823][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.554289][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.561889][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.638780][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 264.647325][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 264.664737][T14143] syz.8.5572[14143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.664819][T14143] syz.8.5572[14143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.679588][T14056] device veth1_macvtap entered promiscuous mode [ 264.761128][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 264.770029][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 264.778972][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 264.789968][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 264.798261][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.866687][ T10] device bridge_slave_1 left promiscuous mode [ 264.873032][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.880727][ T10] device bridge_slave_0 left promiscuous mode [ 264.892540][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.911646][ T10] device veth1_macvtap left promiscuous mode [ 264.917616][ T10] device veth0_vlan left promiscuous mode [ 264.935793][T14160] FAULT_INJECTION: forcing a failure. [ 264.935793][T14160] name failslab, interval 1, probability 0, space 0, times 0 [ 265.001277][T14160] CPU: 1 PID: 14160 Comm: syz.5.5577 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 265.012746][T14160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 265.022649][T14160] Call Trace: [ 265.025772][T14160] [ 265.028546][T14160] dump_stack_lvl+0x151/0x1c0 [ 265.033056][T14160] ? io_uring_drop_tctx_refs+0x190/0x190 [ 265.038528][T14160] dump_stack+0x15/0x20 [ 265.042517][T14160] should_fail+0x3c6/0x510 [ 265.046860][T14160] __should_failslab+0xa4/0xe0 [ 265.051462][T14160] ? vm_area_dup+0x26/0x230 [ 265.055799][T14160] should_failslab+0x9/0x20 [ 265.060139][T14160] slab_pre_alloc_hook+0x37/0xd0 [ 265.064924][T14160] ? vm_area_dup+0x26/0x230 [ 265.069262][T14160] kmem_cache_alloc+0x44/0x200 [ 265.073844][T14160] vm_area_dup+0x26/0x230 [ 265.078008][T14160] copy_mm+0x9a1/0x13e0 [ 265.082005][T14160] ? copy_signal+0x610/0x610 [ 265.086429][T14160] ? __init_rwsem+0xfe/0x1d0 [ 265.090857][T14160] ? copy_signal+0x4e3/0x610 [ 265.095280][T14160] copy_process+0x1149/0x3290 [ 265.099797][T14160] ? __kasan_check_write+0x14/0x20 [ 265.104749][T14160] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 265.109686][T14160] ? vfs_write+0x94d/0x1110 [ 265.114046][T14160] kernel_clone+0x21e/0x9e0 [ 265.118371][T14160] ? __kasan_check_write+0x14/0x20 [ 265.123321][T14160] ? create_io_thread+0x1e0/0x1e0 [ 265.128179][T14160] __x64_sys_clone+0x23f/0x290 [ 265.132776][T14160] ? __do_sys_vfork+0x130/0x130 [ 265.137463][T14160] ? debug_smp_processor_id+0x17/0x20 [ 265.142666][T14160] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 265.148571][T14160] ? exit_to_user_mode_prepare+0x39/0xa0 [ 265.154039][T14160] x64_sys_call+0x1b0/0x9a0 [ 265.158376][T14160] do_syscall_64+0x3b/0xb0 [ 265.162635][T14160] ? clear_bhb_loop+0x35/0x90 [ 265.167167][T14160] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 265.172875][T14160] RIP: 0033:0x7f741bf7e719 [ 265.177143][T14160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 265.196566][T14160] RSP: 002b:00007f741abf6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 265.204830][T14160] RAX: ffffffffffffffda RBX: 00007f741c135f80 RCX: 00007f741bf7e719 [ 265.212624][T14160] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 265.220436][T14160] RBP: 00007f741abf7090 R08: 0000000000000000 R09: 0000000000000000 [ 265.228244][T14160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 265.236076][T14160] R13: 0000000000000000 R14: 00007f741c135f80 R15: 00007fff0f155c48 [ 265.243879][T14160] [ 266.274662][T14200] FAULT_INJECTION: forcing a failure. [ 266.274662][T14200] name failslab, interval 1, probability 0, space 0, times 0 [ 266.351579][T14200] CPU: 0 PID: 14200 Comm: syz.5.5589 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 266.363053][T14200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 266.372946][T14200] Call Trace: [ 266.376077][T14200] [ 266.378849][T14200] dump_stack_lvl+0x151/0x1c0 [ 266.383363][T14200] ? io_uring_drop_tctx_refs+0x190/0x190 [ 266.388834][T14200] dump_stack+0x15/0x20 [ 266.392825][T14200] should_fail+0x3c6/0x510 [ 266.397084][T14200] __should_failslab+0xa4/0xe0 [ 266.401689][T14200] ? vm_area_dup+0x26/0x230 [ 266.406014][T14200] should_failslab+0x9/0x20 [ 266.410356][T14200] slab_pre_alloc_hook+0x37/0xd0 [ 266.415132][T14200] ? vm_area_dup+0x26/0x230 [ 266.419472][T14200] kmem_cache_alloc+0x44/0x200 [ 266.424073][T14200] vm_area_dup+0x26/0x230 [ 266.428237][T14200] copy_mm+0x9a1/0x13e0 [ 266.432248][T14200] ? copy_signal+0x610/0x610 [ 266.436651][T14200] ? __init_rwsem+0xfe/0x1d0 [ 266.441082][T14200] ? copy_signal+0x4e3/0x610 [ 266.445504][T14200] copy_process+0x1149/0x3290 [ 266.450022][T14200] ? __kasan_check_write+0x14/0x20 [ 266.455074][T14200] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 266.460009][T14200] ? vfs_write+0x94d/0x1110 [ 266.464359][T14200] kernel_clone+0x21e/0x9e0 [ 266.468779][T14200] ? __kasan_check_write+0x14/0x20 [ 266.473725][T14200] ? create_io_thread+0x1e0/0x1e0 [ 266.478592][T14200] __x64_sys_clone+0x23f/0x290 [ 266.483185][T14200] ? __do_sys_vfork+0x130/0x130 [ 266.487869][T14200] ? debug_smp_processor_id+0x17/0x20 [ 266.493075][T14200] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 266.498979][T14200] ? exit_to_user_mode_prepare+0x39/0xa0 [ 266.504486][T14200] x64_sys_call+0x1b0/0x9a0 [ 266.508792][T14200] do_syscall_64+0x3b/0xb0 [ 266.513041][T14200] ? clear_bhb_loop+0x35/0x90 [ 266.517561][T14200] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 266.523289][T14200] RIP: 0033:0x7f741bf7e719 [ 266.527557][T14200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 266.546982][T14200] RSP: 002b:00007f741abf6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 266.555226][T14200] RAX: ffffffffffffffda RBX: 00007f741c135f80 RCX: 00007f741bf7e719 [ 266.563033][T14200] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 266.570844][T14200] RBP: 00007f741abf7090 R08: 0000000000000000 R09: 0000000000000000 [ 266.578666][T14200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 266.586464][T14200] R13: 0000000000000000 R14: 00007f741c135f80 R15: 00007fff0f155c48 [ 266.594285][T14200] [ 266.752923][T14194] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.759818][T14194] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.895756][T14194] device bridge_slave_0 entered promiscuous mode [ 267.044981][T14194] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.051940][T14194] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.059263][T14194] device bridge_slave_1 entered promiscuous mode [ 267.243465][ T10] device bridge_slave_1 left promiscuous mode [ 267.249445][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.289903][ T10] device bridge_slave_0 left promiscuous mode [ 267.324901][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.367789][ T10] device veth1_macvtap left promiscuous mode [ 267.466627][ T10] device veth0_vlan left promiscuous mode [ 267.969266][T14246] FAULT_INJECTION: forcing a failure. [ 267.969266][T14246] name failslab, interval 1, probability 0, space 0, times 0 [ 268.026529][T14246] CPU: 1 PID: 14246 Comm: syz.6.5603 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 268.038001][T14246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 268.047899][T14246] Call Trace: [ 268.051021][T14246] [ 268.053801][T14246] dump_stack_lvl+0x151/0x1c0 [ 268.058312][T14246] ? io_uring_drop_tctx_refs+0x190/0x190 [ 268.063786][T14246] dump_stack+0x15/0x20 [ 268.067769][T14246] should_fail+0x3c6/0x510 [ 268.072037][T14246] __should_failslab+0xa4/0xe0 [ 268.076631][T14246] ? vm_area_dup+0x26/0x230 [ 268.080967][T14246] should_failslab+0x9/0x20 [ 268.085313][T14246] slab_pre_alloc_hook+0x37/0xd0 [ 268.090078][T14246] ? vm_area_dup+0x26/0x230 [ 268.094414][T14246] kmem_cache_alloc+0x44/0x200 [ 268.099018][T14246] vm_area_dup+0x26/0x230 [ 268.103199][T14246] copy_mm+0x9a1/0x13e0 [ 268.107180][T14246] ? copy_signal+0x610/0x610 [ 268.111602][T14246] ? __init_rwsem+0xfe/0x1d0 [ 268.116025][T14246] ? copy_signal+0x4e3/0x610 [ 268.120454][T14246] copy_process+0x1149/0x3290 [ 268.124969][T14246] ? __kasan_check_write+0x14/0x20 [ 268.129918][T14246] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 268.134862][T14246] ? vfs_write+0x94d/0x1110 [ 268.139207][T14246] kernel_clone+0x21e/0x9e0 [ 268.143541][T14246] ? __kasan_check_write+0x14/0x20 [ 268.148490][T14246] ? create_io_thread+0x1e0/0x1e0 [ 268.153352][T14246] __x64_sys_clone+0x23f/0x290 [ 268.157951][T14246] ? __do_sys_vfork+0x130/0x130 [ 268.162730][T14246] ? debug_smp_processor_id+0x17/0x20 [ 268.167929][T14246] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 268.173837][T14246] ? exit_to_user_mode_prepare+0x39/0xa0 [ 268.179306][T14246] x64_sys_call+0x1b0/0x9a0 [ 268.183643][T14246] do_syscall_64+0x3b/0xb0 [ 268.187902][T14246] ? clear_bhb_loop+0x35/0x90 [ 268.192409][T14246] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 268.198136][T14246] RIP: 0033:0x7fcefb22d719 [ 268.202397][T14246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.221828][T14246] RSP: 002b:00007fcef9ea5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 268.230076][T14246] RAX: ffffffffffffffda RBX: 00007fcefb3e4f80 RCX: 00007fcefb22d719 [ 268.237889][T14246] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 268.245797][T14246] RBP: 00007fcef9ea6090 R08: 0000000000000000 R09: 0000000000000000 [ 268.253771][T14246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 268.261585][T14246] R13: 0000000000000000 R14: 00007fcefb3e4f80 R15: 00007ffc9fc00758 [ 268.269395][T14246] [ 268.289838][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.300433][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.332366][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.350787][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.359128][ T9968] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.366096][ T9968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.373911][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.382912][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.391008][ T9968] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.397887][ T9968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.428286][T14251] device syzkaller0 entered promiscuous mode [ 268.467307][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.478006][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.485969][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.494895][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.502403][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.509893][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.517749][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.531815][T14194] device veth0_vlan entered promiscuous mode [ 268.608406][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.634106][T14194] device veth1_macvtap entered promiscuous mode [ 268.641542][T14261] €Â0: renamed from pim6reg1 [ 268.661326][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 268.673169][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.681621][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 268.706287][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.789992][T14283] FAULT_INJECTION: forcing a failure. [ 268.789992][T14283] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 268.803312][T14283] CPU: 1 PID: 14283 Comm: syz.7.5617 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 268.814792][T14283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 268.824667][T14283] Call Trace: [ 268.827790][T14283] [ 268.830575][T14283] dump_stack_lvl+0x151/0x1c0 [ 268.835080][T14283] ? io_uring_drop_tctx_refs+0x190/0x190 [ 268.840549][T14283] dump_stack+0x15/0x20 [ 268.844539][T14283] should_fail+0x3c6/0x510 [ 268.848793][T14283] should_fail_alloc_page+0x5a/0x80 [ 268.853826][T14283] prepare_alloc_pages+0x15c/0x700 [ 268.858777][T14283] ? __alloc_pages_bulk+0xe40/0xe40 [ 268.863811][T14283] __alloc_pages+0x18c/0x8f0 [ 268.868246][T14283] ? prep_new_page+0x110/0x110 [ 268.872837][T14283] ? stack_trace_save+0x1c0/0x1c0 [ 268.877690][T14283] ? __kernel_text_address+0x9b/0x110 [ 268.882901][T14283] pte_alloc_one+0x73/0x1b0 [ 268.887240][T14283] ? pfn_modify_allowed+0x2f0/0x2f0 [ 268.892277][T14283] __pte_alloc+0x86/0x350 [ 268.896440][T14283] ? free_pgtables+0x280/0x280 [ 268.901040][T14283] ? __stack_depot_save+0x34/0x470 [ 268.905987][T14283] ? anon_vma_clone+0x9a/0x500 [ 268.910588][T14283] copy_page_range+0x28a8/0x2f90 [ 268.915359][T14283] ? __kasan_slab_alloc+0xb1/0xe0 [ 268.920220][T14283] ? slab_post_alloc_hook+0x53/0x2c0 [ 268.925343][T14283] ? kernel_clone+0x21e/0x9e0 [ 268.929854][T14283] ? x64_sys_call+0x1b0/0x9a0 [ 268.934369][T14283] ? do_syscall_64+0x3b/0xb0 [ 268.938791][T14283] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 268.944714][T14283] ? pfn_valid+0x1e0/0x1e0 [ 268.948950][T14283] ? rwsem_write_trylock+0x153/0x340 [ 268.954068][T14283] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 268.960319][T14283] ? vma_interval_tree_augment_rotate+0x1a3/0x1d0 [ 268.966592][T14283] copy_mm+0xc7e/0x13e0 [ 268.970564][T14283] ? copy_signal+0x610/0x610 [ 268.974989][T14283] ? __init_rwsem+0xfe/0x1d0 [ 268.979412][T14283] ? copy_signal+0x4e3/0x610 [ 268.983854][T14283] copy_process+0x1149/0x3290 [ 268.988353][T14283] ? __kasan_check_write+0x14/0x20 [ 268.993311][T14283] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 268.998334][T14283] ? vfs_write+0x94d/0x1110 [ 269.002678][T14283] kernel_clone+0x21e/0x9e0 [ 269.007013][T14283] ? __kasan_check_write+0x14/0x20 [ 269.011964][T14283] ? create_io_thread+0x1e0/0x1e0 [ 269.016917][T14283] __x64_sys_clone+0x23f/0x290 [ 269.021511][T14283] ? __do_sys_vfork+0x130/0x130 [ 269.026197][T14283] ? debug_smp_processor_id+0x17/0x20 [ 269.031400][T14283] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 269.037306][T14283] ? exit_to_user_mode_prepare+0x39/0xa0 [ 269.042771][T14283] x64_sys_call+0x1b0/0x9a0 [ 269.047111][T14283] do_syscall_64+0x3b/0xb0 [ 269.051360][T14283] ? clear_bhb_loop+0x35/0x90 [ 269.055880][T14283] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 269.061603][T14283] RIP: 0033:0x7fd2fda3b719 [ 269.065859][T14283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 269.085302][T14283] RSP: 002b:00007fd2fc6b3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 269.093545][T14283] RAX: ffffffffffffffda RBX: 00007fd2fdbf2f80 RCX: 00007fd2fda3b719 [ 269.101355][T14283] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 269.109169][T14283] RBP: 00007fd2fc6b4090 R08: 0000000000000000 R09: 0000000000000000 [ 269.116979][T14283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 269.124791][T14283] R13: 0000000000000000 R14: 00007fd2fdbf2f80 R15: 00007fff2d66bc88 [ 269.132610][T14283] [ 269.788484][T14308] device syzkaller0 entered promiscuous mode [ 269.816366][T14303] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.823328][T14303] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.830704][T14303] device bridge_slave_0 entered promiscuous mode [ 269.847590][T14303] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.854512][T14303] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.861887][T14303] device bridge_slave_1 entered promiscuous mode [ 270.023278][T14321] device syzkaller0 entered promiscuous mode [ 270.081836][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.089950][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.097448][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.105785][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.113917][ T9968] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.120740][ T9968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.128195][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.136565][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.144836][ T9968] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.151700][ T9968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.159092][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.201166][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.215492][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.249158][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.264379][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.273457][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.282409][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.284013][T14336] FAULT_INJECTION: forcing a failure. [ 270.284013][T14336] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.303461][T14303] device veth0_vlan entered promiscuous mode [ 270.310052][T14336] CPU: 1 PID: 14336 Comm: syz.8.5632 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 270.319010][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.321507][T14336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 270.321523][T14336] Call Trace: [ 270.321531][T14336] [ 270.321538][T14336] dump_stack_lvl+0x151/0x1c0 [ 270.332226][T14303] device veth1_macvtap entered promiscuous mode [ 270.339129][T14336] ? io_uring_drop_tctx_refs+0x190/0x190 [ 270.348080][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.349549][T14336] ? memset+0x35/0x40 [ 270.372811][T14336] dump_stack+0x15/0x20 [ 270.376795][T14336] should_fail+0x3c6/0x510 [ 270.381050][T14336] should_fail_alloc_page+0x5a/0x80 [ 270.386085][T14336] prepare_alloc_pages+0x15c/0x700 [ 270.391033][T14336] ? __alloc_pages_bulk+0xe40/0xe40 [ 270.396070][T14336] __alloc_pages+0x18c/0x8f0 [ 270.400494][T14336] ? prep_new_page+0x110/0x110 [ 270.405090][T14336] ? htab_map_hash+0x356/0x7e0 [ 270.409692][T14336] ? __htab_map_lookup_elem+0x1c6/0x240 [ 270.415076][T14336] pte_alloc_one+0x73/0x1b0 [ 270.419411][T14336] ? pfn_modify_allowed+0x2f0/0x2f0 [ 270.424448][T14336] ? bpf_trace_run2+0x210/0x210 [ 270.429129][T14336] ? arch_stack_walk+0xf3/0x140 [ 270.433821][T14336] __pte_alloc+0x86/0x350 [ 270.437986][T14336] ? free_pgtables+0x280/0x280 [ 270.442585][T14336] ? __bpf_trace_rss_stat+0x95/0xc0 [ 270.447624][T14336] copy_page_range+0x28a8/0x2f90 [ 270.452396][T14336] ? __kasan_slab_alloc+0xb1/0xe0 [ 270.457264][T14336] ? pfn_valid+0x1e0/0x1e0 [ 270.461508][T14336] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 270.467059][T14336] ? __rb_insert_augmented+0x5de/0x610 [ 270.472358][T14336] copy_mm+0xc7e/0x13e0 [ 270.476350][T14336] ? copy_signal+0x610/0x610 [ 270.480803][T14336] ? __init_rwsem+0xfe/0x1d0 [ 270.485206][T14336] ? copy_signal+0x4e3/0x610 [ 270.489632][T14336] copy_process+0x1149/0x3290 [ 270.494154][T14336] ? __kasan_check_write+0x14/0x20 [ 270.499092][T14336] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 270.504038][T14336] ? vfs_write+0x94d/0x1110 [ 270.508379][T14336] kernel_clone+0x21e/0x9e0 [ 270.512715][T14336] ? __kasan_check_write+0x14/0x20 [ 270.517668][T14336] ? create_io_thread+0x1e0/0x1e0 [ 270.522526][T14336] __x64_sys_clone+0x23f/0x290 [ 270.527124][T14336] ? __do_sys_vfork+0x130/0x130 [ 270.531814][T14336] ? debug_smp_processor_id+0x17/0x20 [ 270.537025][T14336] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 270.542921][T14336] ? exit_to_user_mode_prepare+0x39/0xa0 [ 270.548386][T14336] x64_sys_call+0x1b0/0x9a0 [ 270.552820][T14336] do_syscall_64+0x3b/0xb0 [ 270.557063][T14336] ? clear_bhb_loop+0x35/0x90 [ 270.561579][T14336] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 270.567307][T14336] RIP: 0033:0x7f4161dfd719 [ 270.571563][T14336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 270.591000][T14336] RSP: 002b:00007f4160a75fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 270.599245][T14336] RAX: ffffffffffffffda RBX: 00007f4161fb4f80 RCX: 00007f4161dfd719 [ 270.607154][T14336] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 270.615046][T14336] RBP: 00007f4160a76090 R08: 0000000000000000 R09: 0000000000000000 [ 270.622851][T14336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 270.630670][T14336] R13: 0000000000000000 R14: 00007f4161fb4f80 R15: 00007ffd53e26f48 [ 270.638482][T14336] [ 270.674099][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.889531][ T10] device bridge_slave_1 left promiscuous mode [ 270.895573][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.902937][ T10] device bridge_slave_0 left promiscuous mode [ 270.908849][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.916761][ T10] device veth1_macvtap left promiscuous mode [ 270.922642][ T10] device veth0_vlan left promiscuous mode [ 271.584482][T14377] FAULT_INJECTION: forcing a failure. [ 271.584482][T14377] name failslab, interval 1, probability 0, space 0, times 0 [ 271.667140][T14367] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.697249][T14367] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.721823][T14377] CPU: 1 PID: 14377 Comm: syz.6.5646 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 271.733383][T14377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 271.743271][T14377] Call Trace: [ 271.746392][T14377] [ 271.749194][T14377] dump_stack_lvl+0x151/0x1c0 [ 271.753788][T14377] ? io_uring_drop_tctx_refs+0x190/0x190 [ 271.759256][T14377] dump_stack+0x15/0x20 [ 271.763261][T14377] should_fail+0x3c6/0x510 [ 271.766149][T14367] device bridge_slave_0 entered promiscuous mode [ 271.767493][T14377] __should_failslab+0xa4/0xe0 [ 271.778260][T14377] ? vm_area_dup+0x26/0x230 [ 271.782597][T14377] should_failslab+0x9/0x20 [ 271.786934][T14377] slab_pre_alloc_hook+0x37/0xd0 [ 271.791710][T14377] ? vm_area_dup+0x26/0x230 [ 271.796048][T14377] kmem_cache_alloc+0x44/0x200 [ 271.800651][T14377] vm_area_dup+0x26/0x230 [ 271.804905][T14377] copy_mm+0x9a1/0x13e0 [ 271.808900][T14377] ? copy_signal+0x610/0x610 [ 271.813321][T14377] ? __init_rwsem+0xfe/0x1d0 [ 271.817748][T14377] ? copy_signal+0x4e3/0x610 [ 271.822179][T14377] copy_process+0x1149/0x3290 [ 271.826687][T14377] ? __kasan_check_write+0x14/0x20 [ 271.831639][T14377] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 271.836584][T14377] ? vfs_write+0x94d/0x1110 [ 271.840922][T14377] kernel_clone+0x21e/0x9e0 [ 271.845258][T14377] ? __kasan_check_write+0x14/0x20 [ 271.850208][T14377] ? create_io_thread+0x1e0/0x1e0 [ 271.855072][T14377] __x64_sys_clone+0x23f/0x290 [ 271.859667][T14377] ? __do_sys_vfork+0x130/0x130 [ 271.864365][T14377] ? debug_smp_processor_id+0x17/0x20 [ 271.869651][T14377] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 271.875563][T14377] ? exit_to_user_mode_prepare+0x39/0xa0 [ 271.881018][T14377] x64_sys_call+0x1b0/0x9a0 [ 271.885357][T14377] do_syscall_64+0x3b/0xb0 [ 271.889610][T14377] ? clear_bhb_loop+0x35/0x90 [ 271.894121][T14377] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 271.899853][T14377] RIP: 0033:0x7fcefb22d719 [ 271.904111][T14377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.923547][T14377] RSP: 002b:00007fcef9ea5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 271.931792][T14377] RAX: ffffffffffffffda RBX: 00007fcefb3e4f80 RCX: 00007fcefb22d719 [ 271.939601][T14377] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 271.947413][T14377] RBP: 00007fcef9ea6090 R08: 0000000000000000 R09: 0000000000000000 [ 271.955227][T14377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 271.963036][T14377] R13: 0000000000000000 R14: 00007fcefb3e4f80 R15: 00007ffc9fc00758 [ 271.970856][T14377] [ 271.985892][T14367] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.995616][T14367] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.006595][T14367] device bridge_slave_1 entered promiscuous mode [ 272.042459][T14382] bond_slave_1: mtu less than device minimum [ 272.221972][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.251811][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.309812][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.356713][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.419785][ T9968] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.426678][ T9968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.485706][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.501638][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.509855][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.518256][ T9968] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.525128][ T9968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.550815][T14417] device syzkaller0 entered promiscuous mode [ 272.618180][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.620118][T14424] FAULT_INJECTION: forcing a failure. [ 272.620118][T14424] name failslab, interval 1, probability 0, space 0, times 0 [ 272.640295][T14419] device veth1_macvtap left promiscuous mode [ 272.664011][T14424] CPU: 0 PID: 14424 Comm: syz.8.5660 Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 272.674734][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.675469][T14424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 272.675482][T14424] Call Trace: [ 272.696045][T14424] [ 272.698818][T14424] dump_stack_lvl+0x151/0x1c0 [ 272.701641][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.703333][T14424] ? io_uring_drop_tctx_refs+0x190/0x190 [ 272.716703][T14424] dump_stack+0x15/0x20 [ 272.720691][T14424] should_fail+0x3c6/0x510 [ 272.724944][T14424] __should_failslab+0xa4/0xe0 [ 272.729543][T14424] ? anon_vma_fork+0xf7/0x4e0 [ 272.734063][T14424] should_failslab+0x9/0x20 [ 272.738394][T14424] slab_pre_alloc_hook+0x37/0xd0 [ 272.743170][T14424] ? anon_vma_fork+0xf7/0x4e0 [ 272.747686][T14424] kmem_cache_alloc+0x44/0x200 [ 272.752296][T14424] anon_vma_fork+0xf7/0x4e0 [ 272.756726][T14424] ? anon_vma_name+0x43/0x70 [ 272.761226][T14424] ? vm_area_dup+0x17a/0x230 [ 272.765650][T14424] copy_mm+0xa3a/0x13e0 [ 272.769648][T14424] ? copy_signal+0x610/0x610 [ 272.774066][T14424] ? __init_rwsem+0xfe/0x1d0 [ 272.778499][T14424] ? copy_signal+0x4e3/0x610 [ 272.782919][T14424] copy_process+0x1149/0x3290 [ 272.787435][T14424] ? __kasan_check_write+0x14/0x20 [ 272.792386][T14424] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 272.797326][T14424] ? vfs_write+0x94d/0x1110 [ 272.801671][T14424] kernel_clone+0x21e/0x9e0 [ 272.806009][T14424] ? __kasan_check_write+0x14/0x20 [ 272.810956][T14424] ? create_io_thread+0x1e0/0x1e0 [ 272.815822][T14424] __x64_sys_clone+0x23f/0x290 [ 272.820413][T14424] ? __do_sys_vfork+0x130/0x130 [ 272.825194][T14424] ? debug_smp_processor_id+0x17/0x20 [ 272.830394][T14424] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 272.836299][T14424] ? exit_to_user_mode_prepare+0x39/0xa0 [ 272.841766][T14424] x64_sys_call+0x1b0/0x9a0 [ 272.846121][T14424] do_syscall_64+0x3b/0xb0 [ 272.850361][T14424] ? clear_bhb_loop+0x35/0x90 [ 272.854963][T14424] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 272.860685][T14424] RIP: 0033:0x7f4161dfd719 [ 272.864939][T14424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 272.884384][T14424] RSP: 002b:00007f4160a75fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 272.892627][T14424] RAX: ffffffffffffffda RBX: 00007f4161fb4f80 RCX: 00007f4161dfd719 [ 272.900435][T14424] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 272.908252][T14424] RBP: 00007f4160a76090 R08: 0000000000000000 R09: 0000000000000000 [ 272.916079][T14424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 272.923872][T14424] R13: 0000000000000000 R14: 00007f4161fb4f80 R15: 00007ffd53e26f48 [ 272.931690][T14424] [ 272.941454][ T10] device bridge_slave_1 left promiscuous mode [ 272.949634][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.959905][ T10] device bridge_slave_0 left promiscuous mode [ 272.965996][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.975808][ T10] device veth1_macvtap left promiscuous mode [ 272.982420][ T10] device veth0_vlan left promiscuous mode [ 273.149597][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.172458][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.191568][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.211399][T14367] device veth0_vlan entered promiscuous mode [ 273.242634][T14367] device veth1_macvtap entered promiscuous mode [ 273.251775][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.260975][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.273802][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.302025][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.315721][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.328563][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 273.341011][ T9968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 273.378490][T14367] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 273.390122][T14367] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 273.398366][T14367] CPU: 1 PID: 14367 Comm: syz-executor Tainted: G W 5.15.167-syzkaller-android13-5.15.167_r00 #0 [ 273.410001][T14367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 273.419897][T14367] RIP: 0010:__rb_erase_color+0x20b/0xa60 [ 273.425364][T14367] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 19 ce 2a ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 f6 cd 2a ff 41 f6 07 01 48 89 5d [ 273.444907][T14367] RSP: 0018:ffffc90000c079e0 EFLAGS: 00010246 [ 273.450806][T14367] RAX: dffffc0000000000 RBX: ffff88814bc28068 RCX: ffff888117aa62c0 [ 273.459054][T14367] RDX: ffffffff81a56990 RSI: ffff88810c8860c8 RDI: ffff88814bc28058 [ 273.466866][T14367] RBP: ffffc90000c07a40 R08: ffffffff81a54a50 R09: ffffed1021910c1d [ 273.474783][T14367] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 273.482681][T14367] R13: ffff88814bc28058 R14: 1ffff1102978500d R15: 0000000000000000 [ 273.490495][T14367] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 273.499266][T14367] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 273.505691][T14367] CR2: ffffffffd66f0000 CR3: 0000000117984000 CR4: 00000000003506a0 [ 273.513501][T14367] DR0: 0000000020000300 DR1: 0000000020000300 DR2: 0000000000000000 [ 273.521304][T14367] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 273.529119][T14367] Call Trace: [ 273.532240][T14367] [ 273.535021][T14367] ? __die_body+0x62/0xb0 [ 273.539184][T14367] ? die_addr+0x9f/0xd0 [ 273.543176][T14367] ? exc_general_protection+0x311/0x4b0 [ 273.548567][T14367] ? asm_exc_general_protection+0x27/0x30 [ 273.554110][T14367] ? vma_interval_tree_remove+0xae0/0xba0 [ 273.559669][T14367] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 273.565917][T14367] ? __rb_erase_color+0x20b/0xa60 [ 273.570772][T14367] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 273.577026][T14367] ? rwsem_mark_wake+0x770/0x770 [ 273.581797][T14367] vma_interval_tree_remove+0xb82/0xba0 [ 273.587179][T14367] unlink_file_vma+0xd9/0xf0 [ 273.591603][T14367] free_pgtables+0x13f/0x280 [ 273.596031][T14367] exit_mmap+0x405/0x940 [ 273.600109][T14367] ? exit_aio+0x25e/0x3c0 [ 273.604363][T14367] ? vm_brk+0x30/0x30 [ 273.608180][T14367] ? mutex_unlock+0xb2/0x260 [ 273.612612][T14367] ? uprobe_clear_state+0x2cd/0x320 [ 273.617644][T14367] __mmput+0x95/0x310 [ 273.621459][T14367] mmput+0x5b/0x170 [ 273.625104][T14367] do_exit+0xb9c/0x2ca0 [ 273.629102][T14367] ? put_task_struct+0x80/0x80 [ 273.633696][T14367] ? bpf_trace_run2+0xf1/0x210 [ 273.638296][T14367] ? exc_page_fault+0x47a/0x7f0 [ 273.642983][T14367] ? bpf_trace_run1+0x1c0/0x1c0 [ 273.647670][T14367] ? __ia32_sys_read+0x90/0x90 [ 273.652271][T14367] do_group_exit+0x141/0x310 [ 273.656712][T14367] __x64_sys_exit_group+0x3f/0x40 [ 273.661561][T14367] x64_sys_call+0x610/0x9a0 [ 273.665895][T14367] do_syscall_64+0x3b/0xb0 [ 273.670152][T14367] ? clear_bhb_loop+0x35/0x90 [ 273.674691][T14367] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 273.680393][T14367] RIP: 0033:0x7f1c56217719 [ 273.684732][T14367] Code: Unable to access opcode bytes at RIP 0x7f1c562176ef. [ 273.691936][T14367] RSP: 002b:00007fffb09bd678 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 273.700182][T14367] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1c56217719 [ 273.707990][T14367] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043 [ 273.715800][T14367] RBP: 00007f1c562775b0 R08: 00007fffb09bb417 R09: 0000000000000003 [ 273.723613][T14367] R10: 0000000000000009 R11: 0000000000000246 R12: 0000000000000001 [ 273.731426][T14367] R13: 0000000000000003 R14: 00000000ffffffff R15: 00007fffb09bd820 [ 273.739328][T14367] [ 273.742185][T14367] Modules linked in: [ 273.839466][T14367] ---[ end trace 5e66f46b6e480b30 ]--- [ 273.845049][T14367] RIP: 0010:__rb_erase_color+0x20b/0xa60 [ 273.850755][T14367] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 19 ce 2a ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 f6 cd 2a ff 41 f6 07 01 48 89 5d [ 273.882470][T14367] RSP: 0018:ffffc90000c079e0 EFLAGS: 00010246 [ 273.888415][T14367] RAX: dffffc0000000000 RBX: ffff88814bc28068 RCX: ffff888117aa62c0 [ 273.897415][T14367] RDX: ffffffff81a56990 RSI: ffff88810c8860c8 RDI: ffff88814bc28058 [ 273.909853][T14367] RBP: ffffc90000c07a40 R08: ffffffff81a54a50 R09: ffffed1021910c1d [ 273.922334][T14367] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 273.934599][T14367] R13: ffff88814bc28058 R14: 1ffff1102978500d R15: 0000000000000000 [ 273.946799][T14367] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 273.964246][T14367] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 273.975068][T14367] CR2: ffffffffd66f0000 CR3: 000000011c562000 CR4: 00000000003506a0 [ 273.987417][T14367] DR0: 0000000020000300 DR1: 0000000020000300 DR2: 0000000000000000 [ 274.004704][T14367] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 274.016997][T14367] Kernel panic - not syncing: Fatal exception [ 274.023149][T14367] Kernel Offset: disabled [ 274.027278][T14367] Rebooting in 86400 seconds..