last executing test programs: 15m25.650080906s ago: executing program 1 (id=1947): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="180600000000000000000000000000401801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) syz_clone(0x40900200, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000800), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x644}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 15m24.369890892s ago: executing program 1 (id=1968): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r3}, &(0x7f0000000240), &(0x7f0000000400)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00'}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x117b878e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4000004, 0x5}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 15m24.249443694s ago: executing program 1 (id=1969): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r0}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) 15m24.112916277s ago: executing program 1 (id=1971): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 15m23.800898908s ago: executing program 1 (id=1975): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(r0) 15m23.716851487s ago: executing program 1 (id=1978): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80000000}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8a, &(0x7f00000000c0)=""/138, 0x40f00, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000001c0)=[{0x4, 0x5, 0xe, 0x1}, {0x5, 0x1, 0xb}, {0x5, 0x5, 0xd, 0x4}, {0x2, 0x1, 0xe, 0x6}], 0x10, 0x7}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='i2c_read\x00', r0, 0x0, 0x9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@struct={0x1, 0xa, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0xffffffff}, {0x7, 0x3, 0x535f}, {0xb, 0x2, 0xf}, {0x0, 0x4, 0x6}, {0xa, 0x4, 0x4}, {0x6, 0x4, 0x2}, {0x5, 0x1, 0x5}, {0xf, 0x2, 0x40000000}, {0xc, 0x1, 0x10001}, {0x1, 0x2, 0xff}]}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000480)=""/178, 0xa0, 0xb2, 0x0, 0xfffffc01}, 0x28) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x8, '\x00', r2, r3, 0x1, 0x3}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x19e5}, [@map_val={0x18, 0x5, 0x2, 0x0, r4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000640)='GPL\x00', 0x200, 0xb0, &(0x7f0000000680)=""/176, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r4, r4, r4, r4, r4], &(0x7f00000007c0)=[{0x3, 0x2, 0x10, 0xd}, {0x2, 0x2, 0x3, 0xa}, {0x1, 0x4, 0xc, 0x5}, {0x0, 0x4, 0x7, 0x4}, {0x5, 0x5, 0x2, 0x8}, {0x0, 0x2, 0x7, 0x2}], 0x10, 0x4}, 0x94) r6 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000940)={[{0x0, 'cpuset'}]}, 0x8) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000bc0)={0x0, r5}, 0x8) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x130, 0x130, 0x8, [@volatile={0x3, 0x0, 0x0, 0x9, 0x4}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3, 0x2}]}, @volatile={0x6}, @enum64={0x4, 0x5, 0x0, 0x13, 0x0, 0x2, [{0x7, 0x3}, {0xf, 0x8, 0x9}, {0xe, 0x6, 0xfe06}, {0x5, 0x7ff, 0x1}, {0x4, 0x0, 0x4e}]}, @func={0xd, 0x0, 0x0, 0xc, 0x3}, @struct={0x6, 0x7, 0x0, 0x4, 0x1, 0x9, [{0x4, 0x0, 0x4b4}, {0x8, 0x5, 0x56d675c1}, {0xb, 0x3, 0x100}, {0xb, 0x4, 0x8000}, {0x1, 0x0, 0x1}, {0x2, 0x4, 0x2}, {0x8, 0x0, 0x7}]}, @struct={0xd, 0x3, 0x0, 0x4, 0x1, 0x5, [{0xe, 0x3, 0x3}, {0xf, 0x3, 0x4}, {0x9, 0x4, 0x5}]}, @decl_tag={0x1, 0x0, 0x0, 0x11, 0x2, 0x2}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x45, 0x0, 0x36, 0x3}]}, {0x0, [0x0, 0x5f, 0x5f, 0x30, 0x0, 0x30]}}, &(0x7f0000000b00)=""/111, 0x150, 0x6f, 0x1, 0x5, 0x10000, @value=r7}, 0x28) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r9, &(0x7f0000000c40)='memory.high\x00', 0x2, 0x0) close(r0) r10 = openat$cgroup(r9, &(0x7f0000000c80)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r10, &(0x7f0000000cc0)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0xd7d, 0x0}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000dc0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000d40), &(0x7f0000000d80)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r12, 0xffffffffffffffff}, &(0x7f0000000e00), &(0x7f0000000e40)=r5}, 0x20) r14 = perf_event_open$cgroup(&(0x7f0000000f80)={0x4, 0x80, 0x6, 0x5, 0xf9, 0x2, 0x0, 0x2, 0x292, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000f40), 0x4}, 0x800, 0xeb47, 0x1, 0x6, 0x8, 0x7f, 0x3, 0x0, 0x8, 0x0, 0x5402}, 0xffffffffffffffff, 0x3, r1, 0x0) r15 = perf_event_open$cgroup(&(0x7f0000000ec0)={0x2, 0x80, 0x8, 0xf, 0x53, 0x9, 0x0, 0x7, 0x400, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xaa2}, 0x2, 0x3eb6f95b, 0xd, 0x8, 0xc054, 0x9, 0x5, 0x0, 0x0, 0x0, 0x1}, r9, 0x4, r14, 0x8) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_ext={0x1c, 0x4, &(0x7f0000001000)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x401}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x1}], &(0x7f0000001040)='syzkaller\x00', 0x0, 0x7a, &(0x7f0000001080)=""/122, 0x41100, 0x3e, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000001100)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001140)={0x0, 0xb, 0x8000, 0x6}, 0x10, 0x9120, r5, 0x1, &(0x7f0000001180)=[r4, r13, r13, r12, r4, r13], &(0x7f00000011c0)=[{0x2, 0x3, 0x0, 0x2}], 0x10, 0x38a}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001440)={r16, 0x0, 0x9e, 0x7, &(0x7f00000012c0)="384f2ba9294ffa3e9225c4546b7104f8f3efa7b8bf515ea370c72e2a3e7f63fa0b3664a262933d7a9275e224388a6eb25fafcb42c412d5589f15bafff7b29ee057d22bb7dc229ba5484e1d141f61c0949497f0c3aa26a5a5bd8c189f916797981ddf97c054596bcea0d0828a480e494842c655ed56e1aca0bf0daef93c61a7938d838335a96da3dbd17e43eae18cc42ecbf18390d61a972ba849c6ce6d3d", &(0x7f0000001380)=""/7, 0x512e, 0x0, 0xc, 0xc, &(0x7f00000013c0)="e8afe74c45342b361d8fb5c6", &(0x7f0000001400)="1777b3862f7590c0690f0305", 0x1, 0x0, 0xc}, 0x50) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000014c0)=r12, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x2400, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001600)={@ifindex=0x0, 0x13, 0x1, 0x4, &(0x7f0000001500)=[0x0], 0x1, 0x0, &(0x7f0000001540)=[0x0], &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000015c0)=[0x0, 0x0, 0x0]}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001680)={&(0x7f0000001640)='dlm_unlock_end\x00', r0, 0x0, 0x3}, 0x18) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000016c0)=@base={0x15, 0x8, 0x6620, 0x4, 0x10000, 0x1, 0x8, '\x00', r17, 0xffffffffffffffff, 0x4, 0x1, 0x3, 0x0, @void, @value, @value=r7}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=@bloom_filter={0x1e, 0xb9b7, 0x10000, 0x5, 0x42203, r18, 0x10, '\x00', r2, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0xc}, 0x50) openat$cgroup_netprio_ifpriomap(r9, &(0x7f00000017c0), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001800)=r11, 0x4) 15m8.679973255s ago: executing program 32 (id=1978): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80000000}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x8a, &(0x7f00000000c0)=""/138, 0x40f00, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000001c0)=[{0x4, 0x5, 0xe, 0x1}, {0x5, 0x1, 0xb}, {0x5, 0x5, 0xd, 0x4}, {0x2, 0x1, 0xe, 0x6}], 0x10, 0x7}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='i2c_read\x00', r0, 0x0, 0x9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@struct={0x1, 0xa, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0xffffffff}, {0x7, 0x3, 0x535f}, {0xb, 0x2, 0xf}, {0x0, 0x4, 0x6}, {0xa, 0x4, 0x4}, {0x6, 0x4, 0x2}, {0x5, 0x1, 0x5}, {0xf, 0x2, 0x40000000}, {0xc, 0x1, 0x10001}, {0x1, 0x2, 0xff}]}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000480)=""/178, 0xa0, 0xb2, 0x0, 0xfffffc01}, 0x28) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x8, '\x00', r2, r3, 0x1, 0x3}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x19e5}, [@map_val={0x18, 0x5, 0x2, 0x0, r4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000640)='GPL\x00', 0x200, 0xb0, &(0x7f0000000680)=""/176, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r4, r4, r4, r4, r4], &(0x7f00000007c0)=[{0x3, 0x2, 0x10, 0xd}, {0x2, 0x2, 0x3, 0xa}, {0x1, 0x4, 0xc, 0x5}, {0x0, 0x4, 0x7, 0x4}, {0x5, 0x5, 0x2, 0x8}, {0x0, 0x2, 0x7, 0x2}], 0x10, 0x4}, 0x94) r6 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000940)={[{0x0, 'cpuset'}]}, 0x8) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000bc0)={0x0, r5}, 0x8) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x130, 0x130, 0x8, [@volatile={0x3, 0x0, 0x0, 0x9, 0x4}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3, 0x2}]}, @volatile={0x6}, @enum64={0x4, 0x5, 0x0, 0x13, 0x0, 0x2, [{0x7, 0x3}, {0xf, 0x8, 0x9}, {0xe, 0x6, 0xfe06}, {0x5, 0x7ff, 0x1}, {0x4, 0x0, 0x4e}]}, @func={0xd, 0x0, 0x0, 0xc, 0x3}, @struct={0x6, 0x7, 0x0, 0x4, 0x1, 0x9, [{0x4, 0x0, 0x4b4}, {0x8, 0x5, 0x56d675c1}, {0xb, 0x3, 0x100}, {0xb, 0x4, 0x8000}, {0x1, 0x0, 0x1}, {0x2, 0x4, 0x2}, {0x8, 0x0, 0x7}]}, @struct={0xd, 0x3, 0x0, 0x4, 0x1, 0x5, [{0xe, 0x3, 0x3}, {0xf, 0x3, 0x4}, {0x9, 0x4, 0x5}]}, @decl_tag={0x1, 0x0, 0x0, 0x11, 0x2, 0x2}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x45, 0x0, 0x36, 0x3}]}, {0x0, [0x0, 0x5f, 0x5f, 0x30, 0x0, 0x30]}}, &(0x7f0000000b00)=""/111, 0x150, 0x6f, 0x1, 0x5, 0x10000, @value=r7}, 0x28) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r9, &(0x7f0000000c40)='memory.high\x00', 0x2, 0x0) close(r0) r10 = openat$cgroup(r9, &(0x7f0000000c80)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r10, &(0x7f0000000cc0)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0xd7d, 0x0}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000dc0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000d40), &(0x7f0000000d80)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r12, 0xffffffffffffffff}, &(0x7f0000000e00), &(0x7f0000000e40)=r5}, 0x20) r14 = perf_event_open$cgroup(&(0x7f0000000f80)={0x4, 0x80, 0x6, 0x5, 0xf9, 0x2, 0x0, 0x2, 0x292, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000f40), 0x4}, 0x800, 0xeb47, 0x1, 0x6, 0x8, 0x7f, 0x3, 0x0, 0x8, 0x0, 0x5402}, 0xffffffffffffffff, 0x3, r1, 0x0) r15 = perf_event_open$cgroup(&(0x7f0000000ec0)={0x2, 0x80, 0x8, 0xf, 0x53, 0x9, 0x0, 0x7, 0x400, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xaa2}, 0x2, 0x3eb6f95b, 0xd, 0x8, 0xc054, 0x9, 0x5, 0x0, 0x0, 0x0, 0x1}, r9, 0x4, r14, 0x8) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_ext={0x1c, 0x4, &(0x7f0000001000)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x401}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x1}], &(0x7f0000001040)='syzkaller\x00', 0x0, 0x7a, &(0x7f0000001080)=""/122, 0x41100, 0x3e, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000001100)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001140)={0x0, 0xb, 0x8000, 0x6}, 0x10, 0x9120, r5, 0x1, &(0x7f0000001180)=[r4, r13, r13, r12, r4, r13], &(0x7f00000011c0)=[{0x2, 0x3, 0x0, 0x2}], 0x10, 0x38a}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001440)={r16, 0x0, 0x9e, 0x7, &(0x7f00000012c0)="384f2ba9294ffa3e9225c4546b7104f8f3efa7b8bf515ea370c72e2a3e7f63fa0b3664a262933d7a9275e224388a6eb25fafcb42c412d5589f15bafff7b29ee057d22bb7dc229ba5484e1d141f61c0949497f0c3aa26a5a5bd8c189f916797981ddf97c054596bcea0d0828a480e494842c655ed56e1aca0bf0daef93c61a7938d838335a96da3dbd17e43eae18cc42ecbf18390d61a972ba849c6ce6d3d", &(0x7f0000001380)=""/7, 0x512e, 0x0, 0xc, 0xc, &(0x7f00000013c0)="e8afe74c45342b361d8fb5c6", &(0x7f0000001400)="1777b3862f7590c0690f0305", 0x1, 0x0, 0xc}, 0x50) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000014c0)=r12, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x2400, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001600)={@ifindex=0x0, 0x13, 0x1, 0x4, &(0x7f0000001500)=[0x0], 0x1, 0x0, &(0x7f0000001540)=[0x0], &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000015c0)=[0x0, 0x0, 0x0]}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001680)={&(0x7f0000001640)='dlm_unlock_end\x00', r0, 0x0, 0x3}, 0x18) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000016c0)=@base={0x15, 0x8, 0x6620, 0x4, 0x10000, 0x1, 0x8, '\x00', r17, 0xffffffffffffffff, 0x4, 0x1, 0x3, 0x0, @void, @value, @value=r7}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=@bloom_filter={0x1e, 0xb9b7, 0x10000, 0x5, 0x42203, r18, 0x10, '\x00', r2, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0xc}, 0x50) openat$cgroup_netprio_ifpriomap(r9, &(0x7f00000017c0), 0x2, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001800)=r11, 0x4) 26.629235239s ago: executing program 2 (id=8819): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000000000", @ANYBLOB='\x00'/12, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd6c}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="180800000000000000000000000000008510000003000000180000000000000000000000000000009500000000000000bfa000000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xea, &(0x7f0000001700)=""/234, 0x40f00, 0x10}, 0x22) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="75c142029f447ce3a3e67e7746630ab41ae4acf67ff49729edad79b0711fb4cc8c3b4955769de269a9d7f65eaf7513e2c2cca5ab0fad9948aa797c3a3d79d3082b226a8538a3ad73c3c483a223669717b1928e3951e6c920e90a7f73a382f72255c3a5ae78af54292aa664baec9fa4acfc15c9c0fa980830b751fb7b967039172b49c16434f853efab098651c0f68611f6922e3d48f27b07935e40a73152560d4c9620057828c9b9e09a7ec60dc6f69bff6f09dee957fcdd42c53c673d3e92f2c2610c48f7e608d133284acee9b0a213a3f8f3", 0xd3}, {&(0x7f00000004c0)="eee415fc2161cadfa8081a92bbbab8710269f28fa5366925c591df5542d8b9a1865a75f659f79e5d6e4fdcff82479c6c74b5fe626e8c14bd5aeb05ad36d3def68ce91042c9bd9051fce887db2e7f3708400375412d3b8e5e4720d1e688ba39ba17201e38c371f68f20367cc38bdd77db8595b66caceabeecdab3f80c1d1c8dcde138835bcca54deab73933c8b5d0d09601945a776f1253bf362bda34f06b8b230962cb85c9e74f14762e6e7651bb3d4a02ded0aa91db96046a08adfca788d2dc1f191efea52e6dd29165ea57ae7a01d8d49077b2799f2d85d30aa6c66a9b03b9b56375ffa0ec", 0xe6}, {&(0x7f00000005c0)="8a6301c0d823fb69fd09ab8850e906e5389587a8f63800ebef0c48a1f22e079ea07f7948718e3a439fc3f765e3f21b1adf60dca099d78be5aebd4e0c42b763cc987479f3016db930b2bd421ba410e7fe8dfe8e35248823eea7f617952b12dd00e5015051bfd23728d97920", 0x6b}, {&(0x7f0000000680)="e3290e5f5ce1935dc318a0ee02d27c7b82390096ea7482dee68780c030b2e6a7af8a52ae0db9bb79c8971f37cfc23f1507c050753a0fbc610ab0841f02d21309579fd21edfbe34c468bfef41d427e031088cc367248a66086e8db339c2e4795d62f639fb14", 0x65}], 0x4, &(0x7f0000000700)=[@mark={{0x14}}], 0x18}, 0x8800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='inet_sk_error_report\x00', r2, 0x0, 0x794}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000003, 0x8404, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x810c, 0x0, 0xc4b, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x97, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 20.678493607s ago: executing program 2 (id=8819): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000000000", @ANYBLOB='\x00'/12, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd6c}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="180800000000000000000000000000008510000003000000180000000000000000000000000000009500000000000000bfa000000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xea, &(0x7f0000001700)=""/234, 0x40f00, 0x10}, 0x22) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="75c142029f447ce3a3e67e7746630ab41ae4acf67ff49729edad79b0711fb4cc8c3b4955769de269a9d7f65eaf7513e2c2cca5ab0fad9948aa797c3a3d79d3082b226a8538a3ad73c3c483a223669717b1928e3951e6c920e90a7f73a382f72255c3a5ae78af54292aa664baec9fa4acfc15c9c0fa980830b751fb7b967039172b49c16434f853efab098651c0f68611f6922e3d48f27b07935e40a73152560d4c9620057828c9b9e09a7ec60dc6f69bff6f09dee957fcdd42c53c673d3e92f2c2610c48f7e608d133284acee9b0a213a3f8f3", 0xd3}, {&(0x7f00000004c0)="eee415fc2161cadfa8081a92bbbab8710269f28fa5366925c591df5542d8b9a1865a75f659f79e5d6e4fdcff82479c6c74b5fe626e8c14bd5aeb05ad36d3def68ce91042c9bd9051fce887db2e7f3708400375412d3b8e5e4720d1e688ba39ba17201e38c371f68f20367cc38bdd77db8595b66caceabeecdab3f80c1d1c8dcde138835bcca54deab73933c8b5d0d09601945a776f1253bf362bda34f06b8b230962cb85c9e74f14762e6e7651bb3d4a02ded0aa91db96046a08adfca788d2dc1f191efea52e6dd29165ea57ae7a01d8d49077b2799f2d85d30aa6c66a9b03b9b56375ffa0ec", 0xe6}, {&(0x7f00000005c0)="8a6301c0d823fb69fd09ab8850e906e5389587a8f63800ebef0c48a1f22e079ea07f7948718e3a439fc3f765e3f21b1adf60dca099d78be5aebd4e0c42b763cc987479f3016db930b2bd421ba410e7fe8dfe8e35248823eea7f617952b12dd00e5015051bfd23728d97920", 0x6b}, {&(0x7f0000000680)="e3290e5f5ce1935dc318a0ee02d27c7b82390096ea7482dee68780c030b2e6a7af8a52ae0db9bb79c8971f37cfc23f1507c050753a0fbc610ab0841f02d21309579fd21edfbe34c468bfef41d427e031088cc367248a66086e8db339c2e4795d62f639fb14", 0x65}], 0x4, &(0x7f0000000700)=[@mark={{0x14}}], 0x18}, 0x8800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='inet_sk_error_report\x00', r2, 0x0, 0x794}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000003, 0x8404, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x810c, 0x0, 0xc4b, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x97, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 15.138087745s ago: executing program 2 (id=8819): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000000000", @ANYBLOB='\x00'/12, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd6c}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="180800000000000000000000000000008510000003000000180000000000000000000000000000009500000000000000bfa000000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xea, &(0x7f0000001700)=""/234, 0x40f00, 0x10}, 0x22) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="75c142029f447ce3a3e67e7746630ab41ae4acf67ff49729edad79b0711fb4cc8c3b4955769de269a9d7f65eaf7513e2c2cca5ab0fad9948aa797c3a3d79d3082b226a8538a3ad73c3c483a223669717b1928e3951e6c920e90a7f73a382f72255c3a5ae78af54292aa664baec9fa4acfc15c9c0fa980830b751fb7b967039172b49c16434f853efab098651c0f68611f6922e3d48f27b07935e40a73152560d4c9620057828c9b9e09a7ec60dc6f69bff6f09dee957fcdd42c53c673d3e92f2c2610c48f7e608d133284acee9b0a213a3f8f3", 0xd3}, {&(0x7f00000004c0)="eee415fc2161cadfa8081a92bbbab8710269f28fa5366925c591df5542d8b9a1865a75f659f79e5d6e4fdcff82479c6c74b5fe626e8c14bd5aeb05ad36d3def68ce91042c9bd9051fce887db2e7f3708400375412d3b8e5e4720d1e688ba39ba17201e38c371f68f20367cc38bdd77db8595b66caceabeecdab3f80c1d1c8dcde138835bcca54deab73933c8b5d0d09601945a776f1253bf362bda34f06b8b230962cb85c9e74f14762e6e7651bb3d4a02ded0aa91db96046a08adfca788d2dc1f191efea52e6dd29165ea57ae7a01d8d49077b2799f2d85d30aa6c66a9b03b9b56375ffa0ec", 0xe6}, {&(0x7f00000005c0)="8a6301c0d823fb69fd09ab8850e906e5389587a8f63800ebef0c48a1f22e079ea07f7948718e3a439fc3f765e3f21b1adf60dca099d78be5aebd4e0c42b763cc987479f3016db930b2bd421ba410e7fe8dfe8e35248823eea7f617952b12dd00e5015051bfd23728d97920", 0x6b}, {&(0x7f0000000680)="e3290e5f5ce1935dc318a0ee02d27c7b82390096ea7482dee68780c030b2e6a7af8a52ae0db9bb79c8971f37cfc23f1507c050753a0fbc610ab0841f02d21309579fd21edfbe34c468bfef41d427e031088cc367248a66086e8db339c2e4795d62f639fb14", 0x65}], 0x4, &(0x7f0000000700)=[@mark={{0x14}}], 0x18}, 0x8800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='inet_sk_error_report\x00', r2, 0x0, 0x794}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000003, 0x8404, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x810c, 0x0, 0xc4b, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x97, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 9.937644239s ago: executing program 2 (id=8819): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000000000", @ANYBLOB='\x00'/12, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd6c}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="180800000000000000000000000000008510000003000000180000000000000000000000000000009500000000000000bfa000000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xea, &(0x7f0000001700)=""/234, 0x40f00, 0x10}, 0x22) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="75c142029f447ce3a3e67e7746630ab41ae4acf67ff49729edad79b0711fb4cc8c3b4955769de269a9d7f65eaf7513e2c2cca5ab0fad9948aa797c3a3d79d3082b226a8538a3ad73c3c483a223669717b1928e3951e6c920e90a7f73a382f72255c3a5ae78af54292aa664baec9fa4acfc15c9c0fa980830b751fb7b967039172b49c16434f853efab098651c0f68611f6922e3d48f27b07935e40a73152560d4c9620057828c9b9e09a7ec60dc6f69bff6f09dee957fcdd42c53c673d3e92f2c2610c48f7e608d133284acee9b0a213a3f8f3", 0xd3}, {&(0x7f00000004c0)="eee415fc2161cadfa8081a92bbbab8710269f28fa5366925c591df5542d8b9a1865a75f659f79e5d6e4fdcff82479c6c74b5fe626e8c14bd5aeb05ad36d3def68ce91042c9bd9051fce887db2e7f3708400375412d3b8e5e4720d1e688ba39ba17201e38c371f68f20367cc38bdd77db8595b66caceabeecdab3f80c1d1c8dcde138835bcca54deab73933c8b5d0d09601945a776f1253bf362bda34f06b8b230962cb85c9e74f14762e6e7651bb3d4a02ded0aa91db96046a08adfca788d2dc1f191efea52e6dd29165ea57ae7a01d8d49077b2799f2d85d30aa6c66a9b03b9b56375ffa0ec", 0xe6}, {&(0x7f00000005c0)="8a6301c0d823fb69fd09ab8850e906e5389587a8f63800ebef0c48a1f22e079ea07f7948718e3a439fc3f765e3f21b1adf60dca099d78be5aebd4e0c42b763cc987479f3016db930b2bd421ba410e7fe8dfe8e35248823eea7f617952b12dd00e5015051bfd23728d97920", 0x6b}, {&(0x7f0000000680)="e3290e5f5ce1935dc318a0ee02d27c7b82390096ea7482dee68780c030b2e6a7af8a52ae0db9bb79c8971f37cfc23f1507c050753a0fbc610ab0841f02d21309579fd21edfbe34c468bfef41d427e031088cc367248a66086e8db339c2e4795d62f639fb14", 0x65}], 0x4, &(0x7f0000000700)=[@mark={{0x14}}], 0x18}, 0x8800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='inet_sk_error_report\x00', r2, 0x0, 0x794}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000003, 0x8404, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x810c, 0x0, 0xc4b, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x97, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 5.323088975s ago: executing program 3 (id=9323): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$inet(r1, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$inet(r1, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r1) (async) close(r1) sendmsg$inet(r2, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0xfffffffb, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0xfffffffb, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x4, 0x0, 0x0, 0x8000}, 0x50) syz_clone(0x44044000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000180)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = openat$cgroup_int(r5, &(0x7f0000000400)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r8, &(0x7f00000004c0)=0xf, 0x12) (async) write$cgroup_int(r8, &(0x7f00000004c0)=0xf, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) openat$cgroup_int(r5, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) (async) openat$cgroup_int(r5, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x10005, r9}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x10005, r9}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2bf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffffe) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2bf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffffe) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r10}, 0x10) syz_clone(0x60920000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.081608659s ago: executing program 2 (id=8819): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000000000", @ANYBLOB='\x00'/12, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd6c}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="180800000000000000000000000000008510000003000000180000000000000000000000000000009500000000000000bfa000000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xea, &(0x7f0000001700)=""/234, 0x40f00, 0x10}, 0x22) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="75c142029f447ce3a3e67e7746630ab41ae4acf67ff49729edad79b0711fb4cc8c3b4955769de269a9d7f65eaf7513e2c2cca5ab0fad9948aa797c3a3d79d3082b226a8538a3ad73c3c483a223669717b1928e3951e6c920e90a7f73a382f72255c3a5ae78af54292aa664baec9fa4acfc15c9c0fa980830b751fb7b967039172b49c16434f853efab098651c0f68611f6922e3d48f27b07935e40a73152560d4c9620057828c9b9e09a7ec60dc6f69bff6f09dee957fcdd42c53c673d3e92f2c2610c48f7e608d133284acee9b0a213a3f8f3", 0xd3}, {&(0x7f00000004c0)="eee415fc2161cadfa8081a92bbbab8710269f28fa5366925c591df5542d8b9a1865a75f659f79e5d6e4fdcff82479c6c74b5fe626e8c14bd5aeb05ad36d3def68ce91042c9bd9051fce887db2e7f3708400375412d3b8e5e4720d1e688ba39ba17201e38c371f68f20367cc38bdd77db8595b66caceabeecdab3f80c1d1c8dcde138835bcca54deab73933c8b5d0d09601945a776f1253bf362bda34f06b8b230962cb85c9e74f14762e6e7651bb3d4a02ded0aa91db96046a08adfca788d2dc1f191efea52e6dd29165ea57ae7a01d8d49077b2799f2d85d30aa6c66a9b03b9b56375ffa0ec", 0xe6}, {&(0x7f00000005c0)="8a6301c0d823fb69fd09ab8850e906e5389587a8f63800ebef0c48a1f22e079ea07f7948718e3a439fc3f765e3f21b1adf60dca099d78be5aebd4e0c42b763cc987479f3016db930b2bd421ba410e7fe8dfe8e35248823eea7f617952b12dd00e5015051bfd23728d97920", 0x6b}, {&(0x7f0000000680)="e3290e5f5ce1935dc318a0ee02d27c7b82390096ea7482dee68780c030b2e6a7af8a52ae0db9bb79c8971f37cfc23f1507c050753a0fbc610ab0841f02d21309579fd21edfbe34c468bfef41d427e031088cc367248a66086e8db339c2e4795d62f639fb14", 0x65}], 0x4, &(0x7f0000000700)=[@mark={{0x14}}], 0x18}, 0x8800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='inet_sk_error_report\x00', r2, 0x0, 0x794}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000003, 0x8404, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x810c, 0x0, 0xc4b, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x97, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 2.947043619s ago: executing program 3 (id=9328): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0500000000f01f00810000007f00000001"], 0x48) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x20800, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000300)=0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000001c0)={'ip_vti0\x00', 0x1000}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e85"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10, 0x0}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={&(0x7f0000000340)="bc58879cb7d5c9b7ea391c233aac563d07be30b4471a464a050f9351921ce9688f723175d577c9f481e2f075055a6b83bb41829cb6e87c7f3daee62d405ba09076b93868f3c1a8ecd8d6785a38333537", &(0x7f0000001340)=""/4096, &(0x7f0000000480)="461b094bc1486b519a3a06ce9a54e62abeb9159d87dca474e5ad4c883c5ea484f26e38f308fd6e3c6afb16dc3882837d86e84f2c01ff3a2dcc07b525db89b9896137b5daa0450846476fd354e7e8e9339a4afc6f3cd4e09eaa9eb441224f2b5f6c5af768699cfc98e4194d31eab0d53d79c693b66e9a1f4fd7175e40c1c4586844fbde722f30e66b7d0f3b77c72fb219fef25c0e3b5140687645247eeeba4318591dc49026b05e", &(0x7f0000000540)="896abf4f02406401acddabe0c93f7cdab7dc9142162f4793adcd7b2cc09e10b2d1aef76f0cc7f01dbe34074b4eb972e2957229f611bde168e9e16c0ebf9b51311e43f31267658def8c7ea352d9b210594bd13b13a6c96c7c82c867c26de2c6b3d1c62603f9a016d702a8233bd0e63e1f0dfa0c0f65d66bf4770766052bceb4258913dd0e8e970b64ccec968b9daa98a949d790adb5024f326bc41c9c57cff04e7552902bbcf2ebf293e46ac7c2605c111e5ed8a044ed", 0xff, r6, 0x4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000008140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000e6ff0021000c005f000c0000b8d265e026ca175700000000060400000000712e2e00"], 0x0, 0x29}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES16=r3, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ff03000000000000000000000000000000f0ff000000000000000000f97d234dd97255"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r12, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r0, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000000)="9de0f08577f1c125212e7fa30067aa5cad0a96a3cb2121f3c664880412619d212630eadc02922387a2dcf59de4a71f0e371e33d7a80957bf33cdffdb7607ab9ef26988e429d8b74e1e7a81f20154c3222dbd1b2f1332f50b20d7ccf161e6c684de32845f5d49eda25cfbdb6d97a2db3c67a4365f9a5add682c06df7054f76731ef536e653c18318c9bc19d8c72fddbb1acc3335e01f1b8cde5e7074e9df87beac7d1e224e85a74252883", &(0x7f00000000c0)=""/9, &(0x7f0000000100)="b36fe06c9fb3a1152de2e9233b53b7ebd062c96801b81a294c9d802b8f52a9247c3cca9cb01db05e1ece91641b7b559c8ace8df78daa378fc3470fe93fc83c5ca1d19f932774434b983d80590f1927edc94c4a50f7d12b71397f34d3eb7713bdd28a9d15faca3bdabd0854e70c711fb42cbca2007ebd9d66813def33f80bc441783e5af2477e2003b155e1a0a6f66e77d381e103af7613bc717091cc94e19f4593d0e180d11667f899f7d9ea5b7cdbaebe16a445aa8e81cc997e1b33af459384a8d94f823e1564e3715644090d1d25", &(0x7f0000000200)="1bd30a4f701a40181c1f43f282cb502a45c8eac8e3519e2e171e5bcbf5cddb17333870ec368da9c32d5333eacf636852fd1e5669d827f3ede77c701cc0b9b53da48ce5ace11c25b0ea98d0ef5f574b5c0fce47d945fce542e285297b13d626d46ebbcc246dec465bae52117cb08abed218e574", 0x2, r1}, 0x38) 2.174712135s ago: executing program 0 (id=9330): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x8004745a, &(0x7f0000000180)) 2.173873766s ago: executing program 4 (id=9331): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x80000001, 0x0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) close(r4) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8983, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r13, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r13, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r12, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x2000000) 2.160337037s ago: executing program 3 (id=9332): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000002b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="b702000000000090bfa300000000000007030000f0ffffff7a0af0ff0200000079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7050000010000006a0af2fe000000008500000009000000b700000000000000950000000000000000e154cd8445974b26c933f7ffffffffe4fbffffff55bb2007ee51050512b5b42128aa090a79507df79f298129daa7a6b2f91af50342115e17392ac627c87881c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752548300000000dbc2777df150b7cdd77b85b941092314fd085f028f2ed1a4535550614e09d6378198a6097a670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1ef0900094fa737c28b99938512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d7f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804da4f85db47a4a69bf9bc5fa96ee293fbd165a5a68488e40b030166565a097b1b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a5a787e814c4fd21a18986252a70f8f92eb6f0e8c7db4bf23242a1f2c28159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa99dac06b57479321a0574fb30ff0000001989425f5d0b79f6584d0416d7c4bb9f547b328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b0d2277a84af326f37f3e2c25a61ec45c3af97a8f17da954aff3fc8c108755f01000000010000006e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c6d294d3665016ac59dda0fde4745db06753a7ac74a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2066bb5d4045c958559b7dcb98a6273b8c651e24d9f679e4fbe948dfb4cc4a389469608241730459f0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6eea7f9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b8375d936a7d2120eca291963eb2d537d8ee4de5c183c960119451c31539b22809e1d7f0cda06a9fa87d64cb77872a2cd8a104e16bb1a2bacf13464ca03aff14a9aa4bd9539f5096412b92012e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b98d2de10c21d3ea02208d304d455c36300000000022320178b00cc6ed7966130b547dbf8b497af002000000cd1d000000200008000000000000001abc11c800000000000000000000000928ee53595a779d243a48cea769470424d20a04c04b2c4324ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2c4af38ffb7d748308eea09fc361b4735efbf3411718d6ee7aebf9ef679dbfae9fb4a79f8a836804ed3a1079b0282a12043408cd60b687dcff91af19010000000000000000456f7d2a42bd13da202274f20675eb781925441578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec7ffff35e62f4eeee50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab5009c68c73de2f04f15d005387577f480000ea65559eb00e76e9d0ada201bcbb5c252b28a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cd102e3c8e63e9fba05e3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2b485185cc92fe7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2bbf96c89739f5cf1e750d50517a59a3ad09e8802e8f4f535447cc0fc9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f95d4a31838eeb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d7fcd116bce9c764c714c9402c21d181aac59efb28d4f91652f6750b6ec962802c0320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf000000c42a570f0e9dd5fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284db80e4636c25b96174327d82761c26e329555f9290af4100000000000000749efd3763655500344bae34137f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419adc16e2055b85058f793484305d7a1759782e4c571ee855a47bc00edf5e9020c09ab004321610b857e8717764b633b21cb32f0eb3280e09758bd445ab91d20baca005472b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92fe8bad99ca332af00f191b66b6a6f732a91f0e2e9190e4b448da7de018c58e950767f9b320be61e58c79d497247d278888901d442ad7f8536605a644e9e3d769db497c3960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f31019876026888c8ccb85c86b4f8ffffff7f000000002c331fca0e541b7ca211c28ed61c52573d9308a13d115b43f8b1894c8fa8a14dc4810f61ae96bf704526a8919bc700002100000000000000000001000027c9a46157a3609b6fd9843ee19ec647249a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77819ee214e49666c464d35ca9b5143ed3b3dc8c17a23692759ccf5a205311b7ab22532697b861dfb54609fd88e6043bd52ae84c1bb0c8a6c769f952283a1f4e3842edb3d42c68a27ef6a1296dfff4a979369b0e8ebc62887aa46e820a74f91381ccc198e353047db70686d147357024eb3cb94f1e89cb5ba0a56aa046b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76bea3858f78fbd8d31330d89069f9648a2ff93060ff073b3a113e47edf76f7d116d2b0976cf2ec447c030931651dd315003b7a6a5433a2bb3c035fc6846abe389b25c988f0bbb889560ae99ec4b227eda2e63a1c31a2c2bd48a822cbe92b6524e0cd8020ecaa34e19e7141d5e221509342bfe7d294d1eb3de6a50ca0301f89c2ee627e949c68b3a4a426a9b7d503a26e9a714ee5f72d8805dd1bfbd081f6a5d1f1289dfe14cb9194e26a44fac273461fc5c0e0a33db7f2d43ea8086cf059f40fa2640b6bfb74dd35f5a31059c01517cf4b6641fce9a24b96767b837ca037a1199735c375c705c798e0e208e4a5259d0bfa526b462af45a6eab34000000000000000000000000c4426344ec1a3366515dee221e747f55d7dd02534bc503b9b28277c253e410986bef2111a99cc448d652929f8a67a6a1d3f00dcad91aff428aade3f85714a1d3ef29acd4d49b62339c10c2ec0dac4728288e78980c1184d8223edbccbf9258b7374e79a1f8bf3fb73cfd1e76982f3d899f71e495f0ba8c6dbb7bbdfc399847a11921f97eba0ea14c4fed9a71eedb97c02461792e4a48dac16c60c3fcaab222025d78963c3ac899fa8b63f58a30212c9b2d7fe751e2046b78f86e22861b6504c667350244dd6d9189a8b9c45f8aaff9db694811ca86ed978f23eed7459c0382074170cf1e25b0e9ba3d1cc309353eea4cd8ab96bafda393276bdd8d32ead8db9e1b54d2d3d50e2815268fc1a6ec566981bc8ca2a4583f3d40e817433d0f4f25cfe6cc1897449ba5f26a9d66ac73e6f5c401376f23a314e0b9ff997d22f3e34b7524642c248aa813edaa626f00000021f8547d393dabe616fbbde21c90be00b5a22671395c7a69c6dd4d022ffc97ddb6aa025131652d409da1d8cfc3d219d4b1c1b7b8170d7c33d91db2b73f7ae02485a209a2474b5d0790d05c01bec623056e4d3f4d3149373a28b26a15a1fcce73d57e6eaf7e6f315fe275ebc9ef7aeca277dde01dde724f419803a2172a7833ceab38d21ca4f1dea5e1f4d8824167b21dd289dd4e6ecfba9e163bdbc48e1e758ecde05c10809c9edfa6d77c652fd742e6dad13d2a397bebe3ea8bc087d3720e2202f36c7719ae34f042e19dc08a3323a3d94098a7ec171469352bab1662c3e4d4803c565cfcce32dad628fade43a4844abb230ce608726fd87e93c405a96cf638c41510f26e9da5f316"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x62, 0xfe, &(0x7f0000000140)="cb74445b7d4c0b24676c6c71ae37efcedaf40242309766deb4e793f90000000000000000dbc856cbc664650634231454ca2d8034c4ca29e0d99c3b6615e91835a600c08f989af45438a54981be310aad92ae545b1c961e5f3762a51fe4c736edec6f", &(0x7f0000000440)=""/254, 0x2f00, 0x0, 0xff, 0x194, &(0x7f0000000980)="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", &(0x7f00000007c0)="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", 0x2, 0x0, 0x10000}, 0x24) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x3000000, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0xe00}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r4, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000300), ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3fffffffffffffec, &(0x7f00000003c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0xb7, &(0x7f0000000300), 0x38, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x55, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000000401400e27f000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000000)={r6, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 2.121933281s ago: executing program 5 (id=9333): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0xda, 0x2, 0x0, 0xde, 0x0, 0x0, 0x400, 0xc3103, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff}, 0x0, 0x80000b, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x58, &(0x7f0000000040)}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', 0xffffffffffffffff, 0x0, 0x7f}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x63, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b5134f30f668b5a2acd9876f4f90c72f2abe0d2150c76f3472e44b2fe77f664969440728939ff2b5af8de67e1d4768b34a08b1262e7534955a9439f253ba6e1f4f2268986872e13ad69f8459204f64839f47980e4b88de56ca649ed7be366d6d94476bd4c10ea64b9006e8865501d51893e127f3841f080510db97f568b9d585f16faa85f0ddb1f9c530947f57ea07d270036d3e55"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) 2.052484238s ago: executing program 0 (id=9334): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, &(0x7f0000000280)=[{}], 0x8, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xa, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x10, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="61122800000000006113480000000000bf1000000000000015000200091bfbff3d030100000000008701000257000000bc26000000000000bf67000000000000140300000ee600f06702000014000000160302000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad4301000000000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001000)={@fallback=r4, r4, 0x36, 0x200b, r0}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.761748186s ago: executing program 5 (id=9335): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000600)=0xd, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18080000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r0}, 0xfffffffffffffee8) bpf$ITER_CREATE(0x21, &(0x7f00000007c0)={r0}, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x6, 0x0}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)=@generic={&(0x7f0000000580)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1f, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0xa, 0x1, 0x0, r0}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x1000, &(0x7f0000000a00)=""/4096, 0x40f00, 0x18, '\x00', 0x0, @fallback=0x1e, r0, 0x8, &(0x7f0000000340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0xf, 0xd, 0x8380}, 0x10, r1, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000680)=[{0x1, 0x3, 0x1, 0xa}, {0x1, 0x5, 0xd, 0x1}, {0x4, 0x4, 0x7, 0xb}, {0x3, 0x3, 0x6, 0x4}], 0x10, 0x3ff}, 0x94) 1.743601868s ago: executing program 4 (id=9336): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000600)=@base={0xa, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value=0x18}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) 1.708912672s ago: executing program 5 (id=9337): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x5, 0x400, 0x9, 0x1}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000400"], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800}, 0x40800) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="000000bed22cce7e198edd000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/22], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[], 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x31) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x79, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_ext={0x1c, 0x15, &(0x7f0000000300)=@raw=[@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @btf_id={0x18, 0xf, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x9bf9}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], &(0x7f0000000080)='syzkaller\x00', 0xf, 0xb1, &(0x7f00000003c0)=""/177, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x3, 0x5, 0xfffffffc, 0x7c0}, 0x10, 0x2355c, r2, 0x6, &(0x7f00000005c0)=[r5, r7, r8], &(0x7f0000000940)=[{0x4, 0x2, 0x10, 0x8}, {0x0, 0x2, 0x4, 0xa}, {0x0, 0x4, 0x4, 0x8}, {0x0, 0x1, 0x10, 0x8}, {0x4, 0x1, 0xc, 0x4}, {0x4, 0x3, 0x4, 0x1}], 0x10, 0x8}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r9, 0xfe, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.682022264s ago: executing program 3 (id=9338): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x0, 0xa, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) 1.628049769s ago: executing program 3 (id=9339): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000fcffffff000000000100000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 1.615261961s ago: executing program 3 (id=9340): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x8, &(0x7f0000000dc0)=ANY=[@ANYRES32, @ANYBLOB="b4fdceda09aaa1ca43eaf6154d9e29a6eaa19c7f3b592760e00bc71278a50fdddd028a1530cd09e1a21ea46e1a11d3153403e0c2eeb8e0b859c9d4401d63fa028ab700ec2b769e81e90894d33ef8a1248376910aa2a294e6f3638f53c230a7a8fea0307a92a9c73efd22f0b634b438a15f0832580884b4e8cc17c9d072f88f6f77269db33019351edea04287050e6f07d97ed0a9cdbc7958131d1445675248ecc154a11d44e66eb3bd4097e5abc0b99eb5d474d38d714bcdb7d20278686de021f0674bca75cd26e2bb1953cf649af3325ee54bc0d21143c48cd031be0c832d507e616108cea42c8fae567bd2b3", @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095", @ANYBLOB="2d85389d44edc5d53521211b0f43e739e549137edd10"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75d}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x24008080) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_config_ext={0x6e5a, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x1882a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000c00)=ANY=[@ANYBLOB="18480000000000000000000000000000851000000000000018100000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x7, 0x4, 0x8, 0x463}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r4, &(0x7f0000000040), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x2, [@const={0x0, 0x0, 0x0, 0x9, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}, @func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}]}}, 0x0, 0x5a}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x21, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3089}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @call={0x85, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}]}, &(0x7f0000000240)='syzkaller\x00', 0xb1, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000a00)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xa, 0x2, 0x8}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000a80)=[0xffffffffffffffff, r3], &(0x7f0000000ac0)=[{0x5, 0x1, 0xd, 0xf}, {0x3, 0x3, 0x5, 0x6}, {0x5, 0x1, 0x4, 0x3}, {0x0, 0x2, 0x3, 0x2}, {0x4, 0x90, 0x5, 0x6}, {0x0, 0x4, 0x7, 0xe}, {0x1, 0x4, 0x7, 0x9}], 0x10, 0x3}, 0x94) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.612595571s ago: executing program 0 (id=9341): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, &(0x7f0000000280)=[{}], 0x8, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xa, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x10, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="61122800000000006113480000000000bf1000000000000015000200091bfbff3d030100000000008701000257000000bc26000000000000bf67000000000000140300000ee600f06702000014000000160302000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad4301000000000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001000)={@fallback=r4, r4, 0x36, 0x200b, r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.572869315s ago: executing program 4 (id=9342): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000700000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.swap.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)=']%#/&*\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4020940d, 0x0) 1.528787279s ago: executing program 5 (id=9343): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000003f004000000000000000f195"], &(0x7f0000000180)='syzkaller\x00', 0x100, 0x0, 0x0, 0x0, 0x5b}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x1, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fefd000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xd380000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd65}, 0x0, 0x0, r0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0, 0x2}, 0x218201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) close(r7) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r7, r1, 0x0, r7}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f37538e486dd6317ce623900fe800000002000e0865a6596aff57b00000000000000000000000000ac"], 0xfe1b) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.21550176s ago: executing program 4 (id=9344): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000500001a00000500"/28], 0x48) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.215241941s ago: executing program 5 (id=9345): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) 1.214092421s ago: executing program 0 (id=9346): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x5, 0x400, 0x9, 0x1}, 0x50) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800}, 0x40800) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="000000bed22cce7e198edd000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/22], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r3}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[], 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x31) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x79, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0xfe, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 946.678777ms ago: executing program 5 (id=9347): r0 = perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x9, 0x29, 0x5, 0x4, 0x0, 0x1, 0x1404, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000180), 0x8}, 0x580, 0x3, 0x1, 0x8, 0x7fff, 0x0, 0x27, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffe8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x8, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r6, 0x26}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 914.86417ms ago: executing program 4 (id=9348): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYRESHEX=r0, @ANYRES64=r0, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, r0, 0x5, '\x00', 0x0, r0}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000539805f2d5ae243254b4c1e229a2b3d80000000000000000000000005a523bab82f6ce352306010d108c32"], 0x48) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/22], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000200)="f5f1c43120b6d0e660ca4c4739d504958660883aa11fb7fe80a78dfb8fcf227fb502f1c645f4c62b10c79918d79b596d3f37f340d97ad7ebf88a200ae8077e75ea3df24134df76094ed27f48481ee637a22c5b90292c0419db2bb3990d7100878c3ead01ebbe2d33619be0dbdb67ce50fd8abea31e92936effbe6b81d7be37bde8c218f4ab503690f3bfb0c101ad4dbddfba4f85738fe180abbf04f3ddb00daccab3a11dffbf34bbcd510ed737733ac86c1b52be86a6a523646443ce0114ba0a8919613eded8d25c03e36bab3d1692385a015bd37cdea4341fd100c7af11228c3bc4af496a5a", 0xe6}, {&(0x7f00000003c0)="0c3a8264cee6599c5cfe65bc59f76cf38e31224a41d9948e449eb952a55b7b41f700859025ab1b57d15405d4183cc14dd257aa5f233724e3b05051ff8f035757c22ecd8bdf2bd9c7af5e6f48d8397356fa9fd6598d43769d1b91d020034c1cdd4b1c31ec809256ee04cab206b7c44c74127001e51ceec559f61cb64cdf79887a8563ec86a14f8e558b5f7ca2eaa45920fd1e6b0abd50f71508d706907349d99b8c2f8f9b623dc4979039e5d45a8d68a115e3642068cd", 0xb6}, {&(0x7f0000000c00)="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", 0x124}], 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="1400000069ccadcc0c0000000000000000000000000000000100000001000000000000001000000000000000000000005413908c"], 0x40}, 0x10d0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) 444.778847ms ago: executing program 0 (id=9349): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0500000000f01f00810000007f00000001"], 0x48) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x20800, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000300)=0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000001c0)={'ip_vti0\x00', 0x1000}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e85"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10, 0x0}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={&(0x7f0000000340)="bc58879cb7d5c9b7ea391c233aac563d07be30b4471a464a050f9351921ce9688f723175d577c9f481e2f075055a6b83bb41829cb6e87c7f3daee62d405ba09076b93868f3c1a8ecd8d6785a38333537", &(0x7f0000001340)=""/4096, &(0x7f0000000480)="461b094bc1486b519a3a06ce9a54e62abeb9159d87dca474e5ad4c883c5ea484f26e38f308fd6e3c6afb16dc3882837d86e84f2c01ff3a2dcc07b525db89b9896137b5daa0450846476fd354e7e8e9339a4afc6f3cd4e09eaa9eb441224f2b5f6c5af768699cfc98e4194d31eab0d53d79c693b66e9a1f4fd7175e40c1c4586844fbde722f30e66b7d0f3b77c72fb219fef25c0e3b5140687645247eeeba4318591dc49026b05e", &(0x7f0000000540)="896abf4f02406401acddabe0c93f7cdab7dc9142162f4793adcd7b2cc09e10b2d1aef76f0cc7f01dbe34074b4eb972e2957229f611bde168e9e16c0ebf9b51311e43f31267658def8c7ea352d9b210594bd13b13a6c96c7c82c867c26de2c6b3d1c62603f9a016d702a8233bd0e63e1f0dfa0c0f65d66bf4770766052bceb4258913dd0e8e970b64ccec968b9daa98a949d790adb5024f326bc41c9c57cff04e7552902bbcf2ebf293e46ac7c2605c111e5ed8a044ed", 0xff, r6, 0x4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000008140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000e6ff0021000c005f000c0000b8d265e026ca175700000000060400000000712e2e00"], 0x0, 0x29}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES16=r3, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ff03000000000000000000000000000000f0ff000000000000000000f97d234dd97255"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r11, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r0, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000000)="9de0f08577f1c125212e7fa30067aa5cad0a96a3cb2121f3c664880412619d212630eadc02922387a2dcf59de4a71f0e371e33d7a80957bf33cdffdb7607ab9ef26988e429d8b74e1e7a81f20154c3222dbd1b2f1332f50b20d7ccf161e6c684de32845f5d49eda25cfbdb6d97a2db3c67a4365f9a5add682c06df7054f76731ef536e653c18318c9bc19d8c72fddbb1acc3335e01f1b8cde5e7074e9df87beac7d1e224e85a74252883", &(0x7f00000000c0)=""/9, &(0x7f0000000100)="b36fe06c9fb3a1152de2e9233b53b7ebd062c96801b81a294c9d802b8f52a9247c3cca9cb01db05e1ece91641b7b559c8ace8df78daa378fc3470fe93fc83c5ca1d19f932774434b983d80590f1927edc94c4a50f7d12b71397f34d3eb7713bdd28a9d15faca3bdabd0854e70c711fb42cbca2007ebd9d66813def33f80bc441783e5af2477e2003b155e1a0a6f66e77d381e103af7613bc717091cc94e19f4593d0e180d11667f899f7d9ea5b7cdbaebe16a445aa8e81cc997e1b33af459384a8d94f823e1564e3715644090d1d25", &(0x7f0000000200)="1bd30a4f701a40181c1f43f282cb502a45c8eac8e3519e2e171e5bcbf5cddb17333870ec368da9c32d5333eacf636852fd1e5669d827f3ede77c701cc0b9b53da48ce5ace11c25b0ea98d0ef5f574b5c0fce47d945fce542e285297b13d626d46ebbcc246dec465bae52117cb08abed218e574", 0x2, r1}, 0x38) 377.683473ms ago: executing program 4 (id=9350): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bc}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, &(0x7f0000000280)=[{}], 0x8, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xa, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x10, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="61122800000000006113480000000000bf1000000000000015000200091bfbff3d030100000000008701000257000000bc26000000000000bf67000000000000140300000ee600f06702000014000000160302000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad4301000000000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 222.750668ms ago: executing program 0 (id=9351): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, &(0x7f0000000280)=[{}], 0x8, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xa, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x10, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="61122800000000006113480000000000bf1000000000000015000200091bfbff3d030100000000008701000257000000bc26000000000000bf67000000000000140300000ee600f06702000014000000160302000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad4301000000000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001000)={@fallback=r3, r3, 0x36, 0x200b}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r6}, 0x10) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 0s ago: executing program 2 (id=8819): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000000000", @ANYBLOB='\x00'/12, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd6c}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="180800000000000000000000000000008510000003000000180000000000000000000000000000009500000000000000bfa000000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xea, &(0x7f0000001700)=""/234, 0x40f00, 0x10}, 0x22) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="75c142029f447ce3a3e67e7746630ab41ae4acf67ff49729edad79b0711fb4cc8c3b4955769de269a9d7f65eaf7513e2c2cca5ab0fad9948aa797c3a3d79d3082b226a8538a3ad73c3c483a223669717b1928e3951e6c920e90a7f73a382f72255c3a5ae78af54292aa664baec9fa4acfc15c9c0fa980830b751fb7b967039172b49c16434f853efab098651c0f68611f6922e3d48f27b07935e40a73152560d4c9620057828c9b9e09a7ec60dc6f69bff6f09dee957fcdd42c53c673d3e92f2c2610c48f7e608d133284acee9b0a213a3f8f3", 0xd3}, {&(0x7f00000004c0)="eee415fc2161cadfa8081a92bbbab8710269f28fa5366925c591df5542d8b9a1865a75f659f79e5d6e4fdcff82479c6c74b5fe626e8c14bd5aeb05ad36d3def68ce91042c9bd9051fce887db2e7f3708400375412d3b8e5e4720d1e688ba39ba17201e38c371f68f20367cc38bdd77db8595b66caceabeecdab3f80c1d1c8dcde138835bcca54deab73933c8b5d0d09601945a776f1253bf362bda34f06b8b230962cb85c9e74f14762e6e7651bb3d4a02ded0aa91db96046a08adfca788d2dc1f191efea52e6dd29165ea57ae7a01d8d49077b2799f2d85d30aa6c66a9b03b9b56375ffa0ec", 0xe6}, {&(0x7f00000005c0)="8a6301c0d823fb69fd09ab8850e906e5389587a8f63800ebef0c48a1f22e079ea07f7948718e3a439fc3f765e3f21b1adf60dca099d78be5aebd4e0c42b763cc987479f3016db930b2bd421ba410e7fe8dfe8e35248823eea7f617952b12dd00e5015051bfd23728d97920", 0x6b}, {&(0x7f0000000680)="e3290e5f5ce1935dc318a0ee02d27c7b82390096ea7482dee68780c030b2e6a7af8a52ae0db9bb79c8971f37cfc23f1507c050753a0fbc610ab0841f02d21309579fd21edfbe34c468bfef41d427e031088cc367248a66086e8db339c2e4795d62f639fb14", 0x65}], 0x4, &(0x7f0000000700)=[@mark={{0x14}}], 0x18}, 0x8800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='inet_sk_error_report\x00', r2, 0x0, 0x794}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000003, 0x8404, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x810c, 0x0, 0xc4b, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x97, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): : 00007ffe759472a8 [ 1015.335591][T25487] [ 1015.377896][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1015.386856][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1015.395552][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1015.448449][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1015.461021][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1015.501666][T25493] device sit0 left promiscuous mode [ 1015.686969][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1015.696049][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1015.705363][T25496] device pim6reg1 entered promiscuous mode [ 1015.712244][T25499] device sit0 entered promiscuous mode [ 1016.587839][T25526] device sit0 left promiscuous mode [ 1016.715969][T25529] device sit0 entered promiscuous mode [ 1016.841923][ T8268] device veth1_macvtap left promiscuous mode [ 1017.139338][T25535] device sit0 left promiscuous mode [ 1017.245834][T25539] device sit0 entered promiscuous mode [ 1018.132282][T25569] device sit0 left promiscuous mode [ 1018.339579][T25576] device sit0 entered promiscuous mode [ 1019.109070][T25594] FAULT_INJECTION: forcing a failure. [ 1019.109070][T25594] name failslab, interval 1, probability 0, space 0, times 0 [ 1019.122824][T25594] CPU: 0 PID: 25594 Comm: syz.5.8726 Not tainted syzkaller #0 [ 1019.130500][T25594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1019.141147][T25594] Call Trace: [ 1019.144454][T25594] [ 1019.147522][T25594] __dump_stack+0x21/0x30 [ 1019.151885][T25594] dump_stack_lvl+0xee/0x150 [ 1019.156599][T25594] ? show_regs_print_info+0x20/0x20 [ 1019.161921][T25594] dump_stack+0x15/0x20 [ 1019.166372][T25594] should_fail+0x3c1/0x510 [ 1019.171099][T25594] ? ip_frag_next+0xd7/0xab0 [ 1019.175804][T25594] __should_failslab+0xa4/0xe0 [ 1019.180788][T25594] should_failslab+0x9/0x20 [ 1019.185334][T25594] slab_pre_alloc_hook+0x3b/0xe0 [ 1019.190419][T25594] ? ip_frag_next+0xd7/0xab0 [ 1019.195082][T25594] ? ip_frag_next+0xd7/0xab0 [ 1019.199701][T25594] __kmalloc_track_caller+0x6c/0x2c0 [ 1019.205029][T25594] ? ip_frag_next+0xd7/0xab0 [ 1019.209827][T25594] ? ip_frag_next+0xd7/0xab0 [ 1019.214558][T25594] __alloc_skb+0x21a/0x740 [ 1019.219007][T25594] ip_frag_next+0xd7/0xab0 [ 1019.223553][T25594] ip_do_fragment+0x811/0x1ca0 [ 1019.228510][T25594] ? ip_fragment+0x250/0x250 [ 1019.233133][T25594] ip_fragment+0x152/0x250 [ 1019.237668][T25594] __ip_finish_output+0x236/0x360 [ 1019.242832][T25594] ip_finish_output+0x31/0x240 [ 1019.247710][T25594] ? ip_output+0x31d/0x360 [ 1019.252150][T25594] ip_output+0x1e1/0x360 [ 1019.256507][T25594] ? ip_finish_output+0x240/0x240 [ 1019.261759][T25594] ? ip_mc_finish_output+0x400/0x400 [ 1019.267059][T25594] ? prandom_u32+0x24d/0x290 [ 1019.271986][T25594] ip_local_out+0x96/0xb0 [ 1019.276440][T25594] iptunnel_xmit+0x4db/0x8f0 [ 1019.281128][T25594] ip_tunnel_xmit+0x1a2b/0x21c0 [ 1019.285999][T25594] ? ip4_dst_hoplimit+0x110/0x110 [ 1019.291115][T25594] ? skb_network_protocol+0x501/0x740 [ 1019.296665][T25594] ? gre_build_header+0x229/0x850 [ 1019.301796][T25594] ipgre_xmit+0x7c0/0xb30 [ 1019.306189][T25594] dev_hard_start_xmit+0x244/0x670 [ 1019.311418][T25594] __dev_queue_xmit+0x17bd/0x2d80 [ 1019.316636][T25594] ? dev_queue_xmit+0x20/0x20 [ 1019.321315][T25594] ? __kasan_check_write+0x14/0x20 [ 1019.326433][T25594] ? skb_release_data+0x1c6/0xa10 [ 1019.331466][T25594] ? __kasan_check_write+0x14/0x20 [ 1019.336586][T25594] ? pskb_expand_head+0xbe6/0x11d0 [ 1019.341814][T25594] dev_queue_xmit+0x17/0x20 [ 1019.346420][T25594] __bpf_redirect+0x68a/0xe60 [ 1019.351108][T25594] bpf_clone_redirect+0x242/0x380 [ 1019.356236][T25594] bpf_prog_208b094576c80b22+0x56/0xc3c [ 1019.361801][T25594] ? __kasan_slab_alloc+0xcf/0xf0 [ 1019.366855][T25594] ? __kasan_slab_alloc+0xbd/0xf0 [ 1019.371996][T25594] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1019.377375][T25594] ? kmem_cache_alloc+0xf7/0x260 [ 1019.382314][T25594] ? __build_skb+0x2d/0x310 [ 1019.386981][T25594] ? build_skb+0x24/0x200 [ 1019.391486][T25594] ? bpf_prog_test_run_skb+0x279/0x1150 [ 1019.397047][T25594] ? bpf_prog_test_run+0x3d5/0x620 [ 1019.402255][T25594] ? __sys_bpf+0x52c/0x730 [ 1019.406886][T25594] ? __x64_sys_bpf+0x7c/0x90 [ 1019.411516][T25594] ? x64_sys_call+0x4b9/0x9a0 [ 1019.416203][T25594] ? do_syscall_64+0x4c/0xa0 [ 1019.420940][T25594] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1019.427050][T25594] ? ktime_get+0x12f/0x160 [ 1019.431595][T25594] bpf_test_run+0x33d/0x8d0 [ 1019.436126][T25594] ? convert___skb_to_skb+0x4f0/0x4f0 [ 1019.441518][T25594] ? eth_get_headlen+0x1f0/0x1f0 [ 1019.446569][T25594] ? convert___skb_to_skb+0x41/0x4f0 [ 1019.451949][T25594] bpf_prog_test_run_skb+0x9ec/0x1150 [ 1019.457448][T25594] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 1019.463352][T25594] bpf_prog_test_run+0x3d5/0x620 [ 1019.468394][T25594] ? bpf_prog_query+0x230/0x230 [ 1019.473251][T25594] ? selinux_bpf+0xce/0xf0 [ 1019.477673][T25594] ? security_bpf+0x82/0xa0 [ 1019.482184][T25594] __sys_bpf+0x52c/0x730 [ 1019.486525][T25594] ? bpf_link_show_fdinfo+0x310/0x310 [ 1019.491912][T25594] ? debug_smp_processor_id+0x17/0x20 [ 1019.497294][T25594] __x64_sys_bpf+0x7c/0x90 [ 1019.501827][T25594] x64_sys_call+0x4b9/0x9a0 [ 1019.506339][T25594] do_syscall_64+0x4c/0xa0 [ 1019.510761][T25594] ? clear_bhb_loop+0x50/0xa0 [ 1019.515550][T25594] ? clear_bhb_loop+0x50/0xa0 [ 1019.520324][T25594] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1019.526324][T25594] RIP: 0033:0x7f2eb6480fc9 [ 1019.530922][T25594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1019.550631][T25594] RSP: 002b:00007f2eb4ee9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1019.559137][T25594] RAX: ffffffffffffffda RBX: 00007f2eb66d7fa0 RCX: 00007f2eb6480fc9 [ 1019.567203][T25594] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 1019.575176][T25594] RBP: 00007f2eb4ee9090 R08: 0000000000000000 R09: 0000000000000000 [ 1019.583148][T25594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1019.591408][T25594] R13: 00007f2eb66d8038 R14: 00007f2eb66d7fa0 R15: 00007ffe1e7df6c8 [ 1019.599527][T25594] [ 1020.475280][T25612] device sit0 entered promiscuous mode [ 1023.537612][T25679] FAULT_INJECTION: forcing a failure. [ 1023.537612][T25679] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1023.648197][T25679] CPU: 1 PID: 25679 Comm: syz.2.8756 Not tainted syzkaller #0 [ 1023.656108][T25679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1023.666750][T25679] Call Trace: [ 1023.670059][T25679] [ 1023.673015][T25679] __dump_stack+0x21/0x30 [ 1023.677694][T25679] dump_stack_lvl+0xee/0x150 [ 1023.682329][T25679] ? show_regs_print_info+0x20/0x20 [ 1023.687662][T25679] dump_stack+0x15/0x20 [ 1023.691846][T25679] should_fail+0x3c1/0x510 [ 1023.696486][T25679] should_fail_alloc_page+0x55/0x80 [ 1023.701841][T25679] prepare_alloc_pages+0x156/0x600 [ 1023.707153][T25679] ? __alloc_pages_bulk+0xab0/0xab0 [ 1023.712664][T25679] ? __bpf_trace_mm_page_alloc+0xc0/0xf0 [ 1023.718470][T25679] __alloc_pages+0x10a/0x440 [ 1023.723294][T25679] ? prep_new_page+0x110/0x110 [ 1023.728306][T25679] ? _raw_spin_lock+0x8e/0xe0 [ 1023.733031][T25679] ? _raw_spin_trylock_bh+0x130/0x130 [ 1023.738443][T25679] __get_free_pages+0x10/0x30 [ 1023.743159][T25679] kasan_populate_vmalloc_pte+0x29/0x120 [ 1023.749093][T25679] __apply_to_page_range+0x8cd/0xc70 [ 1023.754689][T25679] ? kasan_populate_vmalloc+0x70/0x70 [ 1023.760383][T25679] ? kasan_populate_vmalloc+0x70/0x70 [ 1023.766089][T25679] apply_to_page_range+0x3b/0x50 [ 1023.771052][T25679] kasan_populate_vmalloc+0x60/0x70 [ 1023.776893][T25679] alloc_vmap_area+0x185c/0x1990 [ 1023.781890][T25679] ? vm_map_ram+0xa70/0xa70 [ 1023.786555][T25679] ? kmem_cache_alloc_trace+0x119/0x270 [ 1023.792141][T25679] ? __get_vm_area_node+0x11d/0x350 [ 1023.797573][T25679] __get_vm_area_node+0x14e/0x350 [ 1023.802651][T25679] __vmalloc_node_range+0xdf/0xaf0 [ 1023.807990][T25679] ? reuseport_array_alloc+0xc7/0x160 [ 1023.813591][T25679] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1023.819681][T25679] ? security_capable+0x87/0xb0 [ 1023.824680][T25679] bpf_map_area_alloc+0xd5/0xe0 [ 1023.829576][T25679] ? reuseport_array_alloc+0xc7/0x160 [ 1023.835241][T25679] reuseport_array_alloc+0xc7/0x160 [ 1023.840489][T25679] map_create+0x455/0x21b0 [ 1023.845119][T25679] __sys_bpf+0x2cf/0x730 [ 1023.849622][T25679] ? bpf_link_show_fdinfo+0x310/0x310 [ 1023.855124][T25679] __x64_sys_bpf+0x7c/0x90 [ 1023.859584][T25679] x64_sys_call+0x4b9/0x9a0 [ 1023.864114][T25679] do_syscall_64+0x4c/0xa0 [ 1023.868562][T25679] ? clear_bhb_loop+0x50/0xa0 [ 1023.873261][T25679] ? clear_bhb_loop+0x50/0xa0 [ 1023.878066][T25679] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1023.884083][T25679] RIP: 0033:0x7f2e9924afc9 [ 1023.888522][T25679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1023.908251][T25679] RSP: 002b:00007f2e97cb3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1023.917455][T25679] RAX: ffffffffffffffda RBX: 00007f2e994a1fa0 RCX: 00007f2e9924afc9 [ 1023.926173][T25679] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 1023.934181][T25679] RBP: 00007f2e97cb3090 R08: 0000000000000000 R09: 0000000000000000 [ 1023.942332][T25679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1023.950337][T25679] R13: 00007f2e994a2038 R14: 00007f2e994a1fa0 R15: 00007ffd605a1278 [ 1023.958831][T25679] [ 1024.395589][T25711] device sit0 left promiscuous mode [ 1024.583101][T25705] device wg2 entered promiscuous mode [ 1024.614711][T25714] device sit0 entered promiscuous mode [ 1024.856369][T25707] device wg2 left promiscuous mode [ 1024.898253][T25724] FAULT_INJECTION: forcing a failure. [ 1024.898253][T25724] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1024.955896][T25724] CPU: 0 PID: 25724 Comm: syz.3.8768 Not tainted syzkaller #0 [ 1024.963529][T25724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1024.973705][T25724] Call Trace: [ 1024.977102][T25724] [ 1024.980061][T25724] __dump_stack+0x21/0x30 [ 1024.984513][T25724] dump_stack_lvl+0xee/0x150 [ 1024.989139][T25724] ? show_regs_print_info+0x20/0x20 [ 1024.994606][T25724] ? stack_trace_save+0xe0/0xe0 [ 1024.999589][T25724] dump_stack+0x15/0x20 [ 1025.003767][T25724] should_fail+0x3c1/0x510 [ 1025.008463][T25724] should_fail_alloc_page+0x55/0x80 [ 1025.013858][T25724] prepare_alloc_pages+0x156/0x600 [ 1025.018994][T25724] ? __alloc_pages_bulk+0xab0/0xab0 [ 1025.024300][T25724] ? __kasan_slab_alloc+0xcf/0xf0 [ 1025.029568][T25724] ? __kasan_slab_alloc+0xbd/0xf0 [ 1025.034699][T25724] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1025.039999][T25724] ? alloc_vmap_area+0x17a/0x1990 [ 1025.045266][T25724] __alloc_pages+0x10a/0x440 [ 1025.050082][T25724] ? prep_new_page+0x110/0x110 [ 1025.054905][T25724] ? _raw_spin_lock+0x8e/0xe0 [ 1025.059724][T25724] ? _raw_spin_trylock_bh+0x130/0x130 [ 1025.065315][T25724] __get_free_pages+0x10/0x30 [ 1025.070008][T25724] kasan_populate_vmalloc_pte+0x29/0x120 [ 1025.075973][T25724] __apply_to_page_range+0x8cd/0xc70 [ 1025.081269][T25724] ? kasan_populate_vmalloc+0x70/0x70 [ 1025.086664][T25724] ? kasan_populate_vmalloc+0x70/0x70 [ 1025.092216][T25724] apply_to_page_range+0x3b/0x50 [ 1025.097250][T25724] kasan_populate_vmalloc+0x60/0x70 [ 1025.102579][T25724] alloc_vmap_area+0x185c/0x1990 [ 1025.107974][T25724] ? vm_map_ram+0xa70/0xa70 [ 1025.112705][T25724] ? kmem_cache_alloc_trace+0x119/0x270 [ 1025.118262][T25724] ? __get_vm_area_node+0x11d/0x350 [ 1025.123742][T25724] __get_vm_area_node+0x14e/0x350 [ 1025.129124][T25724] __vmalloc_node_range+0xdf/0xaf0 [ 1025.134422][T25724] ? sock_map_alloc+0x202/0x330 [ 1025.139391][T25724] bpf_map_area_alloc+0xd5/0xe0 [ 1025.144260][T25724] ? sock_map_alloc+0x202/0x330 [ 1025.149287][T25724] sock_map_alloc+0x202/0x330 [ 1025.153967][T25724] map_create+0x455/0x21b0 [ 1025.158728][T25724] __sys_bpf+0x2cf/0x730 [ 1025.162981][T25724] ? bpf_link_show_fdinfo+0x310/0x310 [ 1025.168380][T25724] ? debug_smp_processor_id+0x17/0x20 [ 1025.173862][T25724] __x64_sys_bpf+0x7c/0x90 [ 1025.178367][T25724] x64_sys_call+0x4b9/0x9a0 [ 1025.182957][T25724] do_syscall_64+0x4c/0xa0 [ 1025.187376][T25724] ? clear_bhb_loop+0x50/0xa0 [ 1025.192059][T25724] ? clear_bhb_loop+0x50/0xa0 [ 1025.196749][T25724] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1025.202766][T25724] RIP: 0033:0x7f8d9a39dfc9 [ 1025.207188][T25724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1025.227316][T25724] RSP: 002b:00007f8d98e06038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1025.235933][T25724] RAX: ffffffffffffffda RBX: 00007f8d9a5f4fa0 RCX: 00007f8d9a39dfc9 [ 1025.244008][T25724] RDX: 0000000000000050 RSI: 0000200000000580 RDI: 0600000000000000 [ 1025.252096][T25724] RBP: 00007f8d98e06090 R08: 0000000000000000 R09: 0000000000000000 [ 1025.260067][T25724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1025.268130][T25724] R13: 00007f8d9a5f5038 R14: 00007f8d9a5f4fa0 R15: 00007ffccbc18e38 [ 1025.276115][T25724] [ 1026.085198][T25771] device sit0 entered promiscuous mode [ 1027.198655][T25806] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1028.736183][T25849] device syzkaller0 entered promiscuous mode [ 1029.191954][T25863] device sit0 left promiscuous mode [ 1029.339862][T25867] device sit0 entered promiscuous mode [ 1029.602610][T25868] device pim6reg1 entered promiscuous mode [ 1029.860434][T25871] bridge0: port 1(bridge_slave_0) entered blocking state [ 1029.867711][T25871] bridge0: port 1(bridge_slave_0) entered disabled state [ 1029.934100][T25871] device bridge_slave_0 entered promiscuous mode [ 1029.973361][T25871] bridge0: port 2(bridge_slave_1) entered blocking state [ 1029.986516][T25871] bridge0: port 2(bridge_slave_1) entered disabled state [ 1030.009619][T25871] device bridge_slave_1 entered promiscuous mode [ 1030.031748][T25886] FAULT_INJECTION: forcing a failure. [ 1030.031748][T25886] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.274583][T25886] CPU: 1 PID: 25886 Comm: syz.3.8823 Not tainted syzkaller #0 [ 1030.282647][T25886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1030.292717][T25886] Call Trace: [ 1030.296019][T25886] [ 1030.298982][T25886] __dump_stack+0x21/0x30 [ 1030.303694][T25886] dump_stack_lvl+0xee/0x150 [ 1030.308313][T25886] ? show_regs_print_info+0x20/0x20 [ 1030.313543][T25886] dump_stack+0x15/0x20 [ 1030.317724][T25886] should_fail+0x3c1/0x510 [ 1030.322467][T25886] __should_failslab+0xa4/0xe0 [ 1030.327277][T25886] should_failslab+0x9/0x20 [ 1030.331813][T25886] slab_pre_alloc_hook+0x3b/0xe0 [ 1030.336872][T25886] ? alloc_vmap_area+0x63a/0x1990 [ 1030.342124][T25886] kmem_cache_alloc+0x44/0x260 [ 1030.347002][T25886] alloc_vmap_area+0x63a/0x1990 [ 1030.351984][T25886] ? vm_map_ram+0xa70/0xa70 [ 1030.356689][T25886] ? kmem_cache_alloc_trace+0x119/0x270 [ 1030.363043][T25886] __get_vm_area_node+0x14e/0x350 [ 1030.368185][T25886] __vmalloc_node_range+0xdf/0xaf0 [ 1030.373789][T25886] ? copy_process+0x5a9/0x3210 [ 1030.378579][T25886] ? slab_post_alloc_hook+0x6d/0x2b0 [ 1030.383973][T25886] ? kmem_cache_alloc+0xf7/0x260 [ 1030.389467][T25886] dup_task_struct+0x3f2/0xc10 [ 1030.394262][T25886] ? copy_process+0x5a9/0x3210 [ 1030.399053][T25886] ? recalc_sigpending+0x1ac/0x230 [ 1030.404298][T25886] copy_process+0x5a9/0x3210 [ 1030.408917][T25886] ? kstrtol_from_user+0x260/0x260 [ 1030.414056][T25886] ? __kasan_check_write+0x14/0x20 [ 1030.419311][T25886] ? proc_fail_nth_write+0x17a/0x1f0 [ 1030.424640][T25886] ? proc_fail_nth_read+0x210/0x210 [ 1030.429859][T25886] ? __pidfd_prepare+0x150/0x150 [ 1030.434989][T25886] ? security_file_permission+0x83/0xa0 [ 1030.440648][T25886] kernel_clone+0x23f/0x940 [ 1030.445188][T25886] ? create_io_thread+0x130/0x130 [ 1030.450496][T25886] ? __kasan_check_write+0x14/0x20 [ 1030.455752][T25886] ? mutex_unlock+0x89/0x220 [ 1030.460562][T25886] __x64_sys_clone+0x176/0x1d0 [ 1030.465446][T25886] ? __kasan_check_write+0x14/0x20 [ 1030.470596][T25886] ? __ia32_sys_vfork+0xf0/0xf0 [ 1030.475492][T25886] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1030.481678][T25886] x64_sys_call+0x41f/0x9a0 [ 1030.486221][T25886] do_syscall_64+0x4c/0xa0 [ 1030.490670][T25886] ? clear_bhb_loop+0x50/0xa0 [ 1030.495626][T25886] ? clear_bhb_loop+0x50/0xa0 [ 1030.500407][T25886] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1030.506409][T25886] RIP: 0033:0x7f8d9a39dfc9 [ 1030.510848][T25886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1030.530581][T25886] RSP: 002b:00007f8d98e05fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1030.539239][T25886] RAX: ffffffffffffffda RBX: 00007f8d9a5f4fa0 RCX: 00007f8d9a39dfc9 [ 1030.547230][T25886] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 1030.555239][T25886] RBP: 00007f8d98e06090 R08: 0000000000000000 R09: 0000000000000000 [ 1030.563230][T25886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1030.571223][T25886] R13: 00007f8d9a5f5038 R14: 00007f8d9a5f4fa0 R15: 00007ffccbc18e38 [ 1030.579223][T25886] [ 1031.051602][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1031.062040][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1031.111689][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1031.131312][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1031.140562][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 1031.147624][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1031.155444][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1031.164313][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1031.173038][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 1031.180258][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1031.188102][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1031.196829][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1031.205158][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1031.264934][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1031.361459][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1031.382148][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1031.390617][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1031.408265][T25871] device veth0_vlan entered promiscuous mode [ 1031.498738][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1031.543562][T25871] device veth1_macvtap entered promiscuous mode [ 1031.701303][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1031.745574][T25914] device sit0 left promiscuous mode [ 1031.899543][T25918] device sit0 entered promiscuous mode [ 1032.205027][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1032.215787][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1032.315837][T25923] device sit0 left promiscuous mode [ 1032.428685][T25929] device sit0 entered promiscuous mode [ 1033.181756][T25939] bridge0: port 1(bridge_slave_0) entered blocking state [ 1033.199256][T25939] bridge0: port 1(bridge_slave_0) entered disabled state [ 1033.238241][T25939] device bridge_slave_0 entered promiscuous mode [ 1033.262172][T25939] bridge0: port 2(bridge_slave_1) entered blocking state [ 1033.319316][T25939] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.401845][T25939] device bridge_slave_1 entered promiscuous mode [ 1033.576771][T19003] device veth1_macvtap left promiscuous mode [ 1034.494365][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1034.514639][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1034.549379][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1034.589692][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1034.649214][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 1034.656673][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1034.709155][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1034.739782][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1034.781384][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 1034.788637][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1034.799183][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1034.992786][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1035.039226][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1035.047800][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1035.122539][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1035.133349][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1035.155972][T25939] device veth0_vlan entered promiscuous mode [ 1035.173332][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1035.199456][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1035.207869][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1035.215588][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1035.261560][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1035.270606][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1035.300693][T25939] device veth1_macvtap entered promiscuous mode [ 1035.433780][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1035.450998][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1035.470554][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1035.481460][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1035.501074][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1036.149524][T26031] FAULT_INJECTION: forcing a failure. [ 1036.149524][T26031] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1036.265945][T26031] CPU: 0 PID: 26031 Comm: syz.3.8866 Not tainted syzkaller #0 [ 1036.273486][T26031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1036.283668][T26031] Call Trace: [ 1036.286976][T26031] [ 1036.289939][T26031] __dump_stack+0x21/0x30 [ 1036.294304][T26031] dump_stack_lvl+0xee/0x150 [ 1036.298917][T26031] ? show_regs_print_info+0x20/0x20 [ 1036.304175][T26031] dump_stack+0x15/0x20 [ 1036.308372][T26031] should_fail+0x3c1/0x510 [ 1036.312900][T26031] should_fail_usercopy+0x1a/0x20 [ 1036.318048][T26031] strncpy_from_user+0x24/0x2e0 [ 1036.322927][T26031] ? kmem_cache_alloc+0xf7/0x260 [ 1036.327893][T26031] getname_flags+0xf4/0x500 [ 1036.332516][T26031] getname+0x19/0x20 [ 1036.336692][T26031] do_sys_openat2+0xd9/0x7b0 [ 1036.341323][T26031] ? __kasan_check_write+0x14/0x20 [ 1036.346468][T26031] ? fput_many+0x15a/0x1a0 [ 1036.351005][T26031] ? do_sys_open+0xe0/0xe0 [ 1036.355463][T26031] ? fput+0x1a/0x20 [ 1036.359429][T26031] ? ksys_write+0x1eb/0x240 [ 1036.364042][T26031] ? __ia32_sys_read+0x90/0x90 [ 1036.368924][T26031] __x64_sys_openat+0x136/0x160 [ 1036.373980][T26031] x64_sys_call+0x219/0x9a0 [ 1036.379302][T26031] do_syscall_64+0x4c/0xa0 [ 1036.383744][T26031] ? clear_bhb_loop+0x50/0xa0 [ 1036.388453][T26031] ? clear_bhb_loop+0x50/0xa0 [ 1036.393296][T26031] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1036.399225][T26031] RIP: 0033:0x7f8d9a39dfc9 [ 1036.403672][T26031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1036.423606][T26031] RSP: 002b:00007f8d98de5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1036.432148][T26031] RAX: ffffffffffffffda RBX: 00007f8d9a5f5090 RCX: 00007f8d9a39dfc9 [ 1036.440237][T26031] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffff9c [ 1036.448402][T26031] RBP: 00007f8d98de5090 R08: 0000000000000000 R09: 0000000000000000 [ 1036.456481][T26031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1036.464840][T26031] R13: 00007f8d9a5f5128 R14: 00007f8d9a5f5090 R15: 00007ffccbc18e38 [ 1036.473127][T26031] [ 1036.875049][T19003] device bridge_slave_1 left promiscuous mode [ 1036.889254][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1036.949641][T19003] device bridge_slave_0 left promiscuous mode [ 1036.956010][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1036.965640][T19003] device veth1_macvtap left promiscuous mode [ 1036.972015][T19003] device veth0_vlan left promiscuous mode [ 1037.565021][T26032] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.572281][T26032] bridge0: port 1(bridge_slave_0) entered disabled state [ 1037.580170][T26032] device bridge_slave_0 entered promiscuous mode [ 1037.641289][T26056] device sit0 left promiscuous mode [ 1037.672326][T26055] device sit0 left promiscuous mode [ 1037.778227][T26064] device sit0 entered promiscuous mode [ 1037.887627][T26032] bridge0: port 2(bridge_slave_1) entered blocking state [ 1037.901008][T26032] bridge0: port 2(bridge_slave_1) entered disabled state [ 1037.934484][T26032] device bridge_slave_1 entered promiscuous mode [ 1039.398363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1039.408403][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1039.431652][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1039.450809][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1039.470106][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 1039.477717][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1039.505552][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1039.519605][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1039.535392][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 1039.542502][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1039.619473][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1039.632298][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1039.649695][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1039.712022][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1039.721178][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1039.766468][T26119] FAULT_INJECTION: forcing a failure. [ 1039.766468][T26119] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.824667][T26119] CPU: 1 PID: 26119 Comm: syz.4.8889 Not tainted syzkaller #0 [ 1039.832190][T26119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1039.842454][T26119] Call Trace: [ 1039.845758][T26119] [ 1039.848805][T26119] __dump_stack+0x21/0x30 [ 1039.853252][T26119] dump_stack_lvl+0xee/0x150 [ 1039.857959][T26119] ? show_regs_print_info+0x20/0x20 [ 1039.863506][T26119] ? kasan_set_track+0x5b/0x70 [ 1039.868481][T26119] ? kasan_set_free_info+0x23/0x40 [ 1039.873794][T26119] ? ____kasan_slab_free+0x125/0x160 [ 1039.879252][T26119] ? __kasan_slab_free+0x11/0x20 [ 1039.884222][T26119] ? slab_free_freelist_hook+0xc2/0x190 [ 1039.889909][T26119] dump_stack+0x15/0x20 [ 1039.894071][T26119] should_fail+0x3c1/0x510 [ 1039.898627][T26119] __should_failslab+0xa4/0xe0 [ 1039.903448][T26119] should_failslab+0x9/0x20 [ 1039.908238][T26119] slab_pre_alloc_hook+0x3b/0xe0 [ 1039.913573][T26119] __kmalloc+0x6d/0x2c0 [ 1039.917921][T26119] ? bpf_test_init+0x100/0x1c0 [ 1039.922861][T26119] bpf_test_init+0x100/0x1c0 [ 1039.927656][T26119] bpf_prog_test_run_skb+0x193/0x1150 [ 1039.933037][T26119] ? __kasan_check_write+0x14/0x20 [ 1039.938290][T26119] ? fput_many+0x15a/0x1a0 [ 1039.942854][T26119] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 1039.946671][T26032] device veth0_vlan entered promiscuous mode [ 1039.949177][T26119] bpf_prog_test_run+0x3d5/0x620 [ 1039.949207][T26119] ? bpf_prog_query+0x230/0x230 [ 1039.965172][T26119] ? selinux_bpf+0xce/0xf0 [ 1039.967131][T26032] device veth1_macvtap entered promiscuous mode [ 1039.969705][T26119] ? security_bpf+0x82/0xa0 [ 1039.969736][T26119] __sys_bpf+0x52c/0x730 [ 1039.985234][T26119] ? bpf_link_show_fdinfo+0x310/0x310 [ 1039.989210][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1039.990833][T26119] ? debug_smp_processor_id+0x17/0x20 [ 1039.990863][T26119] __x64_sys_bpf+0x7c/0x90 [ 1039.990881][T26119] x64_sys_call+0x4b9/0x9a0 [ 1039.990898][T26119] do_syscall_64+0x4c/0xa0 [ 1039.990917][T26119] ? clear_bhb_loop+0x50/0xa0 [ 1039.990934][T26119] ? clear_bhb_loop+0x50/0xa0 [ 1040.016337][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1040.018303][T26119] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1040.026386][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1040.027765][T26119] RIP: 0033:0x7f6b5a2b4fc9 [ 1040.046803][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1040.049394][T26119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1040.049416][T26119] RSP: 002b:00007f6b58cfc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1040.057105][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1040.061825][T26119] RAX: ffffffffffffffda RBX: 00007f6b5a50c090 RCX: 00007f6b5a2b4fc9 [ 1040.061847][T26119] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 1040.061860][T26119] RBP: 00007f6b58cfc090 R08: 0000000000000000 R09: 0000000000000000 [ 1040.061873][T26119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1040.083240][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1040.091393][T26119] R13: 00007f6b5a50c128 R14: 00007f6b5a50c090 R15: 00007ffe759472a8 [ 1040.091426][T26119] [ 1040.163037][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1040.171285][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1040.181325][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1040.252700][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1040.300862][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1040.341433][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1040.392332][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1042.135487][T26133] device sit0 left promiscuous mode [ 1042.170565][T26134] device sit0 entered promiscuous mode [ 1042.346089][T26145] device sit0 left promiscuous mode [ 1042.436108][T26145] device sit0 entered promiscuous mode [ 1042.749904][T19003] device bridge_slave_1 left promiscuous mode [ 1042.759138][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1042.777019][T19003] device bridge_slave_0 left promiscuous mode [ 1042.797223][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1042.975903][T19003] device veth1_macvtap left promiscuous mode [ 1042.989212][T19003] device veth0_vlan left promiscuous mode [ 1043.788541][T26161] bridge0: port 1(bridge_slave_0) entered blocking state [ 1043.826722][T26161] bridge0: port 1(bridge_slave_0) entered disabled state [ 1043.887349][T26161] device bridge_slave_0 entered promiscuous mode [ 1044.048802][T26161] bridge0: port 2(bridge_slave_1) entered blocking state [ 1044.056831][T26161] bridge0: port 2(bridge_slave_1) entered disabled state [ 1044.064829][T26161] device bridge_slave_1 entered promiscuous mode [ 1044.074910][T26184] device sit0 left promiscuous mode [ 1044.132927][T26190] device sit0 entered promiscuous mode [ 1044.580257][T26200] FAULT_INJECTION: forcing a failure. [ 1044.580257][T26200] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1044.593614][T26200] CPU: 1 PID: 26200 Comm: syz.5.8911 Not tainted syzkaller #0 [ 1044.601210][T26200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1044.611648][T26200] Call Trace: [ 1044.614932][T26200] [ 1044.617969][T26200] __dump_stack+0x21/0x30 [ 1044.622554][T26200] dump_stack_lvl+0xee/0x150 [ 1044.627682][T26200] ? show_regs_print_info+0x20/0x20 [ 1044.633150][T26200] ? __kasan_check_write+0x14/0x20 [ 1044.638290][T26200] ? _raw_spin_lock_irq+0x8f/0xe0 [ 1044.643427][T26200] dump_stack+0x15/0x20 [ 1044.647706][T26200] should_fail+0x3c1/0x510 [ 1044.652565][T26200] should_fail_usercopy+0x1a/0x20 [ 1044.657896][T26200] copy_page_from_iter_atomic+0x3fb/0x1350 [ 1044.663949][T26200] ? pipe_zero+0x370/0x370 [ 1044.668628][T26200] generic_perform_write+0x307/0x670 [ 1044.673950][T26200] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1044.679800][T26200] ? file_remove_privs+0x590/0x590 [ 1044.685259][T26200] ? rwsem_write_trylock+0x130/0x300 [ 1044.690650][T26200] ? clear_nonspinnable+0x60/0x60 [ 1044.695765][T26200] ? avc_policy_seqno+0x1b/0x70 [ 1044.700620][T26200] __generic_file_write_iter+0x268/0x480 [ 1044.706258][T26200] generic_file_write_iter+0xa9/0x1d0 [ 1044.711633][T26200] vfs_write+0x802/0xf70 [ 1044.715878][T26200] ? file_end_write+0x1b0/0x1b0 [ 1044.720738][T26200] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1044.727798][T26200] ? __fget_files+0x2c4/0x320 [ 1044.733074][T26200] ? __fdget_pos+0x2d2/0x380 [ 1044.737761][T26200] ? ksys_write+0x71/0x240 [ 1044.742563][T26200] ksys_write+0x140/0x240 [ 1044.747053][T26200] ? __ia32_sys_read+0x90/0x90 [ 1044.751851][T26200] __x64_sys_write+0x7b/0x90 [ 1044.756534][T26200] x64_sys_call+0x8ef/0x9a0 [ 1044.761171][T26200] do_syscall_64+0x4c/0xa0 [ 1044.765601][T26200] ? clear_bhb_loop+0x50/0xa0 [ 1044.770378][T26200] ? clear_bhb_loop+0x50/0xa0 [ 1044.775060][T26200] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1044.781076][T26200] RIP: 0033:0x7f2eb6480fc9 [ 1044.785498][T26200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1044.805352][T26200] RSP: 002b:00007f2eb4ee9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1044.814037][T26200] RAX: ffffffffffffffda RBX: 00007f2eb66d7fa0 RCX: 00007f2eb6480fc9 [ 1044.822041][T26200] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000007 [ 1044.830227][T26200] RBP: 00007f2eb4ee9090 R08: 0000000000000000 R09: 0000000000000000 [ 1044.838310][T26200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1044.846605][T26200] R13: 00007f2eb66d8038 R14: 00007f2eb66d7fa0 R15: 00007ffe1e7df6c8 [ 1044.854686][T26200] [ 1045.362528][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1045.379825][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1045.387444][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1045.396517][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1045.406071][ T8268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.413185][ T8268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1045.518244][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1045.542036][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1045.551072][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1045.559846][ T8268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.567200][ T8268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1045.575460][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1045.584533][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1045.602561][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1045.660178][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1045.748826][T26217] device sit0 left promiscuous mode [ 1045.855424][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1045.885577][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1045.945336][T26161] device veth0_vlan entered promiscuous mode [ 1046.069949][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1046.086950][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1046.110390][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1046.122148][T26226] FAULT_INJECTION: forcing a failure. [ 1046.122148][T26226] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1046.140436][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1046.150579][T26161] device veth1_macvtap entered promiscuous mode [ 1046.227347][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1046.245434][T26226] CPU: 0 PID: 26226 Comm: syz.4.8918 Not tainted syzkaller #0 [ 1046.245764][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1046.252971][T26226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1046.252986][T26226] Call Trace: [ 1046.252993][T26226] [ 1046.253001][T26226] __dump_stack+0x21/0x30 [ 1046.253031][T26226] dump_stack_lvl+0xee/0x150 [ 1046.285947][T26226] ? show_regs_print_info+0x20/0x20 [ 1046.291176][T26226] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1046.297367][T26226] dump_stack+0x15/0x20 [ 1046.301561][T26226] should_fail+0x3c1/0x510 [ 1046.306093][T26226] should_fail_usercopy+0x1a/0x20 [ 1046.311144][T26226] _copy_from_user+0x20/0xd0 [ 1046.315797][T26226] generic_map_update_batch+0x4a3/0x740 [ 1046.321368][T26226] ? generic_map_delete_batch+0x510/0x510 [ 1046.322050][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1046.327263][T26226] ? __fdget+0x1a1/0x230 [ 1046.339084][T26226] ? generic_map_delete_batch+0x510/0x510 [ 1046.345020][T26226] bpf_map_do_batch+0x463/0x5f0 [ 1046.349997][T26226] __sys_bpf+0x5e3/0x730 [ 1046.354270][T26226] ? bpf_link_show_fdinfo+0x310/0x310 [ 1046.359659][T26226] ? debug_smp_processor_id+0x17/0x20 [ 1046.365035][T26226] __x64_sys_bpf+0x7c/0x90 [ 1046.369469][T26226] x64_sys_call+0x4b9/0x9a0 [ 1046.374066][T26226] do_syscall_64+0x4c/0xa0 [ 1046.378495][T26226] ? clear_bhb_loop+0x50/0xa0 [ 1046.383176][T26226] ? clear_bhb_loop+0x50/0xa0 [ 1046.387868][T26226] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1046.393767][T26226] RIP: 0033:0x7f6b5a2b4fc9 [ 1046.398190][T26226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1046.418085][T26226] RSP: 002b:00007f6b58d1d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1046.426510][T26226] RAX: ffffffffffffffda RBX: 00007f6b5a50bfa0 RCX: 00007f6b5a2b4fc9 [ 1046.434496][T26226] RDX: 0000000000000038 RSI: 0000200000000780 RDI: 000000000000001a [ 1046.442476][T26226] RBP: 00007f6b58d1d090 R08: 0000000000000000 R09: 0000000000000000 [ 1046.450535][T26226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1046.458868][T26226] R13: 00007f6b5a50c038 R14: 00007f6b5a50bfa0 R15: 00007ffe759472a8 [ 1046.467036][T26226] [ 1046.530688][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1046.539846][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1046.561726][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1046.571379][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1046.655321][T26229] device sit0 entered promiscuous mode [ 1047.023097][T26243] device syzkaller0 entered promiscuous mode [ 1047.291449][T19003] device bridge_slave_1 left promiscuous mode [ 1047.297636][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1047.305418][T19003] device bridge_slave_0 left promiscuous mode [ 1047.311666][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1047.320169][T19003] device veth1_macvtap left promiscuous mode [ 1047.326320][T19003] device veth0_vlan left promiscuous mode [ 1048.259352][T26264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1048.266612][T26264] bridge0: port 1(bridge_slave_0) entered disabled state [ 1048.431250][T26264] device bridge_slave_0 entered promiscuous mode [ 1048.721465][T26264] bridge0: port 2(bridge_slave_1) entered blocking state [ 1048.737757][T26264] bridge0: port 2(bridge_slave_1) entered disabled state [ 1048.762556][T26264] device bridge_slave_1 entered promiscuous mode [ 1049.967828][T26288] device sit0 left promiscuous mode [ 1049.986050][T26289] device sit0 entered promiscuous mode [ 1050.391821][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1050.417257][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1050.530125][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1050.561502][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1050.615613][ T397] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.622920][ T397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1050.659146][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1050.668052][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1050.676695][ T397] bridge0: port 2(bridge_slave_1) entered blocking state [ 1050.684260][ T397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1050.692613][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1050.945823][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1050.954731][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1051.146879][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1051.155168][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1051.281453][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1051.299362][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1051.316142][T26264] device veth0_vlan entered promiscuous mode [ 1051.330471][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1051.339513][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1051.363295][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1051.371664][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1051.382156][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1051.390734][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1051.404606][T26264] device veth1_macvtap entered promiscuous mode [ 1051.424422][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1051.433088][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1051.441736][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1051.463932][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1051.484755][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1051.508827][T19003] device bridge_slave_1 left promiscuous mode [ 1051.515363][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.523182][T19003] device bridge_slave_0 left promiscuous mode [ 1051.529525][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1051.537567][T19003] device veth1_macvtap left promiscuous mode [ 1051.543915][T19003] device veth0_vlan left promiscuous mode [ 1052.321652][T26312] FAULT_INJECTION: forcing a failure. [ 1052.321652][T26312] name failslab, interval 1, probability 0, space 0, times 0 [ 1052.336430][T26310] syz.3.8944[26310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1052.336548][T26310] syz.3.8944[26310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1052.349009][T26312] CPU: 0 PID: 26312 Comm: syz.4.8945 Not tainted syzkaller #0 [ 1052.368399][T26312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1052.378770][T26312] Call Trace: [ 1052.382257][T26312] [ 1052.385215][T26312] __dump_stack+0x21/0x30 [ 1052.389773][T26312] dump_stack_lvl+0xee/0x150 [ 1052.394406][T26312] ? show_regs_print_info+0x20/0x20 [ 1052.399637][T26312] dump_stack+0x15/0x20 [ 1052.403905][T26312] should_fail+0x3c1/0x510 [ 1052.408555][T26312] __should_failslab+0xa4/0xe0 [ 1052.413356][T26312] should_failslab+0x9/0x20 [ 1052.418167][T26312] slab_pre_alloc_hook+0x3b/0xe0 [ 1052.423330][T26312] ? __kernfs_new_node+0x99/0x680 [ 1052.428688][T26312] __kmalloc_track_caller+0x6c/0x2c0 [ 1052.434182][T26312] ? __kernfs_new_node+0x99/0x680 [ 1052.439233][T26312] kstrdup_const+0x55/0x90 [ 1052.443757][T26312] __kernfs_new_node+0x99/0x680 [ 1052.448635][T26312] ? stack_trace_save+0xe0/0xe0 [ 1052.453504][T26312] ? make_kgid+0x1aa/0x640 [ 1052.457940][T26312] ? kernfs_new_node+0x260/0x260 [ 1052.462896][T26312] ? from_kuid_munged+0x690/0x690 [ 1052.468108][T26312] ? net_ns_get_ownership+0xf8/0x180 [ 1052.473422][T26312] kernfs_new_node+0x150/0x260 [ 1052.478209][T26312] kernfs_create_dir_ns+0x47/0x130 [ 1052.483334][T26312] sysfs_create_dir_ns+0x11c/0x280 [ 1052.488590][T26312] ? sock_ioctl+0x64a/0x6b0 [ 1052.493170][T26312] ? sysfs_warn_dup+0xa0/0xa0 [ 1052.497888][T26312] ? _raw_spin_lock+0x8e/0xe0 [ 1052.502856][T26312] ? net_namespace+0xd/0x40 [ 1052.507455][T26312] kobject_add_internal+0x755/0xda0 [ 1052.512663][T26312] kobject_add+0x154/0x210 [ 1052.517088][T26312] ? mutex_unlock+0x89/0x220 [ 1052.521828][T26312] ? kobject_init+0x1d0/0x1d0 [ 1052.526563][T26312] ? __kasan_check_write+0x14/0x20 [ 1052.531783][T26312] ? get_device_parent+0x2a1/0x410 [ 1052.536993][T26312] device_add+0x3c1/0xed0 [ 1052.541555][T26312] netdev_register_kobject+0x179/0x320 [ 1052.547025][T26312] ? raw_notifier_call_chain+0xe9/0x100 [ 1052.552767][T26312] register_netdevice+0xdfa/0x13a0 [ 1052.557892][T26312] ? netif_stacked_transfer_operstate+0x220/0x220 [ 1052.564418][T26312] ? xdp_rxq_info_reg+0xf1/0x320 [ 1052.569458][T26312] ip6_tnl_create2+0xc2/0x360 [ 1052.574352][T26312] ip6_tnl_locate+0x60c/0x6f0 [ 1052.579086][T26312] ? cap_capable+0x1aa/0x230 [ 1052.583775][T26312] ? ip6_tnl_link_config+0x9c0/0x9c0 [ 1052.589252][T26312] ? memcpy+0x56/0x70 [ 1052.593586][T26312] ip6_tnl_siocdevprivate+0x692/0xe40 [ 1052.599070][T26312] ? ip6_tnl_start_xmit+0x1320/0x1320 [ 1052.604465][T26312] ? kstrtol_from_user+0x260/0x260 [ 1052.609601][T26312] ? full_name_hash+0xa0/0xf0 [ 1052.614401][T26312] dev_ifsioc+0xaf5/0xe70 [ 1052.618831][T26312] ? dev_ioctl+0xd10/0xd10 [ 1052.623275][T26312] ? __mutex_lock_slowpath+0xe/0x10 [ 1052.628482][T26312] ? mutex_lock+0x100/0x1a0 [ 1052.632994][T26312] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1052.639678][T26312] ? dev_get_by_name_rcu+0xc8/0xf0 [ 1052.644798][T26312] dev_ioctl+0x5fd/0xd10 [ 1052.649049][T26312] sock_ioctl+0x64a/0x6b0 [ 1052.653384][T26312] ? sock_poll+0x3d0/0x3d0 [ 1052.657805][T26312] ? security_file_ioctl+0x84/0xa0 [ 1052.662937][T26312] ? sock_poll+0x3d0/0x3d0 [ 1052.667893][T26312] __se_sys_ioctl+0x121/0x1a0 [ 1052.672755][T26312] __x64_sys_ioctl+0x7b/0x90 [ 1052.677377][T26312] x64_sys_call+0x2f/0x9a0 [ 1052.681802][T26312] do_syscall_64+0x4c/0xa0 [ 1052.686239][T26312] ? clear_bhb_loop+0x50/0xa0 [ 1052.691006][T26312] ? clear_bhb_loop+0x50/0xa0 [ 1052.695710][T26312] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1052.701610][T26312] RIP: 0033:0x7f6b5a2b4fc9 [ 1052.706032][T26312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1052.725793][T26312] RSP: 002b:00007f6b58d1d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1052.734432][T26312] RAX: ffffffffffffffda RBX: 00007f6b5a50bfa0 RCX: 00007f6b5a2b4fc9 [ 1052.742508][T26312] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 1052.750500][T26312] RBP: 00007f6b58d1d090 R08: 0000000000000000 R09: 0000000000000000 [ 1052.758494][T26312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1052.766486][T26312] R13: 00007f6b5a50c038 R14: 00007f6b5a50bfa0 R15: 00007ffe759472a8 [ 1052.774601][T26312] [ 1052.844873][T26312] kobject_add_internal failed for ip6tnl1 (error: -12 parent: net) [ 1053.197302][T26317] bridge0: port 1(bridge_slave_0) entered blocking state [ 1053.260110][T26336] FAULT_INJECTION: forcing a failure. [ 1053.260110][T26336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1053.273798][T26317] bridge0: port 1(bridge_slave_0) entered disabled state [ 1053.329793][T26317] device bridge_slave_0 entered promiscuous mode [ 1053.348245][T26334] device sit0 left promiscuous mode [ 1053.349393][T26336] CPU: 0 PID: 26336 Comm: syz.4.8949 Not tainted syzkaller #0 [ 1053.361455][T26336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1053.371615][T26336] Call Trace: [ 1053.374906][T26336] [ 1053.377849][T26336] __dump_stack+0x21/0x30 [ 1053.382220][T26336] dump_stack_lvl+0xee/0x150 [ 1053.386839][T26336] ? show_regs_print_info+0x20/0x20 [ 1053.392154][T26336] ? vfs_write+0xc17/0xf70 [ 1053.396603][T26336] dump_stack+0x15/0x20 [ 1053.400861][T26336] should_fail+0x3c1/0x510 [ 1053.405292][T26336] should_fail_usercopy+0x1a/0x20 [ 1053.410346][T26336] _copy_from_user+0x20/0xd0 [ 1053.414945][T26336] __sys_bpf+0x233/0x730 [ 1053.419351][T26336] ? bpf_link_show_fdinfo+0x310/0x310 [ 1053.425299][T26336] ? debug_smp_processor_id+0x17/0x20 [ 1053.430875][T26336] __x64_sys_bpf+0x7c/0x90 [ 1053.435369][T26336] x64_sys_call+0x4b9/0x9a0 [ 1053.440052][T26336] do_syscall_64+0x4c/0xa0 [ 1053.444588][T26336] ? clear_bhb_loop+0x50/0xa0 [ 1053.449364][T26336] ? clear_bhb_loop+0x50/0xa0 [ 1053.454079][T26336] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1053.459987][T26336] RIP: 0033:0x7f6b5a2b4fc9 [ 1053.464433][T26336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1053.484347][T26336] RSP: 002b:00007f6b58d1d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1053.492966][T26336] RAX: ffffffffffffffda RBX: 00007f6b5a50bfa0 RCX: 00007f6b5a2b4fc9 [ 1053.500944][T26336] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 1053.508921][T26336] RBP: 00007f6b58d1d090 R08: 0000000000000000 R09: 0000000000000000 [ 1053.517038][T26336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1053.525026][T26336] R13: 00007f6b5a50c038 R14: 00007f6b5a50bfa0 R15: 00007ffe759472a8 [ 1053.533022][T26336] [ 1053.638289][T26338] device sit0 entered promiscuous mode [ 1053.796898][T26317] bridge0: port 2(bridge_slave_1) entered blocking state [ 1053.804977][T26317] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.819656][T26317] device bridge_slave_1 entered promiscuous mode [ 1054.359737][T19003] device bridge_slave_1 left promiscuous mode [ 1054.365953][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1054.408195][T19003] device bridge_slave_0 left promiscuous mode [ 1054.467114][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.506396][T19003] device veth1_macvtap left promiscuous mode [ 1054.525697][T19003] device veth0_vlan left promiscuous mode [ 1055.206407][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1055.219511][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1055.270345][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1055.278776][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1055.345511][ T8268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1055.345535][T26374] FAULT_INJECTION: forcing a failure. [ 1055.345535][T26374] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1055.352625][ T8268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1055.353356][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1055.382812][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1055.383435][T26374] CPU: 0 PID: 26374 Comm: syz.0.8960 Not tainted syzkaller #0 [ 1055.391685][ T8268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1055.398294][T26374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1055.398308][T26374] Call Trace: [ 1055.398314][T26374] [ 1055.398322][T26374] __dump_stack+0x21/0x30 [ 1055.405403][ T8268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1055.415527][T26374] dump_stack_lvl+0xee/0x150 [ 1055.419720][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1055.421787][T26374] ? show_regs_print_info+0x20/0x20 [ 1055.426779][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1055.433462][T26374] ? stack_trace_save+0xe0/0xe0 [ 1055.433490][T26374] dump_stack+0x15/0x20 [ 1055.433511][T26374] should_fail+0x3c1/0x510 [ 1055.433533][T26374] should_fail_alloc_page+0x55/0x80 [ 1055.433554][T26374] prepare_alloc_pages+0x156/0x600 [ 1055.433577][T26374] ? __alloc_pages_bulk+0xab0/0xab0 [ 1055.433597][T26374] ? __kasan_slab_alloc+0xcf/0xf0 [ 1055.440100][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1055.446161][T26374] ? __kasan_slab_alloc+0xbd/0xf0 [ 1055.446190][T26374] ? slab_post_alloc_hook+0x4f/0x2b0 [ 1055.452409][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1055.459216][T26374] ? alloc_vmap_area+0x17a/0x1990 [ 1055.459247][T26374] __alloc_pages+0x10a/0x440 [ 1055.478258][T26317] device veth0_vlan entered promiscuous mode [ 1055.483523][T26374] ? prep_new_page+0x110/0x110 [ 1055.483555][T26374] ? _raw_spin_lock+0x8e/0xe0 [ 1055.499454][T26317] device veth1_macvtap entered promiscuous mode [ 1055.501762][T26374] ? _raw_spin_trylock_bh+0x130/0x130 [ 1055.556773][T26374] __get_free_pages+0x10/0x30 [ 1055.561504][T26374] kasan_populate_vmalloc_pte+0x29/0x120 [ 1055.567289][T26374] __apply_to_page_range+0x8cd/0xc70 [ 1055.572707][T26374] ? kasan_populate_vmalloc+0x70/0x70 [ 1055.578363][T26374] ? kasan_populate_vmalloc+0x70/0x70 [ 1055.583755][T26374] apply_to_page_range+0x3b/0x50 [ 1055.588788][T26374] kasan_populate_vmalloc+0x60/0x70 [ 1055.594004][T26374] alloc_vmap_area+0x185c/0x1990 [ 1055.599034][T26374] ? vm_map_ram+0xa70/0xa70 [ 1055.603634][T26374] ? kmem_cache_alloc_trace+0x119/0x270 [ 1055.609186][T26374] ? __get_vm_area_node+0x11d/0x350 [ 1055.614402][T26374] __get_vm_area_node+0x14e/0x350 [ 1055.619521][T26374] __vmalloc_node_range+0xdf/0xaf0 [ 1055.624835][T26374] ? reuseport_array_alloc+0xc7/0x160 [ 1055.630486][T26374] ? avc_has_perm+0x158/0x240 [ 1055.635168][T26374] ? security_capable+0x87/0xb0 [ 1055.640026][T26374] bpf_map_area_alloc+0xd5/0xe0 [ 1055.644879][T26374] ? reuseport_array_alloc+0xc7/0x160 [ 1055.650259][T26374] reuseport_array_alloc+0xc7/0x160 [ 1055.655592][T26374] map_create+0x455/0x21b0 [ 1055.660014][T26374] __sys_bpf+0x2cf/0x730 [ 1055.664434][T26374] ? bpf_link_show_fdinfo+0x310/0x310 [ 1055.669903][T26374] ? debug_smp_processor_id+0x17/0x20 [ 1055.675283][T26374] __x64_sys_bpf+0x7c/0x90 [ 1055.679703][T26374] x64_sys_call+0x4b9/0x9a0 [ 1055.684211][T26374] do_syscall_64+0x4c/0xa0 [ 1055.688634][T26374] ? clear_bhb_loop+0x50/0xa0 [ 1055.693311][T26374] ? clear_bhb_loop+0x50/0xa0 [ 1055.697998][T26374] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1055.703905][T26374] RIP: 0033:0x7f3c2e498fc9 [ 1055.708414][T26374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1055.728041][T26374] RSP: 002b:00007f3c2cf01038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1055.736700][T26374] RAX: ffffffffffffffda RBX: 00007f3c2e6effa0 RCX: 00007f3c2e498fc9 [ 1055.744685][T26374] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 1055.752709][T26374] RBP: 00007f3c2cf01090 R08: 0000000000000000 R09: 0000000000000000 [ 1055.760913][T26374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1055.768894][T26374] R13: 00007f3c2e6f0038 R14: 00007f3c2e6effa0 R15: 00007fff8d87b0c8 [ 1055.777165][T26374] [ 1055.848095][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1055.856206][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1055.877215][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1055.886254][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1055.894538][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1055.904116][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1055.913224][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1055.922121][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1055.930415][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1055.939481][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1055.948347][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1055.957618][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1055.967823][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1055.975843][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1056.202117][T26387] device sit0 entered promiscuous mode [ 1057.045354][T26396] bond_slave_1: mtu less than device minimum [ 1057.380262][T26407] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.387556][T26407] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.395518][T26407] device bridge_slave_0 entered promiscuous mode [ 1057.402880][T26407] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.415702][T26407] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.423811][T26407] device bridge_slave_1 entered promiscuous mode [ 1057.928269][T19003] device bridge_slave_1 left promiscuous mode [ 1057.935908][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.947780][T19003] device bridge_slave_0 left promiscuous mode [ 1057.962426][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.989599][T19003] device veth1_macvtap left promiscuous mode [ 1058.009074][T19003] device veth0_vlan left promiscuous mode [ 1058.250079][T26432] device sit0 left promiscuous mode [ 1058.354405][T26434] device sit0 entered promiscuous mode [ 1058.720436][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1058.733413][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1058.763469][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1058.805249][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1058.879227][ T8268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.886345][ T8268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1058.949461][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1058.979413][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1058.988057][ T8268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.995269][ T8268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.003865][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1059.056338][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1059.079840][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1059.088366][T26469] FAULT_INJECTION: forcing a failure. [ 1059.088366][T26469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1059.102880][T26469] CPU: 0 PID: 26469 Comm: syz.0.8988 Not tainted syzkaller #0 [ 1059.110490][T26469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1059.120867][T26469] Call Trace: [ 1059.124169][T26469] [ 1059.127344][T26469] __dump_stack+0x21/0x30 [ 1059.131793][T26469] dump_stack_lvl+0xee/0x150 [ 1059.136485][T26469] ? show_regs_print_info+0x20/0x20 [ 1059.141892][T26469] dump_stack+0x15/0x20 [ 1059.146123][T26469] should_fail+0x3c1/0x510 [ 1059.150826][T26469] should_fail_usercopy+0x1a/0x20 [ 1059.156215][T26469] _copy_to_user+0x20/0x90 [ 1059.160679][T26469] simple_read_from_buffer+0xe9/0x160 [ 1059.166262][T26469] proc_fail_nth_read+0x19a/0x210 [ 1059.171407][T26469] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1059.177078][T26469] ? security_file_permission+0x83/0xa0 [ 1059.182751][T26469] ? proc_fault_inject_write+0x2f0/0x2f0 [ 1059.188863][T26469] vfs_read+0x282/0xbe0 [ 1059.193220][T26469] ? kernel_read+0x1f0/0x1f0 [ 1059.198050][T26469] ? put_unused_fd+0x141/0x180 [ 1059.202937][T26469] ? __kasan_check_write+0x14/0x20 [ 1059.208078][T26469] ? mutex_lock+0x95/0x1a0 [ 1059.212616][T26469] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1059.219215][T26469] ? __fget_files+0x2c4/0x320 [ 1059.223997][T26469] ? __fdget_pos+0x2d2/0x380 [ 1059.228603][T26469] ? ksys_read+0x71/0x240 [ 1059.232966][T26469] ksys_read+0x140/0x240 [ 1059.237389][T26469] ? vfs_write+0xf70/0xf70 [ 1059.241841][T26469] ? debug_smp_processor_id+0x17/0x20 [ 1059.247305][T26469] __x64_sys_read+0x7b/0x90 [ 1059.251840][T26469] x64_sys_call+0x96d/0x9a0 [ 1059.256468][T26469] do_syscall_64+0x4c/0xa0 [ 1059.261253][T26469] ? clear_bhb_loop+0x50/0xa0 [ 1059.265939][T26469] ? clear_bhb_loop+0x50/0xa0 [ 1059.270731][T26469] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1059.276651][T26469] RIP: 0033:0x7f3c2e4979dc [ 1059.281078][T26469] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1059.301041][T26469] RSP: 002b:00007f3c2cf01030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1059.309462][T26469] RAX: ffffffffffffffda RBX: 00007f3c2e6effa0 RCX: 00007f3c2e4979dc [ 1059.317616][T26469] RDX: 000000000000000f RSI: 00007f3c2cf010a0 RDI: 0000000000000006 [ 1059.325680][T26469] RBP: 00007f3c2cf01090 R08: 0000000000000000 R09: 0000000000000000 [ 1059.333927][T26469] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1059.341911][T26469] R13: 00007f3c2e6f0038 R14: 00007f3c2e6effa0 R15: 00007fff8d87b0c8 [ 1059.350225][T26469] [ 1059.401619][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1059.439451][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1059.463080][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1059.489460][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1059.498179][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1059.506620][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1059.515215][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1059.523187][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1059.551098][T26407] device veth0_vlan entered promiscuous mode [ 1059.681081][T26407] device veth1_macvtap entered promiscuous mode [ 1059.719616][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1059.729461][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1059.738151][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1059.770246][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1059.779606][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1059.801621][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1059.846242][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1059.935085][T26477] device sit0 left promiscuous mode [ 1060.074867][T26481] device sit0 entered promiscuous mode [ 1060.800019][T26489] FAULT_INJECTION: forcing a failure. [ 1060.800019][T26489] name failslab, interval 1, probability 0, space 0, times 0 [ 1060.813091][T26489] CPU: 0 PID: 26489 Comm: syz.4.8996 Not tainted syzkaller #0 [ 1060.820600][T26489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1060.830718][T26489] Call Trace: [ 1060.834140][T26489] [ 1060.837187][T26489] __dump_stack+0x21/0x30 [ 1060.841706][T26489] dump_stack_lvl+0xee/0x150 [ 1060.846431][T26489] ? show_regs_print_info+0x20/0x20 [ 1060.851765][T26489] dump_stack+0x15/0x20 [ 1060.855971][T26489] should_fail+0x3c1/0x510 [ 1060.860522][T26489] __should_failslab+0xa4/0xe0 [ 1060.865328][T26489] should_failslab+0x9/0x20 [ 1060.869869][T26489] slab_pre_alloc_hook+0x3b/0xe0 [ 1060.875047][T26489] ? __build_skb+0x2d/0x310 [ 1060.879643][T26489] kmem_cache_alloc+0x44/0x260 [ 1060.884687][T26489] __build_skb+0x2d/0x310 [ 1060.889059][T26489] ? __kasan_check_write+0x14/0x20 [ 1060.894205][T26489] build_skb+0x24/0x200 [ 1060.898498][T26489] bpf_prog_test_run_skb+0x279/0x1150 [ 1060.903915][T26489] ? __kasan_check_write+0x14/0x20 [ 1060.909188][T26489] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 1060.915214][T26489] bpf_prog_test_run+0x3d5/0x620 [ 1060.920280][T26489] ? bpf_prog_query+0x230/0x230 [ 1060.925395][T26489] ? selinux_bpf+0xce/0xf0 [ 1060.930029][T26489] ? security_bpf+0x82/0xa0 [ 1060.934719][T26489] __sys_bpf+0x52c/0x730 [ 1060.939072][T26489] ? bpf_link_show_fdinfo+0x310/0x310 [ 1060.944569][T26489] ? debug_smp_processor_id+0x17/0x20 [ 1060.950046][T26489] __x64_sys_bpf+0x7c/0x90 [ 1060.954477][T26489] x64_sys_call+0x4b9/0x9a0 [ 1060.959035][T26489] do_syscall_64+0x4c/0xa0 [ 1060.963482][T26489] ? clear_bhb_loop+0x50/0xa0 [ 1060.968507][T26489] ? clear_bhb_loop+0x50/0xa0 [ 1060.973410][T26489] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1060.979462][T26489] RIP: 0033:0x7f6b5a2b4fc9 [ 1060.984099][T26489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1061.003894][T26489] RSP: 002b:00007f6b58d1d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1061.012322][T26489] RAX: ffffffffffffffda RBX: 00007f6b5a50bfa0 RCX: 00007f6b5a2b4fc9 [ 1061.020318][T26489] RDX: 0000000000000050 RSI: 0000200000000900 RDI: 000000000000000a [ 1061.028411][T26489] RBP: 00007f6b58d1d090 R08: 0000000000000000 R09: 0000000000000000 [ 1061.036512][T26489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1061.044594][T26489] R13: 00007f6b5a50c038 R14: 00007f6b5a50bfa0 R15: 00007ffe759472a8 [ 1061.052802][T26489] [ 1061.137958][T26494] bridge0: port 1(bridge_slave_0) entered blocking state [ 1061.145603][T26494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1061.154224][T26494] device bridge_slave_0 entered promiscuous mode [ 1061.161828][T26494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1061.169458][T26494] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.177213][T26494] device bridge_slave_1 entered promiscuous mode [ 1061.941616][T19003] device bridge_slave_1 left promiscuous mode [ 1061.948053][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.955867][T19003] device bridge_slave_0 left promiscuous mode [ 1061.962301][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1061.970792][T19003] device veth1_macvtap left promiscuous mode [ 1061.976882][T19003] device veth0_vlan left promiscuous mode [ 1062.212857][T26531] device sit0 left promiscuous mode [ 1062.225369][T26532] device sit0 entered promiscuous mode [ 1062.609572][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1062.617350][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1062.625628][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1062.634536][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1062.643170][ T8268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1062.650261][ T8268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1062.659295][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1062.667830][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1062.676480][ T8268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.683659][ T8268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1062.829727][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1062.838165][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1062.846517][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1062.854961][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1062.863410][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1063.225556][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1063.234577][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1063.394102][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1063.403137][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1063.511683][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1063.519679][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1063.527985][T26494] device veth0_vlan entered promiscuous mode [ 1063.693904][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1063.702738][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1063.713185][T26494] device veth1_macvtap entered promiscuous mode [ 1063.750912][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1063.759277][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1063.767724][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1063.777012][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1063.786597][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1064.819710][ T44] device bridge_slave_1 left promiscuous mode [ 1064.825873][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 1064.833542][ T44] device bridge_slave_0 left promiscuous mode [ 1064.839933][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.847821][ T44] device veth1_macvtap left promiscuous mode [ 1064.854073][ T44] device veth0_vlan left promiscuous mode [ 1065.063503][T26556] FAULT_INJECTION: forcing a failure. [ 1065.063503][T26556] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1065.081338][T26556] CPU: 0 PID: 26556 Comm: syz.5.9014 Not tainted syzkaller #0 [ 1065.088866][T26556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1065.099268][T26556] Call Trace: [ 1065.102614][T26556] [ 1065.105566][T26556] __dump_stack+0x21/0x30 [ 1065.109940][T26556] dump_stack_lvl+0xee/0x150 [ 1065.114560][T26556] ? show_regs_print_info+0x20/0x20 [ 1065.119804][T26556] ? vfs_write+0xc17/0xf70 [ 1065.124357][T26556] dump_stack+0x15/0x20 [ 1065.129155][T26556] should_fail+0x3c1/0x510 [ 1065.133615][T26556] should_fail_usercopy+0x1a/0x20 [ 1065.138752][T26556] _copy_from_user+0x20/0xd0 [ 1065.143441][T26556] __sys_bpf+0x233/0x730 [ 1065.147687][T26556] ? bpf_link_show_fdinfo+0x310/0x310 [ 1065.153267][T26556] ? debug_smp_processor_id+0x17/0x20 [ 1065.158731][T26556] __x64_sys_bpf+0x7c/0x90 [ 1065.163242][T26556] x64_sys_call+0x4b9/0x9a0 [ 1065.167756][T26556] do_syscall_64+0x4c/0xa0 [ 1065.172175][T26556] ? clear_bhb_loop+0x50/0xa0 [ 1065.176866][T26556] ? clear_bhb_loop+0x50/0xa0 [ 1065.181641][T26556] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1065.187654][T26556] RIP: 0033:0x7f2eb6480fc9 [ 1065.192099][T26556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1065.211990][T26556] RSP: 002b:00007f2eb4ee9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1065.220511][T26556] RAX: ffffffffffffffda RBX: 00007f2eb66d7fa0 RCX: 00007f2eb6480fc9 [ 1065.228577][T26556] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 1065.236662][T26556] RBP: 00007f2eb4ee9090 R08: 0000000000000000 R09: 0000000000000000 [ 1065.244749][T26556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1065.252729][T26556] R13: 00007f2eb66d8038 R14: 00007f2eb66d7fa0 R15: 00007ffe1e7df6c8 [ 1065.260725][T26556] [ 1065.300743][T26559] bridge0: port 1(bridge_slave_0) entered blocking state [ 1065.307905][T26559] bridge0: port 1(bridge_slave_0) entered disabled state [ 1065.315923][T26559] device bridge_slave_0 entered promiscuous mode [ 1065.323479][T26559] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.330899][T26559] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.338625][T26559] device bridge_slave_1 entered promiscuous mode [ 1065.447554][T26560] ªªªªªª: renamed from vlan0 [ 1065.462418][T26565] device sit0 left promiscuous mode [ 1065.617574][T26570] device sit0 entered promiscuous mode [ 1066.143689][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1066.152218][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1066.280740][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1066.309440][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1066.339147][T19003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.346382][T19003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1066.354264][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1066.658625][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1066.668021][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1066.676946][T19003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1066.684226][T19003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1066.692797][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1066.701539][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1066.764352][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1066.773158][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1066.915607][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1066.925411][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1066.938118][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1066.946184][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1067.027916][T26559] device veth0_vlan entered promiscuous mode [ 1067.037981][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1067.046180][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1067.061331][T26621] device sit0 left promiscuous mode [ 1067.110568][T26619] device sit0 entered promiscuous mode [ 1067.192219][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1067.204127][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1067.217915][T26559] device veth1_macvtap entered promiscuous mode [ 1067.303523][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1067.326937][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1067.345196][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1067.357024][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1067.386371][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1069.251604][ T44] device bridge_slave_1 left promiscuous mode [ 1069.257997][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 1069.276075][ T44] device bridge_slave_0 left promiscuous mode [ 1069.288843][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 1069.310673][ T44] device veth1_macvtap left promiscuous mode [ 1069.322008][ T44] device veth0_vlan left promiscuous mode [ 1069.690710][T26645] bridge0: port 1(bridge_slave_0) entered blocking state [ 1069.697901][T26645] bridge0: port 1(bridge_slave_0) entered disabled state [ 1069.802455][T26645] device bridge_slave_0 entered promiscuous mode [ 1069.946985][T26645] bridge0: port 2(bridge_slave_1) entered blocking state [ 1069.955028][T26645] bridge0: port 2(bridge_slave_1) entered disabled state [ 1069.963084][T26645] device bridge_slave_1 entered promiscuous mode [ 1070.665516][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1070.679531][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1070.697924][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1070.707233][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1070.787560][ T8268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.794780][ T8268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1070.829988][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1070.838922][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1070.860192][ T8268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1070.867411][ T8268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1070.982941][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1070.990808][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1070.999457][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1071.178580][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1071.222699][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1071.231730][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1071.239943][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1071.321391][T26645] device veth0_vlan entered promiscuous mode [ 1071.569591][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1071.598842][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1071.641009][T26645] device veth1_macvtap entered promiscuous mode [ 1071.703540][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1071.713598][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1071.723925][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1071.779116][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1071.797866][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1073.784054][T26745] bridge0: port 1(bridge_slave_0) entered blocking state [ 1073.839084][T26745] bridge0: port 1(bridge_slave_0) entered disabled state [ 1073.847323][T26745] device bridge_slave_0 entered promiscuous mode [ 1073.866528][T26745] bridge0: port 2(bridge_slave_1) entered blocking state [ 1073.922583][T26745] bridge0: port 2(bridge_slave_1) entered disabled state [ 1073.982000][T26745] device bridge_slave_1 entered promiscuous mode [ 1074.038833][ T44] device bridge_slave_1 left promiscuous mode [ 1074.049787][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 1074.131534][ T44] device bridge_slave_0 left promiscuous mode [ 1074.190228][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 1074.204247][ T44] device veth1_macvtap left promiscuous mode [ 1074.212740][ T44] device veth0_vlan left promiscuous mode [ 1075.460262][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1075.472986][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1075.503599][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1075.519331][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1075.528298][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 1075.535764][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1075.579857][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1075.588159][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1075.597158][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1075.614241][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 1075.621542][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1075.644479][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1075.659443][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1075.739041][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1075.747677][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1075.780514][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1075.789491][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1075.801926][T26745] device veth0_vlan entered promiscuous mode [ 1075.815139][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1075.829702][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1075.856292][T26745] device veth1_macvtap entered promiscuous mode [ 1075.905722][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1075.914845][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1075.932958][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1075.970065][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1076.004919][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1076.068411][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1076.107387][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1076.170221][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1076.213167][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1078.120960][T26858] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.128396][T26858] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.136017][T26858] device bridge_slave_0 entered promiscuous mode [ 1078.147183][T26858] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.256615][T26858] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.315586][T26858] device bridge_slave_1 entered promiscuous mode [ 1078.490488][ T44] device bridge_slave_1 left promiscuous mode [ 1078.496777][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.521622][ T44] device bridge_slave_0 left promiscuous mode [ 1078.528179][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.541941][ T44] device veth1_macvtap left promiscuous mode [ 1078.548147][ T44] device veth0_vlan left promiscuous mode [ 1079.280986][T26901] device sit0 left promiscuous mode [ 1079.397286][T26905] device sit0 entered promiscuous mode [ 1080.008734][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1080.019325][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1080.082551][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1080.099572][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1080.109295][ T8268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1080.116536][ T8268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1080.159747][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1080.179562][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1080.188203][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1080.196994][ T8268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1080.204201][ T8268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1080.295776][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1080.339274][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1080.418621][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1080.479637][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1080.527492][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1080.600829][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1080.737840][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1080.769771][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1080.780431][T26858] device veth0_vlan entered promiscuous mode [ 1080.829556][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1080.850027][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1080.867342][T26858] device veth1_macvtap entered promiscuous mode [ 1080.893892][T26939] device sit0 left promiscuous mode [ 1081.000646][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1081.017890][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1081.026555][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1081.068832][T26941] device sit0 entered promiscuous mode [ 1081.195345][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1081.204881][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1081.213906][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1081.222785][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1082.460558][ T44] device bridge_slave_1 left promiscuous mode [ 1082.466850][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 1082.474787][ T44] device bridge_slave_0 left promiscuous mode [ 1082.481150][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 1082.489691][ T44] device veth1_macvtap left promiscuous mode [ 1082.495728][ T44] device veth0_vlan left promiscuous mode [ 1083.319615][T26971] device sit0 left promiscuous mode [ 1083.457380][T26983] device sit0 entered promiscuous mode [ 1083.617566][T26966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1083.629015][T26966] bridge0: port 1(bridge_slave_0) entered disabled state [ 1083.644691][T26966] device bridge_slave_0 entered promiscuous mode [ 1083.706292][T26966] bridge0: port 2(bridge_slave_1) entered blocking state [ 1083.713515][T26966] bridge0: port 2(bridge_slave_1) entered disabled state [ 1083.721328][T26966] device bridge_slave_1 entered promiscuous mode [ 1084.657055][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1084.669371][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1084.788218][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1084.809724][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1084.839452][T26683] bridge0: port 1(bridge_slave_0) entered blocking state [ 1084.846800][T26683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1084.990638][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1084.998674][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1085.007486][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1085.016367][T26683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1085.023491][T26683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1085.031843][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1085.040327][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1085.257260][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1085.278289][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1085.477799][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1085.486378][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1085.604349][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1085.613207][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1085.622639][T26966] device veth0_vlan entered promiscuous mode [ 1085.708558][T26966] device veth1_macvtap entered promiscuous mode [ 1085.760307][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1085.774073][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1085.789968][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1085.798316][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1085.806936][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1085.815429][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1085.824964][T26683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1087.260628][ T44] device bridge_slave_1 left promiscuous mode [ 1087.267027][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.274717][ T44] device bridge_slave_0 left promiscuous mode [ 1087.281035][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 1087.289137][ T44] device veth1_macvtap left promiscuous mode [ 1087.295212][ T44] device veth0_vlan left promiscuous mode [ 1087.743535][T27023] device sit0 left promiscuous mode [ 1087.935500][T27028] device sit0 entered promiscuous mode [ 1088.252972][T27016] bridge0: port 1(bridge_slave_0) entered blocking state [ 1088.260563][T27016] bridge0: port 1(bridge_slave_0) entered disabled state [ 1088.268114][T27016] device bridge_slave_0 entered promiscuous mode [ 1088.375786][T27016] bridge0: port 2(bridge_slave_1) entered blocking state [ 1088.383199][T27016] bridge0: port 2(bridge_slave_1) entered disabled state [ 1088.390748][T27016] device bridge_slave_1 entered promiscuous mode [ 1089.616904][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1089.625484][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1089.866454][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1089.875093][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1089.883449][ T8268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1089.890909][ T8268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1089.898705][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1089.907769][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1089.916497][ T8268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1089.923759][ T8268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1089.931518][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1090.181624][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1090.209838][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1090.302691][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1090.311061][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1090.446518][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1090.455799][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1090.476297][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1090.484840][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1090.493146][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1090.501023][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1090.519824][T27077] device pim6reg1 entered promiscuous mode [ 1090.669958][T27016] device veth0_vlan entered promiscuous mode [ 1090.683299][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1090.692173][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1090.702716][T27016] device veth1_macvtap entered promiscuous mode [ 1090.723090][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1090.731446][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1090.740553][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1090.750366][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1090.759568][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1092.179809][ T44] device bridge_slave_1 left promiscuous mode [ 1092.185972][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 1092.193720][ T44] device bridge_slave_0 left promiscuous mode [ 1092.200167][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 1092.208180][ T44] device veth1_macvtap left promiscuous mode [ 1092.214523][ T44] device veth0_vlan left promiscuous mode [ 1093.201412][T27121] device pim6reg1 entered promiscuous mode [ 1093.247006][T27123] FAULT_INJECTION: forcing a failure. [ 1093.247006][T27123] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.262513][T27123] CPU: 1 PID: 27123 Comm: syz.4.9183 Not tainted syzkaller #0 [ 1093.270511][T27123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1093.280925][T27123] Call Trace: [ 1093.284409][T27123] [ 1093.287453][T27123] __dump_stack+0x21/0x30 [ 1093.292125][T27123] dump_stack_lvl+0xee/0x150 [ 1093.296745][T27123] ? show_regs_print_info+0x20/0x20 [ 1093.302133][T27123] dump_stack+0x15/0x20 [ 1093.306510][T27123] should_fail+0x3c1/0x510 [ 1093.310962][T27123] __should_failslab+0xa4/0xe0 [ 1093.315849][T27123] should_failslab+0x9/0x20 [ 1093.320459][T27123] slab_pre_alloc_hook+0x3b/0xe0 [ 1093.325497][T27123] ? __kernfs_new_node+0x99/0x680 [ 1093.330663][T27123] __kmalloc_track_caller+0x6c/0x2c0 [ 1093.336087][T27123] ? __kernfs_new_node+0x99/0x680 [ 1093.341125][T27123] kstrdup_const+0x55/0x90 [ 1093.345556][T27123] __kernfs_new_node+0x99/0x680 [ 1093.350586][T27123] ? stack_trace_save+0xe0/0xe0 [ 1093.355701][T27123] ? make_kgid+0x1aa/0x640 [ 1093.360123][T27123] ? kernfs_new_node+0x260/0x260 [ 1093.365188][T27123] ? from_kuid_munged+0x690/0x690 [ 1093.370428][T27123] ? net_ns_get_ownership+0xf8/0x180 [ 1093.375729][T27123] kernfs_new_node+0x150/0x260 [ 1093.380715][T27123] kernfs_create_dir_ns+0x47/0x130 [ 1093.385847][T27123] sysfs_create_dir_ns+0x11c/0x280 [ 1093.391179][T27123] ? dev_ioctl+0x5fd/0xd10 [ 1093.395732][T27123] ? sysfs_warn_dup+0xa0/0xa0 [ 1093.400427][T27123] ? _raw_spin_lock+0x8e/0xe0 [ 1093.405205][T27123] ? net_namespace+0xd/0x40 [ 1093.409715][T27123] kobject_add_internal+0x755/0xda0 [ 1093.415083][T27123] kobject_add+0x154/0x210 [ 1093.419793][T27123] ? mutex_unlock+0x89/0x220 [ 1093.424498][T27123] ? kobject_init+0x1d0/0x1d0 [ 1093.429371][T27123] ? __kasan_check_write+0x14/0x20 [ 1093.434858][T27123] ? get_device_parent+0x2a1/0x410 [ 1093.440027][T27123] device_add+0x3c1/0xed0 [ 1093.444458][T27123] netdev_register_kobject+0x179/0x320 [ 1093.450230][T27123] ? raw_notifier_call_chain+0xe9/0x100 [ 1093.456017][T27123] register_netdevice+0xdfa/0x13a0 [ 1093.461286][T27123] ? netif_stacked_transfer_operstate+0x220/0x220 [ 1093.467798][T27123] ? memcpy+0x56/0x70 [ 1093.471790][T27123] __ip_tunnel_create+0x2bf/0x380 [ 1093.476830][T27123] ? ip_tunnel_init_net+0x740/0x740 [ 1093.482347][T27123] ? security_capable+0x87/0xb0 [ 1093.487215][T27123] ? ns_capable+0x8c/0xf0 [ 1093.491651][T27123] ip_tunnel_ctl+0xaf2/0x1970 [ 1093.496519][T27123] ipip_tunnel_ctl+0x145/0x1c0 [ 1093.501292][T27123] ip_tunnel_siocdevprivate+0x119/0x1c0 [ 1093.506873][T27123] ? ip_tunnel_update+0xca0/0xca0 [ 1093.511950][T27123] ? full_name_hash+0xa0/0xf0 [ 1093.516727][T27123] dev_ifsioc+0xaf5/0xe70 [ 1093.521069][T27123] ? dev_ioctl+0xd10/0xd10 [ 1093.525493][T27123] ? __mutex_lock_slowpath+0xe/0x10 [ 1093.530709][T27123] ? mutex_lock+0x100/0x1a0 [ 1093.535318][T27123] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1093.541913][T27123] ? dev_get_by_name_rcu+0xc8/0xf0 [ 1093.547169][T27123] dev_ioctl+0x5fd/0xd10 [ 1093.551432][T27123] sock_ioctl+0x64a/0x6b0 [ 1093.555862][T27123] ? sock_poll+0x3d0/0x3d0 [ 1093.560370][T27123] ? security_file_ioctl+0x84/0xa0 [ 1093.565577][T27123] ? sock_poll+0x3d0/0x3d0 [ 1093.570102][T27123] __se_sys_ioctl+0x121/0x1a0 [ 1093.574882][T27123] __x64_sys_ioctl+0x7b/0x90 [ 1093.579822][T27123] x64_sys_call+0x2f/0x9a0 [ 1093.584264][T27123] do_syscall_64+0x4c/0xa0 [ 1093.588808][T27123] ? clear_bhb_loop+0x50/0xa0 [ 1093.593719][T27123] ? clear_bhb_loop+0x50/0xa0 [ 1093.598527][T27123] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1093.604474][T27123] RIP: 0033:0x7f6b5a2b4fc9 [ 1093.608923][T27123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1093.628997][T27123] RSP: 002b:00007f6b58d1d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1093.637740][T27123] RAX: ffffffffffffffda RBX: 00007f6b5a50bfa0 RCX: 00007f6b5a2b4fc9 [ 1093.645730][T27123] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000009 [ 1093.653717][T27123] RBP: 00007f6b58d1d090 R08: 0000000000000000 R09: 0000000000000000 [ 1093.661888][T27123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1093.670140][T27123] R13: 00007f6b5a50c038 R14: 00007f6b5a50bfa0 R15: 00007ffe759472a8 [ 1093.678236][T27123] [ 1093.689612][T27123] kobject_add_internal failed for ipip0 (error: -12 parent: net) [ 1093.702140][T27125] device sit0 left promiscuous mode [ 1093.766639][T27125] device sit0 entered promiscuous mode [ 1093.939368][T27111] bridge0: port 1(bridge_slave_0) entered blocking state [ 1093.947011][T27111] bridge0: port 1(bridge_slave_0) entered disabled state [ 1093.955064][T27111] device bridge_slave_0 entered promiscuous mode [ 1094.045197][T27111] bridge0: port 2(bridge_slave_1) entered blocking state [ 1094.083146][T27111] bridge0: port 2(bridge_slave_1) entered disabled state [ 1094.137982][T27111] device bridge_slave_1 entered promiscuous mode [ 1095.162766][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1095.213019][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1095.279115][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1095.310966][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1095.329631][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.336813][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1095.368232][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1095.404835][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1095.414911][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.422141][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1095.432806][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1095.442113][T27170] device pim6reg1 entered promiscuous mode [ 1095.531900][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1095.552108][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1095.573450][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1095.603381][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1095.621247][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1095.637256][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1095.676370][T27111] device veth0_vlan entered promiscuous mode [ 1095.685369][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1095.696482][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1095.705383][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1095.713679][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1095.738676][T27111] device veth1_macvtap entered promiscuous mode [ 1095.748917][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1095.757841][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1095.766644][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1095.816836][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1095.849654][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1095.913695][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1095.942560][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1098.096819][T27215] FAULT_INJECTION: forcing a failure. [ 1098.096819][T27215] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.110392][T27215] CPU: 1 PID: 27215 Comm: syz.4.9213 Not tainted syzkaller #0 [ 1098.117984][T27215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1098.128671][T27215] Call Trace: [ 1098.132325][T27215] [ 1098.135368][T27215] __dump_stack+0x21/0x30 [ 1098.139744][T27215] dump_stack_lvl+0xee/0x150 [ 1098.144408][T27215] ? show_regs_print_info+0x20/0x20 [ 1098.149640][T27215] dump_stack+0x15/0x20 [ 1098.153818][T27215] should_fail+0x3c1/0x510 [ 1098.158437][T27215] __should_failslab+0xa4/0xe0 [ 1098.163582][T27215] should_failslab+0x9/0x20 [ 1098.168218][T27215] slab_pre_alloc_hook+0x3b/0xe0 [ 1098.173310][T27215] kmem_cache_alloc_trace+0x48/0x270 [ 1098.178735][T27215] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 1098.184502][T27215] selinux_sk_alloc_security+0x7e/0x1a0 [ 1098.190881][T27215] security_sk_alloc+0x72/0xa0 [ 1098.195703][T27215] sk_prot_alloc+0x108/0x320 [ 1098.200327][T27215] sk_alloc+0x38/0x430 [ 1098.204407][T27215] bpf_prog_test_run_skb+0x24b/0x1150 [ 1098.209905][T27215] ? __kasan_check_write+0x14/0x20 [ 1098.215045][T27215] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 1098.221302][T27215] bpf_prog_test_run+0x3d5/0x620 [ 1098.226358][T27215] ? bpf_prog_query+0x230/0x230 [ 1098.231329][T27215] ? selinux_bpf+0xce/0xf0 [ 1098.235784][T27215] ? security_bpf+0x82/0xa0 [ 1098.240308][T27215] __sys_bpf+0x52c/0x730 [ 1098.244560][T27215] ? bpf_link_show_fdinfo+0x310/0x310 [ 1098.250114][T27215] ? debug_smp_processor_id+0x17/0x20 [ 1098.255490][T27215] __x64_sys_bpf+0x7c/0x90 [ 1098.260097][T27215] x64_sys_call+0x4b9/0x9a0 [ 1098.264709][T27215] do_syscall_64+0x4c/0xa0 [ 1098.269128][T27215] ? clear_bhb_loop+0x50/0xa0 [ 1098.273802][T27215] ? clear_bhb_loop+0x50/0xa0 [ 1098.278483][T27215] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1098.284378][T27215] RIP: 0033:0x7f6b5a2b4fc9 [ 1098.288835][T27215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1098.308782][T27215] RSP: 002b:00007f6b58d1d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1098.317558][T27215] RAX: ffffffffffffffda RBX: 00007f6b5a50bfa0 RCX: 00007f6b5a2b4fc9 [ 1098.325629][T27215] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 1098.333607][T27215] RBP: 00007f6b58d1d090 R08: 0000000000000000 R09: 0000000000000000 [ 1098.341689][T27215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.350187][T27215] R13: 00007f6b5a50c038 R14: 00007f6b5a50bfa0 R15: 00007ffe759472a8 [ 1098.358776][T27215] [ 1098.370520][T26683] device bridge_slave_1 left promiscuous mode [ 1098.376714][T26683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1098.393327][T26683] device bridge_slave_0 left promiscuous mode [ 1098.404971][T26683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1098.447240][T26683] device veth1_macvtap left promiscuous mode [ 1098.528718][T26683] device veth0_vlan left promiscuous mode [ 1098.952660][T27233] device pim6reg1 entered promiscuous mode [ 1099.133807][T27219] bridge0: port 1(bridge_slave_0) entered blocking state [ 1099.140985][T27219] bridge0: port 1(bridge_slave_0) entered disabled state [ 1099.148867][T27219] device bridge_slave_0 entered promiscuous mode [ 1099.164523][T27219] bridge0: port 2(bridge_slave_1) entered blocking state [ 1099.172688][T27219] bridge0: port 2(bridge_slave_1) entered disabled state [ 1099.181262][T27219] device bridge_slave_1 entered promiscuous mode [ 1100.612219][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1100.632525][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1100.724319][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1100.749327][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1100.789409][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.796582][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1100.864730][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1100.899474][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1100.939287][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1100.959128][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.966257][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1100.999594][T27289] device veth1_macvtap left promiscuous mode [ 1101.101483][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1101.128322][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1101.140495][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1101.182748][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1101.191785][T27290] device veth1_macvtap entered promiscuous mode [ 1101.198764][T27290] device macsec0 entered promiscuous mode [ 1101.227167][T27219] device veth0_vlan entered promiscuous mode [ 1101.254845][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1101.279704][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1101.333703][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1101.369434][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1101.377983][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1101.386415][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1101.394465][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1101.408653][T27300] device pim6reg1 entered promiscuous mode [ 1101.496751][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1101.529787][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1101.633706][T27219] device veth1_macvtap entered promiscuous mode [ 1101.752021][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1101.819744][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1101.881598][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1102.047738][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1102.060294][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1102.506587][T27337] device sit0 left promiscuous mode [ 1102.710620][T27340] device sit0 entered promiscuous mode [ 1103.720623][T26683] device bridge_slave_1 left promiscuous mode [ 1103.727509][T26683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1103.735370][T26683] device bridge_slave_0 left promiscuous mode [ 1103.741804][T26683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1103.750152][T26683] device veth1_macvtap left promiscuous mode [ 1103.756212][T26683] device veth0_vlan left promiscuous mode [ 1104.552815][T27363] device sit0 left promiscuous mode [ 1104.718526][T27368] device sit0 left promiscuous mode [ 1104.824591][T27372] device sit0 entered promiscuous mode [ 1104.963431][T27373] device sit0 entered promiscuous mode [ 1105.204748][T27358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1105.212073][T27358] bridge0: port 1(bridge_slave_0) entered disabled state [ 1105.220011][T27358] device bridge_slave_0 entered promiscuous mode [ 1105.227370][T27358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1105.239121][T27358] bridge0: port 2(bridge_slave_1) entered disabled state [ 1105.266029][T27358] device bridge_slave_1 entered promiscuous mode [ 1105.759148][T27405] device sit0 left promiscuous mode [ 1105.963817][T27419] device syzkaller0 entered promiscuous mode [ 1106.658634][T27421] device sit0 entered promiscuous mode [ 1106.723920][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1106.743054][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1106.807787][T27428] device sit0 left promiscuous mode [ 1106.842363][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1106.856519][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1106.873196][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 1106.880404][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1106.908349][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1106.999375][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1107.079612][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 1107.086890][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1107.141181][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1107.170634][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1107.225743][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1107.249529][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1107.278210][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1107.316467][T27358] device veth0_vlan entered promiscuous mode [ 1107.352381][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1107.380221][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1107.409536][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1107.447148][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1107.474312][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1107.483409][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1107.561870][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1107.576893][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1107.596098][T27358] device veth1_macvtap entered promiscuous mode [ 1107.608356][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1107.617799][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1107.640904][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1107.660499][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1109.140042][T26683] device bridge_slave_1 left promiscuous mode [ 1109.146669][T26683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1109.154467][T26683] device bridge_slave_0 left promiscuous mode [ 1109.161532][T26683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1109.169890][T26683] device veth1_macvtap left promiscuous mode [ 1109.176414][T26683] device veth0_vlan left promiscuous mode [ 1109.941219][T27463] device sit0 left promiscuous mode [ 1110.166633][T27469] device sit0 entered promiscuous mode [ 1110.447826][T27481] FAULT_INJECTION: forcing a failure. [ 1110.447826][T27481] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1110.519279][T27481] CPU: 0 PID: 27481 Comm: syz.0.9287 Not tainted syzkaller #0 [ 1110.526909][T27481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1110.537008][T27481] Call Trace: [ 1110.540604][T27481] [ 1110.543558][T27481] __dump_stack+0x21/0x30 [ 1110.548023][T27481] dump_stack_lvl+0xee/0x150 [ 1110.552741][T27481] ? show_regs_print_info+0x20/0x20 [ 1110.557975][T27481] ? migrate_enable+0x192/0x260 [ 1110.562841][T27481] ? migrate_disable+0x180/0x180 [ 1110.567798][T27481] dump_stack+0x15/0x20 [ 1110.572081][T27481] should_fail+0x3c1/0x510 [ 1110.576628][T27481] should_fail_usercopy+0x1a/0x20 [ 1110.582052][T27481] _copy_from_user+0x20/0xd0 [ 1110.586862][T27481] generic_map_update_batch+0x44f/0x740 [ 1110.592616][T27481] ? generic_map_delete_batch+0x510/0x510 [ 1110.598733][T27481] ? __fdget+0x1a1/0x230 [ 1110.603175][T27481] ? generic_map_delete_batch+0x510/0x510 [ 1110.608921][T27481] bpf_map_do_batch+0x463/0x5f0 [ 1110.613979][T27481] __sys_bpf+0x5e3/0x730 [ 1110.618251][T27481] ? bpf_link_show_fdinfo+0x310/0x310 [ 1110.624378][T27481] ? debug_smp_processor_id+0x17/0x20 [ 1110.629885][T27481] __x64_sys_bpf+0x7c/0x90 [ 1110.634515][T27481] x64_sys_call+0x4b9/0x9a0 [ 1110.639071][T27481] do_syscall_64+0x4c/0xa0 [ 1110.643527][T27481] ? clear_bhb_loop+0x50/0xa0 [ 1110.648336][T27481] ? clear_bhb_loop+0x50/0xa0 [ 1110.653035][T27481] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1110.658952][T27481] RIP: 0033:0x7f3c2e498fc9 [ 1110.663589][T27481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1110.683397][T27481] RSP: 002b:00007f3c2cf01038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1110.692004][T27481] RAX: ffffffffffffffda RBX: 00007f3c2e6effa0 RCX: 00007f3c2e498fc9 [ 1110.700102][T27481] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 1110.708202][T27481] RBP: 00007f3c2cf01090 R08: 0000000000000000 R09: 0000000000000000 [ 1110.716647][T27481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1110.724762][T27481] R13: 00007f3c2e6f0038 R14: 00007f3c2e6effa0 R15: 00007fff8d87b0c8 [ 1110.733127][T27481] [ 1110.883807][T27470] bridge0: port 1(bridge_slave_0) entered blocking state [ 1110.891675][T27470] bridge0: port 1(bridge_slave_0) entered disabled state [ 1110.899619][T27470] device bridge_slave_0 entered promiscuous mode [ 1110.913360][T27470] bridge0: port 2(bridge_slave_1) entered blocking state [ 1110.930759][T27470] bridge0: port 2(bridge_slave_1) entered disabled state [ 1110.985154][T27470] device bridge_slave_1 entered promiscuous mode [ 1112.318633][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1112.330717][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1112.429339][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1112.448177][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1112.464390][T19003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1112.471513][T19003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1112.499177][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1112.508053][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1112.516926][T19003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1112.524398][T19003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1112.532321][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1112.620123][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1112.631175][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1112.650011][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1112.658528][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1112.667140][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1112.676335][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1112.740241][T27470] device veth0_vlan entered promiscuous mode [ 1112.749296][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1112.770858][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1112.779089][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1112.786804][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1112.835140][T27470] device veth1_macvtap entered promiscuous mode [ 1112.857652][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1112.889491][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1112.929295][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1112.959494][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1112.980723][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1112.989486][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1112.997777][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1114.579830][ T8268] device bridge_slave_1 left promiscuous mode [ 1114.586256][ T8268] bridge0: port 2(bridge_slave_1) entered disabled state [ 1114.594157][ T8268] device bridge_slave_0 left promiscuous mode [ 1114.600716][ T8268] bridge0: port 1(bridge_slave_0) entered disabled state [ 1114.609560][ T8268] device veth1_macvtap left promiscuous mode [ 1114.615675][ T8268] device veth0_vlan left promiscuous mode [ 1115.130801][T27521] device sit0 entered promiscuous mode [ 1115.461094][T27531] bridge0: port 1(bridge_slave_0) entered blocking state [ 1115.468342][T27531] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.572066][T27531] device bridge_slave_0 entered promiscuous mode [ 1115.648106][T27531] bridge0: port 2(bridge_slave_1) entered blocking state [ 1115.673566][T27531] bridge0: port 2(bridge_slave_1) entered disabled state [ 1115.699591][T27531] device bridge_slave_1 entered promiscuous mode [ 1115.856735][T27561] FAULT_INJECTION: forcing a failure. [ 1115.856735][T27561] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1115.873002][T27561] CPU: 0 PID: 27561 Comm: syz.0.9311 Not tainted syzkaller #0 [ 1115.880714][T27561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1115.891013][T27561] Call Trace: [ 1115.894346][T27561] [ 1115.897436][T27561] __dump_stack+0x21/0x30 [ 1115.901939][T27561] dump_stack_lvl+0xee/0x150 [ 1115.906594][T27561] ? show_regs_print_info+0x20/0x20 [ 1115.912037][T27561] ? __schedule+0xb76/0x14c0 [ 1115.916895][T27561] dump_stack+0x15/0x20 [ 1115.921111][T27561] should_fail+0x3c1/0x510 [ 1115.925557][T27561] should_fail_alloc_page+0x55/0x80 [ 1115.931375][T27561] prepare_alloc_pages+0x156/0x600 [ 1115.936778][T27561] ? __alloc_pages_bulk+0xab0/0xab0 [ 1115.942087][T27561] __alloc_pages+0x10a/0x440 [ 1115.946859][T27561] ? prep_new_page+0x110/0x110 [ 1115.951661][T27561] ? _raw_spin_lock+0x8e/0xe0 [ 1115.956385][T27561] ? _raw_spin_trylock_bh+0x130/0x130 [ 1115.961797][T27561] __get_free_pages+0x10/0x30 [ 1115.966686][T27561] kasan_populate_vmalloc_pte+0x29/0x120 [ 1115.972431][T27561] __apply_to_page_range+0x8cd/0xc70 [ 1115.977801][T27561] ? kasan_populate_vmalloc+0x70/0x70 [ 1115.983199][T27561] ? kasan_populate_vmalloc+0x70/0x70 [ 1115.988774][T27561] apply_to_page_range+0x3b/0x50 [ 1115.993823][T27561] kasan_populate_vmalloc+0x60/0x70 [ 1115.999032][T27561] alloc_vmap_area+0x185c/0x1990 [ 1116.003982][T27561] ? vm_map_ram+0xa70/0xa70 [ 1116.008490][T27561] ? kmem_cache_alloc_trace+0x119/0x270 [ 1116.014044][T27561] ? __get_vm_area_node+0x11d/0x350 [ 1116.019250][T27561] __get_vm_area_node+0x14e/0x350 [ 1116.024275][T27561] ? selinux_capset+0xf0/0xf0 [ 1116.028971][T27561] __vmalloc_node_range+0xdf/0xaf0 [ 1116.034438][T27561] ? array_map_alloc+0x27c/0x6d0 [ 1116.039388][T27561] ? security_capable+0x87/0xb0 [ 1116.044550][T27561] bpf_map_area_alloc+0xd5/0xe0 [ 1116.049502][T27561] ? array_map_alloc+0x27c/0x6d0 [ 1116.054470][T27561] array_map_alloc+0x27c/0x6d0 [ 1116.059343][T27561] ? memset+0x35/0x40 [ 1116.063403][T27561] prog_array_map_alloc+0x14c/0x1f0 [ 1116.068795][T27561] map_create+0x455/0x21b0 [ 1116.073307][T27561] __sys_bpf+0x2cf/0x730 [ 1116.077642][T27561] ? bpf_link_show_fdinfo+0x310/0x310 [ 1116.083025][T27561] __x64_sys_bpf+0x7c/0x90 [ 1116.087515][T27561] x64_sys_call+0x4b9/0x9a0 [ 1116.092023][T27561] do_syscall_64+0x4c/0xa0 [ 1116.096543][T27561] ? clear_bhb_loop+0x50/0xa0 [ 1116.101224][T27561] ? clear_bhb_loop+0x50/0xa0 [ 1116.106029][T27561] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1116.111931][T27561] RIP: 0033:0x7f3c2e498fc9 [ 1116.116472][T27561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1116.136363][T27561] RSP: 002b:00007f3c2cf01038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1116.144817][T27561] RAX: ffffffffffffffda RBX: 00007f3c2e6effa0 RCX: 00007f3c2e498fc9 [ 1116.153330][T27561] RDX: 0000000000000050 RSI: 00002000000027c0 RDI: 0000000000000000 [ 1116.161485][T27561] RBP: 00007f3c2cf01090 R08: 0000000000000000 R09: 0000000000000000 [ 1116.169812][T27561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1116.177902][T27561] R13: 00007f3c2e6f0038 R14: 00007f3c2e6effa0 R15: 00007fff8d87b0c8 [ 1116.186320][T27561] [ 1116.411810][T27570] device sit0 left promiscuous mode [ 1116.595133][T27573] device sit0 entered promiscuous mode [ 1116.994073][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1117.003276][T19003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1117.077637][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1117.087163][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1117.095756][ T397] bridge0: port 1(bridge_slave_0) entered blocking state [ 1117.102959][ T397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1117.111273][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1117.120458][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1117.129292][ T397] bridge0: port 2(bridge_slave_1) entered blocking state [ 1117.136503][ T397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1117.203162][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1117.211000][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1117.219108][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1117.326111][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1117.340075][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1117.388329][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1117.397015][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1117.407712][T27531] device veth0_vlan entered promiscuous mode [ 1117.416898][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1117.425238][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1117.446105][T27531] device veth1_macvtap entered promiscuous mode [ 1117.495091][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1117.523923][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1117.595065][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1117.663023][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1117.690750][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1117.788591][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1117.829494][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1119.620310][ T8268] device bridge_slave_1 left promiscuous mode [ 1119.626500][ T8268] bridge0: port 2(bridge_slave_1) entered disabled state [ 1119.634340][ T8268] device bridge_slave_0 left promiscuous mode [ 1119.640633][ T8268] bridge0: port 1(bridge_slave_0) entered disabled state [ 1119.650055][ T8268] device veth1_macvtap left promiscuous mode [ 1119.656383][ T8268] device veth0_vlan left promiscuous mode [ 1120.494720][T27627] device sit0 left promiscuous mode [ 1120.629533][T27631] device sit0 entered promiscuous mode [ 1120.901299][T27634] bridge0: port 1(bridge_slave_0) entered blocking state [ 1120.908865][T27634] bridge0: port 1(bridge_slave_0) entered disabled state [ 1120.916999][T27634] device bridge_slave_0 entered promiscuous mode [ 1120.924883][T27634] bridge0: port 2(bridge_slave_1) entered blocking state [ 1120.932968][T27634] bridge0: port 2(bridge_slave_1) entered disabled state [ 1120.941019][T27634] device bridge_slave_1 entered promiscuous mode [ 1121.378441][T27634] bridge0: port 2(bridge_slave_1) entered blocking state [ 1121.385658][T27634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1121.393114][T27634] bridge0: port 1(bridge_slave_0) entered blocking state [ 1121.400392][T27634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1121.462826][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1121.480085][ T8268] bridge0: port 1(bridge_slave_0) entered disabled state [ 1121.487605][ T8268] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.535781][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1121.589613][ T8268] bridge0: port 1(bridge_slave_0) entered blocking state [ 1121.596762][ T8268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1121.659396][ T8268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1121.699275][ T8268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1121.706373][ T8268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1121.800711][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1121.833649][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1121.883698][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1122.043583][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1122.053495][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1122.119134][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1122.131699][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1122.149721][T27634] device veth0_vlan entered promiscuous mode [ 1122.168711][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1122.177854][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1122.248788][T27697] device sit0 left promiscuous mode [ 1122.416901][T27634] device veth1_macvtap entered promiscuous mode [ 1122.423947][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1122.432655][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1122.441150][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1122.451518][T27699] device sit0 entered promiscuous mode [ 1122.788468][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1122.799367][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1122.894526][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1122.916389][ T397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=8819 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 1123.169011][ T30] audit: type=1400 audit(1761030228.133:159): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[316]" dev="pipefs" ino=316 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1124.450137][T19003] device bridge_slave_1 left promiscuous mode [ 1124.456496][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1124.464737][T19003] device bridge_slave_0 left promiscuous mode [ 1124.471337][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1124.480035][T19003] device veth1_macvtap left promiscuous mode [ 1124.486084][T19003] device veth0_vlan left promiscuous mode [ 1126.779918][T19003] device bridge_slave_1 left promiscuous mode [ 1126.786096][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1126.794179][T19003] device bridge_slave_0 left promiscuous mode [ 1126.800661][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1126.809259][T19003] device bridge_slave_1 left promiscuous mode [ 1126.815430][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1126.823318][T19003] device bridge_slave_0 left promiscuous mode [ 1126.829663][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1126.838277][T19003] device veth1_macvtap left promiscuous mode [ 1126.844910][T19003] device veth1_macvtap left promiscuous mode [ 1128.860217][T19003] device bridge_slave_1 left promiscuous mode [ 1128.866714][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1128.874640][T19003] device bridge_slave_0 left promiscuous mode [ 1128.880957][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1128.889495][T19003] device bridge_slave_1 left promiscuous mode [ 1128.895790][T19003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1128.903969][T19003] device bridge_slave_0 left promiscuous mode [ 1128.911281][T19003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1128.920336][T19003] device veth1_macvtap left promiscuous mode [ 1128.926583][T19003] device veth1_macvtap left promiscuous mode