last executing test programs: 7.698323798s ago: executing program 3 (id=2104): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="1800"/13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000002085000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r1}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="2d63707561636374202b64657669636573206d56d08240f50551499dc1387928526ec436e872e2ef9daa646c24851f6f5ad29b48c69a338415f38a905d605c5a8e1feffda281aa85d444e1bf40d253f4a5cc0117cadd5036d79af6d0003b40ba0d1172844d3551a285dac0c153311bb49fff03753b512768f910287235ed10ad64aef5fc2edc6f9ed6d639846df411f053f301f6ac14b9d3c4fe407eb8d330bdb39d3a67a0ab8af3f54fc3ca733a33fb1030beebc7f2a1f67276b350626de246f2b6ff30415da51d047b12b0fb9bd78963e51d4d46d4c467d9d3665b4882281f5e3cd38bf6ab7b58bda26f5b6e4172be5ba250c4a67ab284bf3e76422c58ad5595d740cd2a8eab46708756e8e0a51e9f7948e700bb260a6ab0b1754832f910b9df5f1a70f0cc92bdb566e0643e6c57de6cfa04398a354ab039a9b59c5e5daa97"], 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x5, 0x6, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ufshcd_uic_command\x00', 0xffffffffffffffff, 0x0, 0x5}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) 7.507550633s ago: executing program 3 (id=2105): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000000006af46cfb828cefa18d30369398a000000000"], 0x0, 0x2}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00'}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r3, 0x4) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="180200000000040000000000000000008500000041000000950000000000000062293f449cde632706d6160bf85b8b9d96e5143a57df2c8276ecdad12dcf4ee1f519b7d3150780706223a72beaa3f97558629ca633"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) 7.393460612s ago: executing program 1 (id=2106): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000000006af46cfb828cefa18d30369398a000000000"], 0x0, 0x2}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00'}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r3, 0x4) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="180200000000040000000000000000008500000041000000950000000000000062293f449cde632706d6160bf85b8b9d96e5143a57df2c8276ecdad12dcf4ee1f519b7d3150780706223a72beaa3f97558629ca633"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) 6.584134568s ago: executing program 3 (id=2112): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000000006af46cfb828cefa18d30369398a000000000"], 0x0, 0x2}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00'}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r3, 0x4) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="180200000000040000000000000000008500000041000000950000000000000062293f449cde632706d6160bf85b8b9d96e5143a57df2c8276ecdad12dcf4ee1f519b7d3150780706223a72beaa3f97558629ca633"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) 6.446931779s ago: executing program 1 (id=2113): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0xffff0000, 0x40f, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], 0x0, 0xdc, &(0x7f0000000200)=[{}, {}], 0x10, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x7e, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @ptr={0x0, 0x0, 0x0, 0x4}, @func={0x4, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x10001, '\x00', r5, r6, 0x2, 0x1, 0x2}, 0x50) close(r3) recvmsg$unix(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180)=r7, 0x17e) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r8}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021040000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00'], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r9}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x18) 5.507152365s ago: executing program 1 (id=2117): unlink(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) close(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085", @ANYRESOCT=0x0, @ANYRESDEC=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r8, 0x0, 0x0) close(r6) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r6, 0x40047451, &(0x7f0000000180)) 5.268242944s ago: executing program 3 (id=2118): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x28650, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x10, 0x0, &(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRESDEC=r1, @ANYRESDEC=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x80}, 0x103100, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}) close(r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x400001, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r9, 0x8982, 0x20000500) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4.902402224s ago: executing program 1 (id=2121): bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x7b, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0xe, 0x0, 0x0, 0xe, 0x2, 0x1}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}]}}, &(0x7f0000000900)=""/102, 0x36, 0x66, 0x1, 0x1, 0x10000}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x6f4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000600), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0xfffffffffffffefc, 0x0, 0xbe, 0x10, 0xfe, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x80, 0x0, 0x2, 0x10000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xd, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x2f, &(0x7f0000000500)="b958945d8ae49c4f19be14f06558", 0x0, 0x1cb0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000009c0)='ns/cgroup\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x1a, &(0x7f0000000580), &(0x7f00000006c0)=""/110, 0x80000000, 0x0, 0xb5, 0xe, &(0x7f0000000740)="ceb00cad9665d008c4d4f248549415945fa1691db2cad1c76b79d7cccc6407bd02a222349f68078f9aae3155f5efc2673c3679f62280a3f0a38d7a0aba9057f36ccd47e56925359ef97b3180943d07191957252a41f196ba48fe88ae1600ec23acb0467c3792a70c102c89232211bd4af6503a3ca85c9d41f48eaca51a3b1b8e1cee26d7788363ea417692a6cfc6caa6904fb0406d3c33f212d394aba23670025cd4a0a7db45d4fff3994f4947d80564b3c44879fd", &(0x7f00000003c0)="08de42d5f077223d885153c9cffd", 0x1, 0x0, 0x2}, 0x50) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000600)={'syz_tun\x00', 0xc00}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061121c00000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000702e7c13e2a6b49d4a6a89461f36e79c97f93177f8a46ed4656d5f6121ae90805ea2fa7ad932fc69d1d25f033f61b27af81f662dd414694651ad2a43d67d72c7590549681507ad37c41dc003765acfccb2055361b5504abfc5564978388b95f16abe1c1d995eece135e47f91e1f52ab9", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="024000000500"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0xf, 0x4, 0x4, 0x10004, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) 4.006846566s ago: executing program 0 (id=2126): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x4e6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa102000000000007010000f8ffffffb7020000b70300000000000000009500"/81], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000600)='cpu\t<0t&\t\xa0$\\\xc5\x1cM\x8aI\xe4\x04\x06\x8a{\xc1\xefo[a\x81!\x1c\xba\x067n{U\xacE\xf7\xa2\xfc\x8c\xf8\r\xf8\x81D\xbc\xe4\x19\x84\xb1.\x9beK\xba\x0f\xf1\xd0\x97@e\xa3v\x90*\x04%,\xba\xfa/\x91Ek\x811\xfb\xad\f\x92mqi\xad1\x87U\x05\x00\xa1\\\xa6\x15\xdfc\x1eP\xa5\a\xb5~\xfa\x9b\xeb\xd9\x82\x9c\xcc\xa7\xd9O\"(\xb6$\xbdn!\xa82\b\xaf\xc6zz\xbe\xf9\xff\x88\b\xe2%\xbd\x17`\xb9`_\xa3)y\xdf\x00\x00\xf0\xff\xff\xff\xff\xffX\xe8\xe9\xcb\x1c\x16\x10\xd1\xf9C\x1b\xc8\x9a<\ame\xde\x15\x86`\xfaw\x19\xaa\x14 \x03\x89\x9aPg\xcc8_+gU\xc6\x95\x1c\xbf\xa4\xcboa5\xcd\xe0\x96\xd4p\x01R\xd4\xb1eR\xd0\x87\xe2\x87,E\xc3\xbe\xd5\xe7\xbb_ym\tr\xd6\xb0\x11E\x9b\bZB\x1f\xb4u\x0e\x10\x9e8\xb0O\xaas~\xc8\x02\a\xc0\x9b\xe9\x8cX\x91\xa3\x86)\x14\xd3\xf7\x06c\x01\x8e,Oh%\xf1@Gn\xa8\xfd\x16\x16d\x98\x9d\xe3\xb2\xff\x1dV?\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00w\x1cv\x1e') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpcgss_update_slack\x00'}, 0x18) write$cgroup_subtree(r6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x3) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r11, &(0x7f00000001c0)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f00000004c0)="2762fa7ef7e0c286827b16d252e0b6c55f8291f179d309b83c007ac4f62952137333d382a57404353c75e74f0e3785ee827c22c833e74fcdac26c4337a17f017d7a858c4e325", 0x46}, {&(0x7f0000000540)="b2293fce34050af6bf7ef4ce24b5e37eb19486387608555d0885d13d2443d759340dbb91ecdd2f4806b591a3c2d96d62764278b5f529120bc808e9e60c531564597d788a887e3bec6189fb721ec3c07f057f9609d21ea06ed5037eb552770a0348b1100346a8be3ac9dd8c4732f8a59b19219286ed6400e8d7337922736c10aaf5b8b6614ecd1e2e86ccea2f98b56fc731a7617df9023a", 0x97}, {&(0x7f0000000780)="3b630590a6aa1e1f736969500d33a523245dc272e5bbd6d7bdc772bdc6d31eadbbb42180a631dbe73b17804686479157f7f32e60889cec248b21ea021ba6e05d318389ea", 0x44}, {&(0x7f00000009c0)="fd3f98449cb511e0c4a4eee6ae849fe6ab1edb1dadc05c1e5009e967c86de9673fff11ba8511075df3115c25cdc7d8cc80e422db8cdfb29f88a87da7f13dac4a13132d05ab57492ac91272f43f466a00c5c8f136431ea2b0c62ef2b8b99944a740a2b4bdf1ade5e2b48f", 0x6a}], 0x4, &(0x7f0000000600)}, 0x40004) 3.82800759s ago: executing program 1 (id=2127): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x4e6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa102000000000007010000f8ffffffb7020000b70300000000000000009500"/81], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000600)='cpu\t<0t&\t\xa0$\\\xc5\x1cM\x8aI\xe4\x04\x06\x8a{\xc1\xefo[a\x81!\x1c\xba\x067n{U\xacE\xf7\xa2\xfc\x8c\xf8\r\xf8\x81D\xbc\xe4\x19\x84\xb1.\x9beK\xba\x0f\xf1\xd0\x97@e\xa3v\x90*\x04%,\xba\xfa/\x91Ek\x811\xfb\xad\f\x92mqi\xad1\x87U\x05\x00\xa1\\\xa6\x15\xdfc\x1eP\xa5\a\xb5~\xfa\x9b\xeb\xd9\x82\x9c\xcc\xa7\xd9O\"(\xb6$\xbdn!\xa82\b\xaf\xc6zz\xbe\xf9\xff\x88\b\xe2%\xbd\x17`\xb9`_\xa3)y\xdf\x00\x00\xf0\xff\xff\xff\xff\xffX\xe8\xe9\xcb\x1c\x16\x10\xd1\xf9C\x1b\xc8\x9a<\ame\xde\x15\x86`\xfaw\x19\xaa\x14 \x03\x89\x9aPg\xcc8_+gU\xc6\x95\x1c\xbf\xa4\xcboa5\xcd\xe0\x96\xd4p\x01R\xd4\xb1eR\xd0\x87\xe2\x87,E\xc3\xbe\xd5\xe7\xbb_ym\tr\xd6\xb0\x11E\x9b\bZB\x1f\xb4u\x0e\x10\x9e8\xb0O\xaas~\xc8\x02\a\xc0\x9b\xe9\x8cX\x91\xa3\x86)\x14\xd3\xf7\x06c\x01\x8e,Oh%\xf1@Gn\xa8\xfd\x16\x16d\x98\x9d\xe3\xb2\xff\x1dV?\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00w\x1cv\x1e') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpcgss_update_slack\x00'}, 0x18) write$cgroup_subtree(r6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, 0x0, 0x3) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r11, &(0x7f00000001c0)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f00000004c0)="2762fa7ef7e0c286827b16d252e0b6c55f8291f179d309b83c007ac4f62952137333d382a57404353c75e74f0e3785ee827c22c833e74fcdac26c4337a17f017d7a858c4e325", 0x46}, {&(0x7f0000000540)="b2293fce34050af6bf7ef4ce24b5e37eb19486387608555d0885d13d2443d759340dbb91ecdd2f4806b591a3c2d96d62764278b5f529120bc808e9e60c531564597d788a887e3bec6189fb721ec3c07f057f9609d21ea06ed5037eb552770a0348b1100346a8be3ac9dd8c4732f8a59b19219286ed6400e8d7337922736c10aaf5b8b6614ecd1e2e86ccea2f98b56fc731a7617df9023a", 0x97}, {&(0x7f0000000780)="3b630590a6aa1e1f736969500d33a523245dc272e5bbd6d7bdc772bdc6d31eadbbb42180a631dbe73b17804686479157f7f32e60889cec248b21ea021ba6e05d318389ea", 0x44}, {&(0x7f00000009c0)="fd3f98449cb511e0c4a4eee6ae849fe6ab1edb1dadc05c1e5009e967c86de9673fff11ba8511075df3115c25cdc7d8cc80e422db8cdfb29f88a87da7f13dac4a13132d05ab57492ac91272f43f466a00c5c8f136431ea2b0c62ef2b8b99944a740a2b4bdf1ade5e2b48f", 0x6a}], 0x4, &(0x7f0000000600)}, 0x40004) 3.58631661s ago: executing program 0 (id=2138): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000000000000000000000000000447097420fbb5b6113bee7c2becfb243a3b53045f044ccc7b3aad31650628c3b585e187f1e2ac85290da8dab4c060000004afd1bd1c6fb8fa70160a9c477c69358fac1203472e830e94a1f4375f8c041ef", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x10, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0x9e}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000ac0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000300)={0x8, 0x0}, 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r1}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB, @ANYRESOCT=r2, @ANYRES32=r0, @ANYBLOB="80e77abec7849ff3e66c32035bf62e350f165860f3c22f155dc7cffe65d82cdc87396fc021141d8974822e7511e09b8adface65e0a4249138a5fb0ce273c920032671237d254d252c0", @ANYRESDEC=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r5, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r4, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x56, &(0x7f0000000780)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x1000000, 0x0, 0x0, 0x0, 0xac, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00'], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r11, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x12, 0x5, 0x3, 0x0, 0x80, r5, 0x0, '\x00', 0x0, r5, 0x5, 0x2, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r13}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xff00, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x8, 0xe, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd65b}, [@jmp={0x5, 0x1, 0xa, 0x1, 0x5, 0x70}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x22, '\x00', r7, @fallback=0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x2, 0x0, 0x8}, 0x10, r8, r6, 0x5, &(0x7f0000000a00)=[r5, r12], &(0x7f0000000b80)=[{0x4, 0x2, 0x0, 0xb}, {0x4, 0x4, 0xc}, {0x3, 0x2, 0x7, 0x1}, {0x5, 0x1, 0x7, 0x4}, {0x1, 0x3, 0xf, 0xa}], 0x10, 0x2}, 0x94) 3.523652585s ago: executing program 1 (id=2129): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000200000085000000b600000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa38}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a8500000005000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546000677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77674e802a0d42bc6099ad238af770b5ed8925161729298700000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809b5b9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed3957f813567f7a95435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac559eaf39027ceb379a902d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff7a1ef3282830689da6b53b263339863297771429d120000003341bf4abacac94500fca0493cf29b33dcc9ffffffffffffffd39f6ce0c6ff01589646efd1cf870cd7bb2366fdf870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1293b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd000c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301fb997316dbf17866fb84d4173731efe895ff2e1c55ef08235a0126e01254c44060926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a861887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7ad333545794f37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea139376f24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff070000001e48418046c216c1f895778cb25122a2a998de0842a486721737390cbf3a74cb2003016f1514216bdf57d2a40dddb51ab63e96ec84ac3571f02f647b3385b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df986741517abf11389b751f4e109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da230ed05a8fe64680b0a3f9f2dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b9100000000a55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa18854693ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab848753203b458b97ec1afb079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7db3c4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378ac2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6ca0400966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030108000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bffef97dcecc467ace456597685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 3.414426994s ago: executing program 2 (id=2130): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0700000004000000800000000e00000028000000", @ANYRES32, @ANYBLOB="0000002000000000fcffffff00", @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) socketpair(0x1e, 0x80005, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000180)='./file0\x00', 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r4}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781", @ANYRES8], 0xfdef) write$cgroup_int(r3, &(0x7f0000000200)=0x1, 0x12) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30008054}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) 3.163693234s ago: executing program 4 (id=2131): unlink(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) close(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085", @ANYRESOCT=0x0, @ANYRESDEC=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r8, 0x0, 0x0) close(r6) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r6, 0x40047451, &(0x7f0000000180)) 3.113045238s ago: executing program 2 (id=2132): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000007000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000540), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@ifindex, r3, 0x7, 0x2010, 0x0, @value=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0xd926}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @random="e5db029ea53c"}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x5, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x6}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.698234942s ago: executing program 0 (id=2133): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x4e6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa102000000000007010000f8ffffffb7020000b7"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000600)='cpu\t<0t&\t\xa0$\\\xc5\x1cM\x8aI\xe4\x04\x06\x8a{\xc1\xefo[a\x81!\x1c\xba\x067n{U\xacE\xf7\xa2\xfc\x8c\xf8\r\xf8\x81D\xbc\xe4\x19\x84\xb1.\x9beK\xba\x0f\xf1\xd0\x97@e\xa3v\x90*\x04%,\xba\xfa/\x91Ek\x811\xfb\xad\f\x92mqi\xad1\x87U\x05\x00\xa1\\\xa6\x15\xdfc\x1eP\xa5\a\xb5~\xfa\x9b\xeb\xd9\x82\x9c\xcc\xa7\xd9O\"(\xb6$\xbdn!\xa82\b\xaf\xc6zz\xbe\xf9\xff\x88\b\xe2%\xbd\x17`\xb9`_\xa3)y\xdf\x00\x00\xf0\xff\xff\xff\xff\xffX\xe8\xe9\xcb\x1c\x16\x10\xd1\xf9C\x1b\xc8\x9a<\ame\xde\x15\x86`\xfaw\x19\xaa\x14 \x03\x89\x9aPg\xcc8_+gU\xc6\x95\x1c\xbf\xa4\xcboa5\xcd\xe0\x96\xd4p\x01R\xd4\xb1eR\xd0\x87\xe2\x87,E\xc3\xbe\xd5\xe7\xbb_ym\tr\xd6\xb0\x11E\x9b\bZB\x1f\xb4u\x0e\x10\x9e8\xb0O\xaas~\xc8\x02\a\xc0\x9b\xe9\x8cX\x91\xa3\x86)\x14\xd3\xf7\x06c\x01\x8e,Oh%\xf1@Gn\xa8\xfd\x16\x16d\x98\x9d\xe3\xb2\xff\x1dV?\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00w\x1cv\x1e') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpcgss_update_slack\x00'}, 0x18) write$cgroup_subtree(r6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r11, &(0x7f00000001c0)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f00000004c0)="2762fa7ef7e0c286827b16d252e0b6c55f8291f179d309b83c007ac4f62952137333d382a57404353c75e74f0e3785ee827c22c833e74fcdac26c4337a17f017d7a858c4e325", 0x46}, {&(0x7f0000000540)="b2293fce34050af6bf7ef4ce24b5e37eb19486387608555d0885d13d2443d759340dbb91ecdd2f4806b591a3c2d96d62764278b5f529120bc808e9e60c531564597d788a887e3bec6189fb721ec3c07f057f9609d21ea06ed5037eb552770a0348b1100346a8be3ac9dd8c4732f8a59b19219286ed6400e8d7337922736c10aaf5b8b6614ecd1e2e86ccea2f98b56fc731a7617df9023a", 0x97}, {&(0x7f0000000780)="3b630590a6aa1e1f736969500d33a523245dc272e5bbd6d7bdc772bdc6d31eadbbb42180a631dbe73b17804686479157f7f32e60889cec248b21ea021ba6e05d318389ea", 0x44}, {&(0x7f00000009c0)="fd3f98449cb511e0c4a4eee6ae849fe6ab1edb1dadc05c1e5009e967c86de9673fff11ba8511075df3115c25cdc7d8cc80e422db8cdfb29f88a87da7f13dac4a13132d05ab57492ac91272f43f466a00c5c8f136431ea2b0c62ef2b8b99944a740a2b4bdf1ade5e2b48f", 0x6a}], 0x4, &(0x7f0000000600)}, 0x40004) 2.459264301s ago: executing program 2 (id=2134): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000000000000000000000000000447097420fbb5b6113bee7c2becfb243a3b53045f044ccc7b3aad31650628c3b585e187f1e2ac85290da8dab4c060000004afd1bd1c6fb8fa70160a9c477c69358fac1203472e830e94a1f4375f8c041ef", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x10, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0x9e}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000ac0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000300)={0x8, 0x0}, 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r1}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB, @ANYRESOCT=r2, @ANYRES32=r0, @ANYBLOB="80e77abec7849ff3e66c32035bf62e350f165860f3c22f155dc7cffe65d82cdc87396fc021141d8974822e7511e09b8adface65e0a4249138a5fb0ce273c920032671237d254d252c0", @ANYRESDEC=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r5, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r4, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x56, &(0x7f0000000780)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x1000000, 0x0, 0x0, 0x0, 0xac, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00'], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x12, 0x5, 0x3, 0x0, 0x80, r5, 0x0, '\x00', 0x0, r5, 0x5, 0x2, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xff00, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@ifindex=r7, 0x1f, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0]}, 0x40) 2.389626757s ago: executing program 4 (id=2135): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000050000006a0a00fe00000000850000000a000000b70000000000000095000000000000009cc6b3fcd62c7d376238975d43a4505f80fc88943c4f0cf08e467b592f868ee30a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa3b1d4e984c46ea7e2a447a36f5662403e1b2be4cc7c2683908a0d411a9872061ce618117c56f0979bd10b97163c953ab1abda4589e9cbe8d0d26b5069f8a98f7dc8f76b74635fc9f9de9ca3c00cb9bf4e418d07fa22f0610a70f2bdf4000000000000b0c2940dd8e263aa743f7555193161f45346d2014006000000e1ffff8816326d7d35c32aac1c7d5b5be399f6609876b5887437a172751151b633fbc02a74067529194e533583412dff048f0000000000000000b2728a04816cfb851cd364ff19ffcafe3e64be033c9d2f002cc93c1c13ceec04a347383420336bec88c24a9fb6a6991ddb737d527d6acb15426415b6e8b14fdfa2c6e94bd0339454c13ad30000000000170022626165866c156a25148972700000b515a1000000000000000eb2e9c15b6c8f6198282d0000000000c2ccf3f69cfcf1e15ea7a9e57aee78e12a2caebaada42811754e19a7e9b531636794a718b4766d2c7c61c3dba128c7fcd1f97989ccf1d55de496eae46c590c2d0225f9cd07005ac7f76d9d560a08c9fd0caafd9d095cb9db0099014cd0d4df62af52b088b01adeadc4c5225a6cd8486b03f83805dffe90dbf7ad042012b7213a2b03e3b1634ddfc9d6f570c4990fbbc7306871d9a52a157fb1a10fa2868df06faf83a8420e9ce62567043ce7e56d1ebe81"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0xffff0000, 0x40f, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0], 0x0, 0xdc, &(0x7f0000000200)=[{}, {}], 0x10, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x7e, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @ptr={0x0, 0x0, 0x0, 0x4}, @func={0x4, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x10001, '\x00', r5, r6, 0x2, 0x1, 0x2}, 0x50) close(r3) recvmsg$unix(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180)=r7, 0x17e) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r8}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021040000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00'], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r9}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x18) 1.808129954s ago: executing program 0 (id=2136): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x4e6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa102000000000007010000f8ffffffb7020000b7030000000000000000950000000000"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000600)='cpu\t<0t&\t\xa0$\\\xc5\x1cM\x8aI\xe4\x04\x06\x8a{\xc1\xefo[a\x81!\x1c\xba\x067n{U\xacE\xf7\xa2\xfc\x8c\xf8\r\xf8\x81D\xbc\xe4\x19\x84\xb1.\x9beK\xba\x0f\xf1\xd0\x97@e\xa3v\x90*\x04%,\xba\xfa/\x91Ek\x811\xfb\xad\f\x92mqi\xad1\x87U\x05\x00\xa1\\\xa6\x15\xdfc\x1eP\xa5\a\xb5~\xfa\x9b\xeb\xd9\x82\x9c\xcc\xa7\xd9O\"(\xb6$\xbdn!\xa82\b\xaf\xc6zz\xbe\xf9\xff\x88\b\xe2%\xbd\x17`\xb9`_\xa3)y\xdf\x00\x00\xf0\xff\xff\xff\xff\xffX\xe8\xe9\xcb\x1c\x16\x10\xd1\xf9C\x1b\xc8\x9a<\ame\xde\x15\x86`\xfaw\x19\xaa\x14 \x03\x89\x9aPg\xcc8_+gU\xc6\x95\x1c\xbf\xa4\xcboa5\xcd\xe0\x96\xd4p\x01R\xd4\xb1eR\xd0\x87\xe2\x87,E\xc3\xbe\xd5\xe7\xbb_ym\tr\xd6\xb0\x11E\x9b\bZB\x1f\xb4u\x0e\x10\x9e8\xb0O\xaas~\xc8\x02\a\xc0\x9b\xe9\x8cX\x91\xa3\x86)\x14\xd3\xf7\x06c\x01\x8e,Oh%\xf1@Gn\xa8\xfd\x16\x16d\x98\x9d\xe3\xb2\xff\x1dV?\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00w\x1cv\x1e') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpcgss_update_slack\x00'}, 0x18) write$cgroup_subtree(r6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r11, &(0x7f00000001c0)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f00000004c0)="2762fa7ef7e0c286827b16d252e0b6c55f8291f179d309b83c007ac4f62952137333d382a57404353c75e74f0e3785ee827c22c833e74fcdac26c4337a17f017d7a858c4e325", 0x46}, {&(0x7f0000000540)="b2293fce34050af6bf7ef4ce24b5e37eb19486387608555d0885d13d2443d759340dbb91ecdd2f4806b591a3c2d96d62764278b5f529120bc808e9e60c531564597d788a887e3bec6189fb721ec3c07f057f9609d21ea06ed5037eb552770a0348b1100346a8be3ac9dd8c4732f8a59b19219286ed6400e8d7337922736c10aaf5b8b6614ecd1e2e86ccea2f98b56fc731a7617df9023a", 0x97}, {&(0x7f0000000780)="3b630590a6aa1e1f736969500d33a523245dc272e5bbd6d7bdc772bdc6d31eadbbb42180a631dbe73b17804686479157f7f32e60889cec248b21ea021ba6e05d318389ea", 0x44}, {&(0x7f00000009c0)="fd3f98449cb511e0c4a4eee6ae849fe6ab1edb1dadc05c1e5009e967c86de9673fff11ba8511075df3115c25cdc7d8cc80e422db8cdfb29f88a87da7f13dac4a13132d05ab57492ac91272f43f466a00c5c8f136431ea2b0c62ef2b8b99944a740a2b4bdf1ade5e2b48f", 0x6a}], 0x4, &(0x7f0000000600)}, 0x40004) 1.489763919s ago: executing program 2 (id=2137): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x4e6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa102000000000007010000f8ffffffb7020000b70300000000000000009500"/81], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000600)='cpu\t<0t&\t\xa0$\\\xc5\x1cM\x8aI\xe4\x04\x06\x8a{\xc1\xefo[a\x81!\x1c\xba\x067n{U\xacE\xf7\xa2\xfc\x8c\xf8\r\xf8\x81D\xbc\xe4\x19\x84\xb1.\x9beK\xba\x0f\xf1\xd0\x97@e\xa3v\x90*\x04%,\xba\xfa/\x91Ek\x811\xfb\xad\f\x92mqi\xad1\x87U\x05\x00\xa1\\\xa6\x15\xdfc\x1eP\xa5\a\xb5~\xfa\x9b\xeb\xd9\x82\x9c\xcc\xa7\xd9O\"(\xb6$\xbdn!\xa82\b\xaf\xc6zz\xbe\xf9\xff\x88\b\xe2%\xbd\x17`\xb9`_\xa3)y\xdf\x00\x00\xf0\xff\xff\xff\xff\xffX\xe8\xe9\xcb\x1c\x16\x10\xd1\xf9C\x1b\xc8\x9a<\ame\xde\x15\x86`\xfaw\x19\xaa\x14 \x03\x89\x9aPg\xcc8_+gU\xc6\x95\x1c\xbf\xa4\xcboa5\xcd\xe0\x96\xd4p\x01R\xd4\xb1eR\xd0\x87\xe2\x87,E\xc3\xbe\xd5\xe7\xbb_ym\tr\xd6\xb0\x11E\x9b\bZB\x1f\xb4u\x0e\x10\x9e8\xb0O\xaas~\xc8\x02\a\xc0\x9b\xe9\x8cX\x91\xa3\x86)\x14\xd3\xf7\x06c\x01\x8e,Oh%\xf1@Gn\xa8\xfd\x16\x16d\x98\x9d\xe3\xb2\xff\x1dV?\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00w\x1cv\x1e') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpcgss_update_slack\x00'}, 0x18) write$cgroup_subtree(r6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r11, &(0x7f00000001c0)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f00000004c0)="2762fa7ef7e0c286827b16d252e0b6c55f8291f179d309b83c007ac4f62952137333d382a57404353c75e74f0e3785ee827c22c833e74fcdac26c4337a17f017d7a858c4e325", 0x46}, {&(0x7f0000000540)="b2293fce34050af6bf7ef4ce24b5e37eb19486387608555d0885d13d2443d759340dbb91ecdd2f4806b591a3c2d96d62764278b5f529120bc808e9e60c531564597d788a887e3bec6189fb721ec3c07f057f9609d21ea06ed5037eb552770a0348b1100346a8be3ac9dd8c4732f8a59b19219286ed6400e8d7337922736c10aaf5b8b6614ecd1e2e86ccea2f98b56fc731a7617df9023a", 0x97}, {&(0x7f0000000780)="3b630590a6aa1e1f736969500d33a523245dc272e5bbd6d7bdc772bdc6d31eadbbb42180a631dbe73b17804686479157f7f32e60889cec248b21ea021ba6e05d318389ea", 0x44}, {&(0x7f00000009c0)="fd3f98449cb511e0c4a4eee6ae849fe6ab1edb1dadc05c1e5009e967c86de9673fff11ba8511075df3115c25cdc7d8cc80e422db8cdfb29f88a87da7f13dac4a13132d05ab57492ac91272f43f466a00c5c8f136431ea2b0c62ef2b8b99944a740a2b4bdf1ade5e2b48f", 0x6a}], 0x4, &(0x7f0000000600)}, 0x40004) 1.183944594s ago: executing program 3 (id=2139): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000200000085000000b600000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa38}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a8500000005000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 1.183416034s ago: executing program 4 (id=2140): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x4e6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa102000000000007010000f8ffffffb7020000b70300000000000000009500"/81], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000600)='cpu\t<0t&\t\xa0$\\\xc5\x1cM\x8aI\xe4\x04\x06\x8a{\xc1\xefo[a\x81!\x1c\xba\x067n{U\xacE\xf7\xa2\xfc\x8c\xf8\r\xf8\x81D\xbc\xe4\x19\x84\xb1.\x9beK\xba\x0f\xf1\xd0\x97@e\xa3v\x90*\x04%,\xba\xfa/\x91Ek\x811\xfb\xad\f\x92mqi\xad1\x87U\x05\x00\xa1\\\xa6\x15\xdfc\x1eP\xa5\a\xb5~\xfa\x9b\xeb\xd9\x82\x9c\xcc\xa7\xd9O\"(\xb6$\xbdn!\xa82\b\xaf\xc6zz\xbe\xf9\xff\x88\b\xe2%\xbd\x17`\xb9`_\xa3)y\xdf\x00\x00\xf0\xff\xff\xff\xff\xffX\xe8\xe9\xcb\x1c\x16\x10\xd1\xf9C\x1b\xc8\x9a<\ame\xde\x15\x86`\xfaw\x19\xaa\x14 \x03\x89\x9aPg\xcc8_+gU\xc6\x95\x1c\xbf\xa4\xcboa5\xcd\xe0\x96\xd4p\x01R\xd4\xb1eR\xd0\x87\xe2\x87,E\xc3\xbe\xd5\xe7\xbb_ym\tr\xd6\xb0\x11E\x9b\bZB\x1f\xb4u\x0e\x10\x9e8\xb0O\xaas~\xc8\x02\a\xc0\x9b\xe9\x8cX\x91\xa3\x86)\x14\xd3\xf7\x06c\x01\x8e,Oh%\xf1@Gn\xa8\xfd\x16\x16d\x98\x9d\xe3\xb2\xff\x1dV?\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00w\x1cv\x1e') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpcgss_update_slack\x00'}, 0x18) write$cgroup_subtree(r6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, 0x0, 0x3) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r11, &(0x7f00000001c0)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f00000004c0)="2762fa7ef7e0c286827b16d252e0b6c55f8291f179d309b83c007ac4f62952137333d382a57404353c75e74f0e3785ee827c22c833e74fcdac26c4337a17f017d7a858c4e325", 0x46}, {&(0x7f0000000540)="b2293fce34050af6bf7ef4ce24b5e37eb19486387608555d0885d13d2443d759340dbb91ecdd2f4806b591a3c2d96d62764278b5f529120bc808e9e60c531564597d788a887e3bec6189fb721ec3c07f057f9609d21ea06ed5037eb552770a0348b1100346a8be3ac9dd8c4732f8a59b19219286ed6400e8d7337922736c10aaf5b8b6614ecd1e2e86ccea2f98b56fc731a7617df9023a", 0x97}, {&(0x7f0000000780)="3b630590a6aa1e1f736969500d33a523245dc272e5bbd6d7bdc772bdc6d31eadbbb42180a631dbe73b17804686479157f7f32e60889cec248b21ea021ba6e05d318389ea", 0x44}, {&(0x7f00000009c0)="fd3f98449cb511e0c4a4eee6ae849fe6ab1edb1dadc05c1e5009e967c86de9673fff11ba8511075df3115c25cdc7d8cc80e422db8cdfb29f88a87da7f13dac4a13132d05ab57492ac91272f43f466a00c5c8f136431ea2b0c62ef2b8b99944a740a2b4bdf1ade5e2b48f", 0x6a}], 0x4, &(0x7f0000000600)}, 0x40004) 956.535293ms ago: executing program 0 (id=2141): bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x4e}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB, @ANYRES64], 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="7be0ffa88ebce77fa9925cfa571e7d896ea8b1064c56cb86541afb8be73cc425fe1310ddc1ec157c6f24307f8800297f5207"], 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2d63707520a2fbfdbd963e6d6d64aa34d4236f3a28a3c4cecafd11885981b6388708f0789613"], 0x5) close(r7) 834.416322ms ago: executing program 4 (id=2142): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x4e6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa102000000000007010000f8ffffffb7020000b70300000000000000009500"/81], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000600)='cpu\t<0t&\t\xa0$\\\xc5\x1cM\x8aI\xe4\x04\x06\x8a{\xc1\xefo[a\x81!\x1c\xba\x067n{U\xacE\xf7\xa2\xfc\x8c\xf8\r\xf8\x81D\xbc\xe4\x19\x84\xb1.\x9beK\xba\x0f\xf1\xd0\x97@e\xa3v\x90*\x04%,\xba\xfa/\x91Ek\x811\xfb\xad\f\x92mqi\xad1\x87U\x05\x00\xa1\\\xa6\x15\xdfc\x1eP\xa5\a\xb5~\xfa\x9b\xeb\xd9\x82\x9c\xcc\xa7\xd9O\"(\xb6$\xbdn!\xa82\b\xaf\xc6zz\xbe\xf9\xff\x88\b\xe2%\xbd\x17`\xb9`_\xa3)y\xdf\x00\x00\xf0\xff\xff\xff\xff\xffX\xe8\xe9\xcb\x1c\x16\x10\xd1\xf9C\x1b\xc8\x9a<\ame\xde\x15\x86`\xfaw\x19\xaa\x14 \x03\x89\x9aPg\xcc8_+gU\xc6\x95\x1c\xbf\xa4\xcboa5\xcd\xe0\x96\xd4p\x01R\xd4\xb1eR\xd0\x87\xe2\x87,E\xc3\xbe\xd5\xe7\xbb_ym\tr\xd6\xb0\x11E\x9b\bZB\x1f\xb4u\x0e\x10\x9e8\xb0O\xaas~\xc8\x02\a\xc0\x9b\xe9\x8cX\x91\xa3\x86)\x14\xd3\xf7\x06c\x01\x8e,Oh%\xf1@Gn\xa8\xfd\x16\x16d\x98\x9d\xe3\xb2\xff\x1dV?\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00w\x1cv\x1e') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpcgss_update_slack\x00'}, 0x18) write$cgroup_subtree(r6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)}, 0x3) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r11, &(0x7f00000001c0)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f00000004c0)="2762fa7ef7e0c286827b16d252e0b6c55f8291f179d309b83c007ac4f62952137333d382a57404353c75e74f0e3785ee827c22c833e74fcdac26c4337a17f017d7a858c4e325", 0x46}, {&(0x7f0000000540)="b2293fce34050af6bf7ef4ce24b5e37eb19486387608555d0885d13d2443d759340dbb91ecdd2f4806b591a3c2d96d62764278b5f529120bc808e9e60c531564597d788a887e3bec6189fb721ec3c07f057f9609d21ea06ed5037eb552770a0348b1100346a8be3ac9dd8c4732f8a59b19219286ed6400e8d7337922736c10aaf5b8b6614ecd1e2e86ccea2f98b56fc731a7617df9023a", 0x97}, {&(0x7f0000000780)="3b630590a6aa1e1f736969500d33a523245dc272e5bbd6d7bdc772bdc6d31eadbbb42180a631dbe73b17804686479157f7f32e60889cec248b21ea021ba6e05d318389ea", 0x44}, {&(0x7f00000009c0)="fd3f98449cb511e0c4a4eee6ae849fe6ab1edb1dadc05c1e5009e967c86de9673fff11ba8511075df3115c25cdc7d8cc80e422db8cdfb29f88a87da7f13dac4a13132d05ab57492ac91272f43f466a00c5c8f136431ea2b0c62ef2b8b99944a740a2b4bdf1ade5e2b48f", 0x6a}], 0x4, &(0x7f0000000600)}, 0x40004) 563.553944ms ago: executing program 4 (id=2143): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0700000004000000800000000e00000028000000", @ANYRES32, @ANYBLOB="0000002000000000fcffffff00", @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) socketpair(0x1e, 0x80005, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000180)='./file0\x00', 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r4}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781", @ANYRES8], 0xfdef) write$cgroup_int(r3, &(0x7f0000000200)=0x1, 0x12) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30008054}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) 561.981825ms ago: executing program 2 (id=2153): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x4e6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa102000000000007010000f8ffffffb7020000b70300000000000000009500"/81], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000600)='cpu\t<0t&\t\xa0$\\\xc5\x1cM\x8aI\xe4\x04\x06\x8a{\xc1\xefo[a\x81!\x1c\xba\x067n{U\xacE\xf7\xa2\xfc\x8c\xf8\r\xf8\x81D\xbc\xe4\x19\x84\xb1.\x9beK\xba\x0f\xf1\xd0\x97@e\xa3v\x90*\x04%,\xba\xfa/\x91Ek\x811\xfb\xad\f\x92mqi\xad1\x87U\x05\x00\xa1\\\xa6\x15\xdfc\x1eP\xa5\a\xb5~\xfa\x9b\xeb\xd9\x82\x9c\xcc\xa7\xd9O\"(\xb6$\xbdn!\xa82\b\xaf\xc6zz\xbe\xf9\xff\x88\b\xe2%\xbd\x17`\xb9`_\xa3)y\xdf\x00\x00\xf0\xff\xff\xff\xff\xffX\xe8\xe9\xcb\x1c\x16\x10\xd1\xf9C\x1b\xc8\x9a<\ame\xde\x15\x86`\xfaw\x19\xaa\x14 \x03\x89\x9aPg\xcc8_+gU\xc6\x95\x1c\xbf\xa4\xcboa5\xcd\xe0\x96\xd4p\x01R\xd4\xb1eR\xd0\x87\xe2\x87,E\xc3\xbe\xd5\xe7\xbb_ym\tr\xd6\xb0\x11E\x9b\bZB\x1f\xb4u\x0e\x10\x9e8\xb0O\xaas~\xc8\x02\a\xc0\x9b\xe9\x8cX\x91\xa3\x86)\x14\xd3\xf7\x06c\x01\x8e,Oh%\xf1@Gn\xa8\xfd\x16\x16d\x98\x9d\xe3\xb2\xff\x1dV?\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00w\x1cv\x1e') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpcgss_update_slack\x00'}, 0x18) write$cgroup_subtree(r6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)}, 0x3) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r11, &(0x7f00000001c0)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f00000004c0)="2762fa7ef7e0c286827b16d252e0b6c55f8291f179d309b83c007ac4f62952137333d382a57404353c75e74f0e3785ee827c22c833e74fcdac26c4337a17f017d7a858c4e325", 0x46}, {&(0x7f0000000540)="b2293fce34050af6bf7ef4ce24b5e37eb19486387608555d0885d13d2443d759340dbb91ecdd2f4806b591a3c2d96d62764278b5f529120bc808e9e60c531564597d788a887e3bec6189fb721ec3c07f057f9609d21ea06ed5037eb552770a0348b1100346a8be3ac9dd8c4732f8a59b19219286ed6400e8d7337922736c10aaf5b8b6614ecd1e2e86ccea2f98b56fc731a7617df9023a", 0x97}, {&(0x7f0000000780)="3b630590a6aa1e1f736969500d33a523245dc272e5bbd6d7bdc772bdc6d31eadbbb42180a631dbe73b17804686479157f7f32e60889cec248b21ea021ba6e05d318389ea", 0x44}, {&(0x7f00000009c0)="fd3f98449cb511e0c4a4eee6ae849fe6ab1edb1dadc05c1e5009e967c86de9673fff11ba8511075df3115c25cdc7d8cc80e422db8cdfb29f88a87da7f13dac4a13132d05ab57492ac91272f43f466a00c5c8f136431ea2b0c62ef2b8b99944a740a2b4bdf1ade5e2b48f", 0x6a}], 0x4, &(0x7f0000000600)}, 0x40004) 304.990936ms ago: executing program 2 (id=2144): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0700000004000000800000000e00000028000000", @ANYRES32, @ANYBLOB="0000002000000000fcffffff00", @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) socketpair(0x1e, 0x80005, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000180)='./file0\x00', 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r4}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781", @ANYRES8], 0xfdef) write$cgroup_int(r3, &(0x7f0000000200)=0x1, 0x12) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30008054}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) 271.271858ms ago: executing program 0 (id=2145): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000007000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000540), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@ifindex, r3, 0x7, 0x2010, 0x0, @value=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0xd926}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @random="e5db029ea53c"}) close(r0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 244.922601ms ago: executing program 4 (id=2146): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0100000004001000040122000b00000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000002800100000000000000000080000000000000000000000000d35858cafb9cdd70a2616ec2dbc63e2b61073615ab0551ccc3f6a175961873297bc1e21e9598c9606a64d8df67282c9bdbdb15bff2003713ab8f1a370ef5548356eb138a0e4186a9ab0675f7edcbbcaae6a1d616d132bbf859e97c434caa4bb6d584376c1c0ef0e7bcb3ddc529322811a7cf8f2ec801b9989317f7240f8d2ef35eb7a5dbb9036f7d753f626f8859f8e6bbb2137611d1c18926017a10b30e9490ff75bb7d01122444"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="1e000000000000007f000000ffffffff00000100c2052c19cd44135adc2df6e54b94bec4fb491685316d4df9342cf25b1d8268d7d327e296d6e41161322a52d4d44d50b6835e1f445c26bac315381e3e7f1b60c0a99bedad02", @ANYRES32, @ANYBLOB=':\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000003000000010000000f00"/24, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020852000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000001000000000000000000850000009e0000009500000000006e63a50a6b1a014d0000000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8941, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000b00)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2700000001000000", @ANYRES32, @ANYBLOB="c2ff9fcdee78d00eda25f6489eb31321721220a73a821383d61a9ac916956a767ef846cc213a7be04f5a357b5e3803873338461d55546898e18a975cf4c6940808e300c516a39624ef798e89d660b471615e4b9c16141b0f1372a96819fff227c1e08fbeeb4129dfab71eb8b33f1b532538258955822fec8262a67cbb1dccebd8a05bd6dfe4dfb7248659a2c1ce50be80e1ac93da56143457553237657efe1813a1b47474eff407d2d3e47813abf9ea97e", @ANYRES32=r1, @ANYBLOB, @ANYRES64=0x0], 0x20) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x8, 0x10, 0x9, 0x5, 0x0, 0x81, 0x200, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xa}, 0x0, 0x9, 0xb, 0x9, 0x5, 0x5, 0x1, 0x0, 0xfffffff7, 0x0, 0x5}, r2, 0x5, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x10, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000711223000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 0s ago: executing program 3 (id=2147): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x4e6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa102000000000007010000f8ffffffb7020000b70300000000000000009500"/81], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpcgss_update_slack\x00'}, 0x18) write$cgroup_subtree(r6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r11, &(0x7f00000001c0)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f00000004c0)="2762fa7ef7e0c286827b16d252e0b6c55f8291f179d309b83c007ac4f62952137333d382a57404353c75e74f0e3785ee827c22c833e74fcdac26c4337a17f017d7a858c4e325", 0x46}, {&(0x7f0000000540)="b2293fce34050af6bf7ef4ce24b5e37eb19486387608555d0885d13d2443d759340dbb91ecdd2f4806b591a3c2d96d62764278b5f529120bc808e9e60c531564597d788a887e3bec6189fb721ec3c07f057f9609d21ea06ed5037eb552770a0348b1100346a8be3ac9dd8c4732f8a59b19219286ed6400e8d7337922736c10aaf5b8b6614ecd1e2e86ccea2f98b56fc731a7617df9023a", 0x97}, {&(0x7f0000000780)="3b630590a6aa1e1f736969500d33a523245dc272e5bbd6d7bdc772bdc6d31eadbbb42180a631dbe73b17804686479157f7f32e60889cec248b21ea021ba6e05d318389ea", 0x44}, {&(0x7f00000009c0)="fd3f98449cb511e0c4a4eee6ae849fe6ab1edb1dadc05c1e5009e967c86de9673fff11ba8511075df3115c25cdc7d8cc80e422db8cdfb29f88a87da7f13dac4a13132d05ab57492ac91272f43f466a00c5c8f136431ea2b0c62ef2b8b99944a740a2b4bdf1ade5e2b48f", 0x6a}], 0x4, &(0x7f0000000600)}, 0x40004) 0s ago: executing program 2 (id=2148): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000200000085000000b600000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa38}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a8500000005000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) kernel console output (not intermixed with test programs): 2.655890][ T1061] device bridge0 entered promiscuous mode [ 52.746820][ T1066] FAULT_INJECTION: forcing a failure. [ 52.746820][ T1066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 52.787290][ T1066] CPU: 1 PID: 1066 Comm: syz.1.225 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 52.797048][ T1066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 52.807131][ T1066] Call Trace: [ 52.810407][ T1066] [ 52.813334][ T1066] __dump_stack+0x21/0x24 [ 52.817673][ T1066] dump_stack_lvl+0xee/0x150 [ 52.822262][ T1066] ? __cfi_dump_stack_lvl+0x8/0x8 [ 52.827288][ T1066] dump_stack+0x15/0x24 [ 52.831446][ T1066] should_fail_ex+0x3d4/0x520 [ 52.836127][ T1066] should_fail+0xb/0x10 [ 52.840279][ T1066] should_fail_usercopy+0x1a/0x20 [ 52.845300][ T1066] _copy_from_user+0x1e/0xc0 [ 52.849884][ T1066] ___sys_recvmsg+0x12b/0x510 [ 52.854559][ T1066] ? __sys_recvmsg+0x270/0x270 [ 52.859320][ T1066] ? security_file_permission+0x94/0xb0 [ 52.864866][ T1066] ? __fget_files+0x2d5/0x330 [ 52.869544][ T1066] ? __fdget+0x19c/0x220 [ 52.873787][ T1066] __x64_sys_recvmsg+0x1ed/0x2c0 [ 52.878724][ T1066] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 52.884192][ T1066] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 52.890265][ T1066] x64_sys_call+0x75/0x9a0 [ 52.894683][ T1066] do_syscall_64+0x4c/0xa0 [ 52.899106][ T1066] ? clear_bhb_loop+0x30/0x80 [ 52.903778][ T1066] ? clear_bhb_loop+0x30/0x80 [ 52.908457][ T1066] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 52.914352][ T1066] RIP: 0033:0x7ff62658ebe9 [ 52.918766][ T1066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.938378][ T1066] RSP: 002b:00007ff62743c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 52.946800][ T1066] RAX: ffffffffffffffda RBX: 00007ff6267b5fa0 RCX: 00007ff62658ebe9 [ 52.954770][ T1066] RDX: 0000000040020000 RSI: 00002000000004c0 RDI: 0000000000000003 [ 52.962740][ T1066] RBP: 00007ff62743c090 R08: 0000000000000000 R09: 0000000000000000 [ 52.970709][ T1066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.978677][ T1066] R13: 00007ff6267b6038 R14: 00007ff6267b5fa0 R15: 00007fff02955908 [ 52.986659][ T1066] [ 53.021219][ T1069] FAULT_INJECTION: forcing a failure. [ 53.021219][ T1069] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 53.054983][ T1069] CPU: 1 PID: 1069 Comm: syz.2.226 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 53.064738][ T1069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 53.074802][ T1069] Call Trace: [ 53.078094][ T1069] [ 53.081016][ T1069] __dump_stack+0x21/0x24 [ 53.085354][ T1069] dump_stack_lvl+0xee/0x150 [ 53.089947][ T1069] ? __cfi_dump_stack_lvl+0x8/0x8 [ 53.094969][ T1069] dump_stack+0x15/0x24 [ 53.099126][ T1069] should_fail_ex+0x3d4/0x520 [ 53.103801][ T1069] should_fail_alloc_page+0x61/0x90 [ 53.108998][ T1069] prepare_alloc_pages+0x148/0x5f0 [ 53.114099][ T1069] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 53.119290][ T1069] ? __vmalloc_node_range+0x326/0x13d0 [ 53.124722][ T1069] ? bpf_map_area_alloc+0xd7/0xe0 [ 53.129720][ T1069] ? prealloc_init+0x146/0x8f0 [ 53.134459][ T1069] ? htab_map_alloc+0xb24/0xfd0 [ 53.139284][ T1069] ? map_create+0x49c/0xd80 [ 53.143759][ T1069] ? __x64_sys_bpf+0x7c/0x90 [ 53.148322][ T1069] __alloc_pages+0x124/0x450 [ 53.152892][ T1069] ? __cfi___alloc_pages+0x10/0x10 [ 53.157988][ T1069] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 53.163802][ T1069] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 53.169953][ T1069] __get_free_pages+0xe/0x30 [ 53.174545][ T1069] kasan_populate_vmalloc_pte+0x29/0x120 [ 53.180180][ T1069] __apply_to_page_range+0x8c1/0xc00 [ 53.185466][ T1069] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 53.191699][ T1069] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 53.197929][ T1069] apply_to_page_range+0x3b/0x50 [ 53.202867][ T1069] kasan_populate_vmalloc+0x60/0x70 [ 53.208069][ T1069] alloc_vmap_area+0x173e/0x1870 [ 53.213015][ T1069] ? vm_map_ram+0x930/0x930 [ 53.217520][ T1069] ? __kasan_kmalloc+0x95/0xb0 [ 53.222277][ T1069] ? kmalloc_node_trace+0x3d/0xb0 [ 53.227299][ T1069] __get_vm_area_node+0x160/0x360 [ 53.232341][ T1069] __vmalloc_node_range+0x326/0x13d0 [ 53.237624][ T1069] ? prealloc_init+0x146/0x8f0 [ 53.242384][ T1069] ? pcpu_memcg_post_alloc_hook+0x177/0x270 [ 53.248272][ T1069] ? pcpu_alloc+0x101a/0x16b0 [ 53.252939][ T1069] ? __bitmap_weight+0xb3/0x100 [ 53.257787][ T1069] ? __cfi___vmalloc_node_range+0x10/0x10 [ 53.263500][ T1069] ? __alloc_percpu_gfp+0x25/0x30 [ 53.268520][ T1069] ? irqentry_exit+0x37/0x40 [ 53.273111][ T1069] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 53.279258][ T1069] bpf_map_area_alloc+0xd7/0xe0 [ 53.284103][ T1069] ? prealloc_init+0x146/0x8f0 [ 53.288862][ T1069] prealloc_init+0x146/0x8f0 [ 53.293537][ T1069] htab_map_alloc+0xb24/0xfd0 [ 53.298207][ T1069] map_create+0x49c/0xd80 [ 53.302535][ T1069] __sys_bpf+0x30b/0x780 [ 53.306954][ T1069] ? bpf_link_show_fdinfo+0x320/0x320 [ 53.312350][ T1069] ? __cfi_ksys_write+0x10/0x10 [ 53.317210][ T1069] ? debug_smp_processor_id+0x17/0x20 [ 53.322584][ T1069] __x64_sys_bpf+0x7c/0x90 [ 53.327005][ T1069] x64_sys_call+0x488/0x9a0 [ 53.331596][ T1069] do_syscall_64+0x4c/0xa0 [ 53.336017][ T1069] ? clear_bhb_loop+0x30/0x80 [ 53.340692][ T1069] ? clear_bhb_loop+0x30/0x80 [ 53.345370][ T1069] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 53.351257][ T1069] RIP: 0033:0x7f1fbb38ebe9 [ 53.355666][ T1069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.375264][ T1069] RSP: 002b:00007f1fbc1fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 53.383665][ T1069] RAX: ffffffffffffffda RBX: 00007f1fbb5b5fa0 RCX: 00007f1fbb38ebe9 [ 53.391637][ T1069] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 53.399594][ T1069] RBP: 00007f1fbc1fe090 R08: 0000000000000000 R09: 0000000000000000 [ 53.407551][ T1069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.415503][ T1069] R13: 00007f1fbb5b6038 R14: 00007f1fbb5b5fa0 R15: 00007ffe818dfd48 [ 53.423482][ T1069] [ 54.007683][ T1092] FAULT_INJECTION: forcing a failure. [ 54.007683][ T1092] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 54.124506][ T1092] CPU: 1 PID: 1092 Comm: syz.2.234 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 54.134279][ T1092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 54.144334][ T1092] Call Trace: [ 54.147700][ T1092] [ 54.150882][ T1092] __dump_stack+0x21/0x24 [ 54.155215][ T1092] dump_stack_lvl+0xee/0x150 [ 54.159905][ T1092] ? __cfi_dump_stack_lvl+0x8/0x8 [ 54.164942][ T1092] dump_stack+0x15/0x24 [ 54.169103][ T1092] should_fail_ex+0x3d4/0x520 [ 54.173787][ T1092] should_fail+0xb/0x10 [ 54.177968][ T1092] should_fail_usercopy+0x1a/0x20 [ 54.183007][ T1092] copyout+0x20/0xa0 [ 54.186911][ T1092] _copy_to_iter+0x3f0/0xe50 [ 54.191589][ T1092] ? __kasan_check_write+0x14/0x20 [ 54.196709][ T1092] ? __cfi__copy_to_iter+0x10/0x10 [ 54.201818][ T1092] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 54.207629][ T1092] ? check_stack_object+0x81/0x140 [ 54.212746][ T1092] ? __kasan_check_read+0x11/0x20 [ 54.217766][ T1092] ? __check_object_size+0x45a/0x600 [ 54.223051][ T1092] simple_copy_to_iter+0x50/0x70 [ 54.227997][ T1092] __skb_datagram_iter+0xf1/0x730 [ 54.233024][ T1092] ? tsk_importance+0x150/0x150 [ 54.237875][ T1092] ? __cfi_simple_copy_to_iter+0x10/0x10 [ 54.243518][ T1092] skb_copy_datagram_iter+0x40/0x150 [ 54.248803][ T1092] tipc_recvstream+0x6fe/0xe80 [ 54.253566][ T1092] ? __cfi_tipc_recvstream+0x10/0x10 [ 54.258854][ T1092] ____sys_recvmsg+0x2a0/0x590 [ 54.263619][ T1092] ? __sys_recvmsg_sock+0x50/0x50 [ 54.268653][ T1092] ? ___sys_recvmsg+0x190/0x510 [ 54.273508][ T1092] ___sys_recvmsg+0x1b2/0x510 [ 54.278197][ T1092] ? __sys_recvmsg+0x270/0x270 [ 54.282958][ T1092] ? __hrtimer_run_queues+0x991/0x9f0 [ 54.288333][ T1092] ? __fget_files+0x2d5/0x330 [ 54.293022][ T1092] ? __fdget+0x19c/0x220 [ 54.297277][ T1092] __x64_sys_recvmsg+0x1ed/0x2c0 [ 54.302207][ T1092] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 54.307655][ T1092] ? sched_clock_cpu+0x6e/0x250 [ 54.312513][ T1092] ? debug_smp_processor_id+0x17/0x20 [ 54.317879][ T1092] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 54.323943][ T1092] x64_sys_call+0x75/0x9a0 [ 54.328364][ T1092] do_syscall_64+0x4c/0xa0 [ 54.332803][ T1092] ? clear_bhb_loop+0x30/0x80 [ 54.337478][ T1092] ? clear_bhb_loop+0x30/0x80 [ 54.342152][ T1092] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 54.348039][ T1092] RIP: 0033:0x7f1fbb38ebe9 [ 54.352446][ T1092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.372059][ T1092] RSP: 002b:00007f1fbc1fe038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 54.380482][ T1092] RAX: ffffffffffffffda RBX: 00007f1fbb5b5fa0 RCX: 00007f1fbb38ebe9 [ 54.388453][ T1092] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000009 [ 54.396443][ T1092] RBP: 00007f1fbc1fe090 R08: 0000000000000000 R09: 0000000000000000 [ 54.404421][ T1092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.412394][ T1092] R13: 00007f1fbb5b6038 R14: 00007f1fbb5b5fa0 R15: 00007ffe818dfd48 [ 54.420375][ T1092] [ 55.642227][ T1138] pimreg: tun_chr_ioctl cmd 1074812117 [ 55.648544][ T1138] pimreg: tun_chr_ioctl cmd 2147767507 [ 56.648940][ T1159] bond_slave_1: mtu less than device minimum [ 57.480786][ T1188] FAULT_INJECTION: forcing a failure. [ 57.480786][ T1188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 57.656796][ T1188] CPU: 0 PID: 1188 Comm: syz.2.265 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 57.666650][ T1188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 57.676731][ T1188] Call Trace: [ 57.680011][ T1188] [ 57.682947][ T1188] __dump_stack+0x21/0x24 [ 57.687291][ T1188] dump_stack_lvl+0xee/0x150 [ 57.691883][ T1188] ? __cfi_dump_stack_lvl+0x8/0x8 [ 57.696909][ T1188] dump_stack+0x15/0x24 [ 57.701069][ T1188] should_fail_ex+0x3d4/0x520 [ 57.705749][ T1188] should_fail+0xb/0x10 [ 57.709901][ T1188] should_fail_usercopy+0x1a/0x20 [ 57.714926][ T1188] _copy_from_user+0x1e/0xc0 [ 57.719519][ T1188] __sys_bpf+0x277/0x780 [ 57.723758][ T1188] ? bpf_link_show_fdinfo+0x320/0x320 [ 57.729212][ T1188] ? __cfi_ksys_write+0x10/0x10 [ 57.734064][ T1188] ? debug_smp_processor_id+0x17/0x20 [ 57.739433][ T1188] __x64_sys_bpf+0x7c/0x90 [ 57.743939][ T1188] x64_sys_call+0x488/0x9a0 [ 57.748438][ T1188] do_syscall_64+0x4c/0xa0 [ 57.752869][ T1188] ? clear_bhb_loop+0x30/0x80 [ 57.757547][ T1188] ? clear_bhb_loop+0x30/0x80 [ 57.762226][ T1188] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 57.768122][ T1188] RIP: 0033:0x7f1fbb38ebe9 [ 57.772532][ T1188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.792138][ T1188] RSP: 002b:00007f1fbc1fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 57.800564][ T1188] RAX: ffffffffffffffda RBX: 00007f1fbb5b5fa0 RCX: 00007f1fbb38ebe9 [ 57.808539][ T1188] RDX: 0000000000000038 RSI: 0000200000000140 RDI: 000000000000001a [ 57.816507][ T1188] RBP: 00007f1fbc1fe090 R08: 0000000000000000 R09: 0000000000000000 [ 57.824476][ T1188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 57.832458][ T1188] R13: 00007f1fbb5b6038 R14: 00007f1fbb5b5fa0 R15: 00007ffe818dfd48 [ 57.840432][ T1188] [ 58.266516][ T28] audit: type=1400 audit(1754692478.242:123): avc: denied { create } for pid=1199 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 58.303244][ T1200] FAULT_INJECTION: forcing a failure. [ 58.303244][ T1200] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 58.432700][ T1200] CPU: 0 PID: 1200 Comm: syz.0.270 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 58.442472][ T1200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 58.452536][ T1200] Call Trace: [ 58.455817][ T1200] [ 58.458745][ T1200] __dump_stack+0x21/0x24 [ 58.463085][ T1200] dump_stack_lvl+0xee/0x150 [ 58.467861][ T1200] ? __cfi_dump_stack_lvl+0x8/0x8 [ 58.472893][ T1200] dump_stack+0x15/0x24 [ 58.477053][ T1200] should_fail_ex+0x3d4/0x520 [ 58.481837][ T1200] should_fail+0xb/0x10 [ 58.486095][ T1200] should_fail_usercopy+0x1a/0x20 [ 58.491231][ T1200] _copy_from_user+0x1e/0xc0 [ 58.495823][ T1200] sock_do_ioctl+0x186/0x310 [ 58.500409][ T1200] ? sock_show_fdinfo+0xb0/0xb0 [ 58.505258][ T1200] ? selinux_file_ioctl+0x377/0x480 [ 58.510452][ T1200] sock_ioctl+0x4d8/0x6e0 [ 58.514780][ T1200] ? __cfi_sock_ioctl+0x10/0x10 [ 58.519623][ T1200] ? __fget_files+0x2d5/0x330 [ 58.524304][ T1200] ? security_file_ioctl+0x95/0xc0 [ 58.529585][ T1200] ? __cfi_sock_ioctl+0x10/0x10 [ 58.534516][ T1200] __se_sys_ioctl+0x12f/0x1b0 [ 58.539201][ T1200] __x64_sys_ioctl+0x7b/0x90 [ 58.543785][ T1200] x64_sys_call+0x58b/0x9a0 [ 58.548286][ T1200] do_syscall_64+0x4c/0xa0 [ 58.552716][ T1200] ? clear_bhb_loop+0x30/0x80 [ 58.557414][ T1200] ? clear_bhb_loop+0x30/0x80 [ 58.562105][ T1200] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 58.568010][ T1200] RIP: 0033:0x7f8e0cd8ebe9 [ 58.572435][ T1200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.592254][ T1200] RSP: 002b:00007f8e0dbe0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 58.600679][ T1200] RAX: ffffffffffffffda RBX: 00007f8e0cfb5fa0 RCX: 00007f8e0cd8ebe9 [ 58.608656][ T1200] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000d [ 58.616627][ T1200] RBP: 00007f8e0dbe0090 R08: 0000000000000000 R09: 0000000000000000 [ 58.624621][ T1200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.632587][ T1200] R13: 00007f8e0cfb6038 R14: 00007f8e0cfb5fa0 R15: 00007ffdf8d8c1d8 [ 58.640643][ T1200] [ 61.750182][ T1268] bond_slave_1: mtu less than device minimum [ 62.603195][ T1297] device veth0_vlan left promiscuous mode [ 62.639494][ T1297] device veth0_vlan entered promiscuous mode [ 62.701186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.713947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.726983][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.798830][ T1313] bond_slave_1: mtu less than device minimum [ 63.607472][ T28] audit: type=1400 audit(1754692483.582:124): avc: denied { create } for pid=1342 comm="syz.0.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 63.914590][ T1347] FAULT_INJECTION: forcing a failure. [ 63.914590][ T1347] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 63.933318][ T1347] CPU: 1 PID: 1347 Comm: syz.4.315 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 63.943058][ T1347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 63.953210][ T1347] Call Trace: [ 63.956485][ T1347] [ 63.959413][ T1347] __dump_stack+0x21/0x24 [ 63.963752][ T1347] dump_stack_lvl+0xee/0x150 [ 63.968343][ T1347] ? __cfi_dump_stack_lvl+0x8/0x8 [ 63.973369][ T1347] dump_stack+0x15/0x24 [ 63.977520][ T1347] should_fail_ex+0x3d4/0x520 [ 63.982205][ T1347] should_fail+0xb/0x10 [ 63.986355][ T1347] should_fail_usercopy+0x1a/0x20 [ 63.991374][ T1347] _copy_from_user+0x1e/0xc0 [ 63.995972][ T1347] __sys_bpf+0x277/0x780 [ 64.000213][ T1347] ? bpf_link_show_fdinfo+0x320/0x320 [ 64.005580][ T1347] ? __cfi_ksys_write+0x10/0x10 [ 64.010431][ T1347] ? __bpf_trace_sys_enter+0x62/0x70 [ 64.015712][ T1347] __x64_sys_bpf+0x7c/0x90 [ 64.020130][ T1347] x64_sys_call+0x488/0x9a0 [ 64.024627][ T1347] do_syscall_64+0x4c/0xa0 [ 64.029049][ T1347] ? clear_bhb_loop+0x30/0x80 [ 64.033719][ T1347] ? clear_bhb_loop+0x30/0x80 [ 64.038396][ T1347] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 64.044297][ T1347] RIP: 0033:0x7f70f4f8ebe9 [ 64.048708][ T1347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.068312][ T1347] RSP: 002b:00007f70f5d52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 64.076722][ T1347] RAX: ffffffffffffffda RBX: 00007f70f51b5fa0 RCX: 00007f70f4f8ebe9 [ 64.084688][ T1347] RDX: 0000000000000094 RSI: 0000200000001100 RDI: 0000000000000005 [ 64.092664][ T1347] RBP: 00007f70f5d52090 R08: 0000000000000000 R09: 0000000000000000 [ 64.100627][ T1347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.108598][ T1347] R13: 00007f70f51b6038 R14: 00007f70f51b5fa0 R15: 00007ffc6e9dcea8 [ 64.116662][ T1347] [ 64.436589][ T1366] bond_slave_1: mtu less than device minimum [ 65.619974][ T1395] device wg2 left promiscuous mode [ 66.678583][ T1408] bond_slave_1: mtu less than device minimum [ 67.512702][ T1424] device veth0_vlan left promiscuous mode [ 67.545567][ T1424] device veth0_vlan entered promiscuous mode [ 67.599478][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.629251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.643958][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.849135][ T1432] device veth1_macvtap left promiscuous mode [ 68.749934][ T1448] device sit0 left promiscuous mode [ 70.940088][ T1503] bond_slave_1: mtu less than device minimum [ 71.122551][ T1510] bond_slave_1: mtu less than device minimum [ 71.882255][ T1536] bond_slave_1: mtu less than device minimum [ 72.499649][ T1551] device veth0_vlan left promiscuous mode [ 72.522346][ T1551] device veth0_vlan entered promiscuous mode [ 72.609481][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.619936][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.628214][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.595968][ T1597] FAULT_INJECTION: forcing a failure. [ 73.595968][ T1597] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.648137][ T1597] CPU: 1 PID: 1597 Comm: syz.2.396 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 73.657885][ T1597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 73.667934][ T1597] Call Trace: [ 73.671203][ T1597] [ 73.674122][ T1597] __dump_stack+0x21/0x24 [ 73.678456][ T1597] dump_stack_lvl+0xee/0x150 [ 73.683040][ T1597] ? __cfi_dump_stack_lvl+0x8/0x8 [ 73.688058][ T1597] dump_stack+0x15/0x24 [ 73.692206][ T1597] should_fail_ex+0x3d4/0x520 [ 73.696877][ T1597] should_fail+0xb/0x10 [ 73.701020][ T1597] should_fail_usercopy+0x1a/0x20 [ 73.706040][ T1597] _copy_from_user+0x1e/0xc0 [ 73.710630][ T1597] __sys_bpf+0x277/0x780 [ 73.714863][ T1597] ? bpf_link_show_fdinfo+0x320/0x320 [ 73.720228][ T1597] ? irqentry_exit+0x37/0x40 [ 73.724818][ T1597] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 73.730629][ T1597] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 73.736781][ T1597] __x64_sys_bpf+0x7c/0x90 [ 73.741207][ T1597] x64_sys_call+0x488/0x9a0 [ 73.745712][ T1597] do_syscall_64+0x4c/0xa0 [ 73.750131][ T1597] ? clear_bhb_loop+0x30/0x80 [ 73.754805][ T1597] ? clear_bhb_loop+0x30/0x80 [ 73.759477][ T1597] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 73.765360][ T1597] RIP: 0033:0x7f1fbb38ebe9 [ 73.769762][ T1597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.789356][ T1597] RSP: 002b:00007f1fbc1fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 73.797774][ T1597] RAX: ffffffffffffffda RBX: 00007f1fbb5b5fa0 RCX: 00007f1fbb38ebe9 [ 73.805753][ T1597] RDX: 0000000000000048 RSI: 0000200000000100 RDI: 0000000000000000 [ 73.813722][ T1597] RBP: 00007f1fbc1fe090 R08: 0000000000000000 R09: 0000000000000000 [ 73.821694][ T1597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.829661][ T1597] R13: 00007f1fbb5b6038 R14: 00007f1fbb5b5fa0 R15: 00007ffe818dfd48 [ 73.837635][ T1597] [ 75.230812][ T1636] device sit0 entered promiscuous mode [ 75.375006][ T1644] bond_slave_1: mtu less than device minimum [ 75.467497][ T1652] device pim6reg1 entered promiscuous mode [ 75.661836][ T1655] device sit0 entered promiscuous mode [ 79.117354][ T1753] bond_slave_1: mtu less than device minimum [ 81.205641][ T1820] FAULT_INJECTION: forcing a failure. [ 81.205641][ T1820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.379267][ T1820] CPU: 1 PID: 1820 Comm: syz.4.473 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 81.389024][ T1820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 81.399082][ T1820] Call Trace: [ 81.402361][ T1820] [ 81.405297][ T1820] __dump_stack+0x21/0x24 [ 81.409641][ T1820] dump_stack_lvl+0xee/0x150 [ 81.414230][ T1820] ? __cfi_dump_stack_lvl+0x8/0x8 [ 81.419259][ T1820] ? dump_stack+0x9/0x24 [ 81.423508][ T1820] dump_stack+0x15/0x24 [ 81.427667][ T1820] should_fail_ex+0x3d4/0x520 [ 81.432351][ T1820] should_fail+0xb/0x10 [ 81.436508][ T1820] should_fail_usercopy+0x1a/0x20 [ 81.441538][ T1820] _copy_to_user+0x1e/0x90 [ 81.445950][ T1820] simple_read_from_buffer+0xe9/0x160 [ 81.451326][ T1820] proc_fail_nth_read+0x19a/0x210 [ 81.456349][ T1820] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 81.461904][ T1820] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 81.467449][ T1820] vfs_read+0x26e/0x8c0 [ 81.471605][ T1820] ? __cfi_vfs_read+0x10/0x10 [ 81.476423][ T1820] ? __kasan_check_write+0x14/0x20 [ 81.481536][ T1820] ? mutex_lock+0x8d/0x1a0 [ 81.485950][ T1820] ? __cfi_mutex_lock+0x10/0x10 [ 81.490806][ T1820] ? __fdget_pos+0x2cd/0x380 [ 81.495392][ T1820] ? ksys_read+0x71/0x240 [ 81.499721][ T1820] ksys_read+0x140/0x240 [ 81.503967][ T1820] ? __cfi_ksys_read+0x10/0x10 [ 81.508753][ T1820] ? fpregs_restore_userregs+0x128/0x260 [ 81.514388][ T1820] __x64_sys_read+0x7b/0x90 [ 81.518905][ T1820] x64_sys_call+0x2f/0x9a0 [ 81.523335][ T1820] do_syscall_64+0x4c/0xa0 [ 81.527758][ T1820] ? clear_bhb_loop+0x30/0x80 [ 81.532441][ T1820] ? clear_bhb_loop+0x30/0x80 [ 81.537123][ T1820] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 81.543017][ T1820] RIP: 0033:0x7f70f4f8d5fc [ 81.547438][ T1820] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 81.567048][ T1820] RSP: 002b:00007f70f5d52030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 81.575470][ T1820] RAX: ffffffffffffffda RBX: 00007f70f51b5fa0 RCX: 00007f70f4f8d5fc [ 81.583439][ T1820] RDX: 000000000000000f RSI: 00007f70f5d520a0 RDI: 0000000000000009 [ 81.591409][ T1820] RBP: 00007f70f5d52090 R08: 0000000000000000 R09: 0000000000000000 [ 81.599385][ T1820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.607350][ T1820] R13: 00007f70f51b6038 R14: 00007f70f51b5fa0 R15: 00007ffc6e9dcea8 [ 81.615329][ T1820] [ 81.948841][ T1846] bond_slave_1: mtu less than device minimum [ 82.301522][ T1861] bond_slave_1: mtu less than device minimum [ 82.968888][ T1876] bond_slave_1: mtu less than device minimum [ 85.650940][ T1939] bond_slave_1: mtu less than device minimum [ 86.098984][ T1945] bond_slave_1: mtu less than device minimum [ 86.196840][ T1948] lo: mtu less than device minimum [ 87.593435][ T1979] bond_slave_1: mtu less than device minimum [ 89.889471][ T2049] FAULT_INJECTION: forcing a failure. [ 89.889471][ T2049] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.950768][ T2049] CPU: 1 PID: 2049 Comm: syz.3.547 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 89.960526][ T2049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 89.970594][ T2049] Call Trace: [ 89.973875][ T2049] [ 89.976801][ T2049] __dump_stack+0x21/0x24 [ 89.981137][ T2049] dump_stack_lvl+0xee/0x150 [ 89.985817][ T2049] ? __cfi_dump_stack_lvl+0x8/0x8 [ 89.990850][ T2049] dump_stack+0x15/0x24 [ 89.995015][ T2049] should_fail_ex+0x3d4/0x520 [ 89.999702][ T2049] should_fail+0xb/0x10 [ 90.003859][ T2049] should_fail_usercopy+0x1a/0x20 [ 90.008895][ T2049] _copy_from_user+0x1e/0xc0 [ 90.013495][ T2049] __sys_bpf+0x277/0x780 [ 90.017733][ T2049] ? bpf_link_show_fdinfo+0x320/0x320 [ 90.023100][ T2049] ? irqentry_exit+0x37/0x40 [ 90.027692][ T2049] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 90.033494][ T2049] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 90.039648][ T2049] __x64_sys_bpf+0x7c/0x90 [ 90.044079][ T2049] x64_sys_call+0x488/0x9a0 [ 90.048674][ T2049] do_syscall_64+0x4c/0xa0 [ 90.053093][ T2049] ? clear_bhb_loop+0x30/0x80 [ 90.057764][ T2049] ? clear_bhb_loop+0x30/0x80 [ 90.062436][ T2049] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 90.068321][ T2049] RIP: 0033:0x7ff16d58ebe9 [ 90.072734][ T2049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.092338][ T2049] RSP: 002b:00007ff16e3f9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 90.100769][ T2049] RAX: ffffffffffffffda RBX: 00007ff16d7b5fa0 RCX: 00007ff16d58ebe9 [ 90.108760][ T2049] RDX: 0000000000000038 RSI: 0000200000000140 RDI: 000000000000001a [ 90.116743][ T2049] RBP: 00007ff16e3f9090 R08: 0000000000000000 R09: 0000000000000000 [ 90.124719][ T2049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.133139][ T2049] R13: 00007ff16d7b6038 R14: 00007ff16d7b5fa0 R15: 00007fffbf0e7558 [ 90.141162][ T2049] [ 91.389529][ T2095] bond_slave_1: mtu less than device minimum [ 91.570804][ T2106] bond_slave_1: mtu less than device minimum [ 92.501140][ T2145] bond_slave_1: mtu less than device minimum [ 93.653903][ T28] audit: type=1400 audit(1754692513.632:125): avc: denied { create } for pid=2187 comm="syz.4.595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 95.379606][ T2219] FAULT_INJECTION: forcing a failure. [ 95.379606][ T2219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.462598][ T2219] CPU: 0 PID: 2219 Comm: syz.1.608 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 95.472362][ T2219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 95.482423][ T2219] Call Trace: [ 95.485792][ T2219] [ 95.488718][ T2219] __dump_stack+0x21/0x24 [ 95.493057][ T2219] dump_stack_lvl+0xee/0x150 [ 95.497649][ T2219] ? __cfi_dump_stack_lvl+0x8/0x8 [ 95.502676][ T2219] dump_stack+0x15/0x24 [ 95.506827][ T2219] should_fail_ex+0x3d4/0x520 [ 95.511502][ T2219] should_fail+0xb/0x10 [ 95.515658][ T2219] should_fail_usercopy+0x1a/0x20 [ 95.520677][ T2219] _copy_from_iter+0x190/0xfd0 [ 95.525438][ T2219] ? __cfi_gfp_zone+0x10/0x10 [ 95.530118][ T2219] ? __cfi__copy_from_iter+0x10/0x10 [ 95.535408][ T2219] ? __alloc_pages+0x1c3/0x450 [ 95.540176][ T2219] ? __cfi___alloc_pages+0x10/0x10 [ 95.545285][ T2219] ? __kasan_check_write+0x14/0x20 [ 95.550400][ T2219] ? _raw_spin_lock_irq+0x8f/0xe0 [ 95.555431][ T2219] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 95.560981][ T2219] copy_page_from_iter+0x1d2/0x2b0 [ 95.566265][ T2219] pipe_write+0x7da/0x1950 [ 95.570691][ T2219] ? __cfi_pipe_write+0x10/0x10 [ 95.575538][ T2219] ? selinux_file_permission+0x3ef/0x510 [ 95.581166][ T2219] ? fsnotify_perm+0x67/0x5b0 [ 95.585871][ T2219] ? security_file_permission+0x8a/0xb0 [ 95.591418][ T2219] vfs_write+0x5db/0xca0 [ 95.595670][ T2219] ? slab_free_freelist_hook+0xc2/0x190 [ 95.601216][ T2219] ? __cfi_vfs_write+0x10/0x10 [ 95.605961][ T2219] ? __fget_files+0x2d5/0x330 [ 95.610644][ T2219] ? __fdget_pos+0x1f2/0x380 [ 95.615207][ T2219] ? ksys_write+0x71/0x240 [ 95.619603][ T2219] ksys_write+0x140/0x240 [ 95.623931][ T2219] ? __cfi_ksys_write+0x10/0x10 [ 95.628848][ T2219] ? debug_smp_processor_id+0x17/0x20 [ 95.634223][ T2219] __x64_sys_write+0x7b/0x90 [ 95.638811][ T2219] x64_sys_call+0x27b/0x9a0 [ 95.643321][ T2219] do_syscall_64+0x4c/0xa0 [ 95.647720][ T2219] ? clear_bhb_loop+0x30/0x80 [ 95.652372][ T2219] ? clear_bhb_loop+0x30/0x80 [ 95.657029][ T2219] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 95.662903][ T2219] RIP: 0033:0x7ff62658ebe9 [ 95.667296][ T2219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.686885][ T2219] RSP: 002b:00007ff62743c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 95.695360][ T2219] RAX: ffffffffffffffda RBX: 00007ff6267b5fa0 RCX: 00007ff62658ebe9 [ 95.703309][ T2219] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 95.711253][ T2219] RBP: 00007ff62743c090 R08: 0000000000000000 R09: 0000000000000000 [ 95.719199][ T2219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 95.727149][ T2219] R13: 00007ff6267b6038 R14: 00007ff6267b5fa0 R15: 00007fff02955908 [ 95.735107][ T2219] [ 95.882956][ T2233] bond_slave_1: mtu less than device minimum [ 97.673795][ T2267] bond_slave_1: mtu less than device minimum [ 98.768737][ T2286] device veth0_vlan left promiscuous mode [ 98.785437][ T2286] device veth0_vlan entered promiscuous mode [ 98.855706][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.876101][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.932205][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.270735][ T2302] bond_slave_1: mtu less than device minimum [ 100.903601][ T2337] bond_slave_1: mtu less than device minimum [ 101.453649][ T2347] bond_slave_1: mtu less than device minimum [ 102.425217][ T2380] bond_slave_1: mtu less than device minimum [ 102.541854][ T2384] bond_slave_1: mtu less than device minimum [ 104.114154][ T2419] bond_slave_1: mtu less than device minimum [ 105.142916][ T2434] FAULT_INJECTION: forcing a failure. [ 105.142916][ T2434] name failslab, interval 1, probability 0, space 0, times 0 [ 105.375700][ T2434] CPU: 1 PID: 2434 Comm: syz.1.684 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 105.385452][ T2434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 105.395504][ T2434] Call Trace: [ 105.398776][ T2434] [ 105.401696][ T2434] __dump_stack+0x21/0x24 [ 105.406030][ T2434] dump_stack_lvl+0xee/0x150 [ 105.410619][ T2434] ? __cfi_dump_stack_lvl+0x8/0x8 [ 105.415643][ T2434] ? skb_release_data+0x1d2/0x890 [ 105.420700][ T2434] ? skb_ensure_writable+0x2f8/0x470 [ 105.425985][ T2434] dump_stack+0x15/0x24 [ 105.430139][ T2434] should_fail_ex+0x3d4/0x520 [ 105.434820][ T2434] ? skb_clone+0x1f5/0x380 [ 105.439238][ T2434] __should_failslab+0xac/0xf0 [ 105.444001][ T2434] should_failslab+0x9/0x20 [ 105.448508][ T2434] kmem_cache_alloc+0x3b/0x330 [ 105.453287][ T2434] skb_clone+0x1f5/0x380 [ 105.457533][ T2434] bpf_clone_redirect+0xa7/0x3c0 [ 105.462507][ T2434] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 105.467987][ T2434] ? kasan_set_track+0x60/0x70 [ 105.472752][ T2434] ? kasan_set_track+0x4b/0x70 [ 105.477517][ T2434] ? kasan_save_alloc_info+0x25/0x30 [ 105.482805][ T2434] ? __kasan_slab_alloc+0x72/0x80 [ 105.487827][ T2434] ? slab_post_alloc_hook+0x4f/0x2d0 [ 105.493115][ T2434] ? kmem_cache_alloc+0x16e/0x330 [ 105.498140][ T2434] ? build_skb+0x2a/0x220 [ 105.502477][ T2434] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 105.508020][ T2434] ? bpf_prog_test_run+0x3e3/0x630 [ 105.513128][ T2434] ? __sys_bpf+0x56d/0x780 [ 105.517536][ T2434] ? __x64_sys_bpf+0x7c/0x90 [ 105.522127][ T2434] ? x64_sys_call+0x488/0x9a0 [ 105.526809][ T2434] ? do_syscall_64+0x4c/0xa0 [ 105.531436][ T2434] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 105.537520][ T2434] ? __kasan_check_read+0x11/0x20 [ 105.542553][ T2434] ? bpf_test_timer_continue+0x147/0x4a0 [ 105.548190][ T2434] bpf_test_run+0x349/0x8d0 [ 105.552706][ T2434] ? __kasan_slab_alloc+0x72/0x80 [ 105.557736][ T2434] ? convert___skb_to_skb+0x5b0/0x5b0 [ 105.563111][ T2434] ? __cfi_eth_type_trans+0x10/0x10 [ 105.568310][ T2434] ? convert___skb_to_skb+0x40/0x5b0 [ 105.573594][ T2434] bpf_prog_test_run_skb+0xaec/0x1290 [ 105.578971][ T2434] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 105.584784][ T2434] bpf_prog_test_run+0x3e3/0x630 [ 105.589720][ T2434] ? slab_free_freelist_hook+0xc2/0x190 [ 105.595275][ T2434] ? bpf_prog_query+0x270/0x270 [ 105.600123][ T2434] ? selinux_bpf+0xce/0xf0 [ 105.604537][ T2434] ? security_bpf+0x93/0xb0 [ 105.609044][ T2434] __sys_bpf+0x56d/0x780 [ 105.613292][ T2434] ? bpf_link_show_fdinfo+0x320/0x320 [ 105.618665][ T2434] ? __cfi_ksys_write+0x10/0x10 [ 105.623517][ T2434] ? debug_smp_processor_id+0x17/0x20 [ 105.628889][ T2434] __x64_sys_bpf+0x7c/0x90 [ 105.633314][ T2434] x64_sys_call+0x488/0x9a0 [ 105.637830][ T2434] do_syscall_64+0x4c/0xa0 [ 105.642251][ T2434] ? clear_bhb_loop+0x30/0x80 [ 105.646930][ T2434] ? clear_bhb_loop+0x30/0x80 [ 105.651602][ T2434] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 105.657492][ T2434] RIP: 0033:0x7ff62658ebe9 [ 105.661901][ T2434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.681514][ T2434] RSP: 002b:00007ff62743c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 105.689933][ T2434] RAX: ffffffffffffffda RBX: 00007ff6267b5fa0 RCX: 00007ff62658ebe9 [ 105.697906][ T2434] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 105.705874][ T2434] RBP: 00007ff62743c090 R08: 0000000000000000 R09: 0000000000000000 [ 105.713848][ T2434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 105.721824][ T2434] R13: 00007ff6267b6038 R14: 00007ff6267b5fa0 R15: 00007fff02955908 [ 105.729800][ T2434] [ 106.888434][ T2453] bond_slave_1: mtu less than device minimum [ 107.608668][ T2463] device veth0_vlan left promiscuous mode [ 107.719067][ T2463] device veth0_vlan entered promiscuous mode [ 107.734220][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.819530][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.929582][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.545311][ T28] audit: type=1400 audit(1754692531.522:126): avc: denied { create } for pid=2492 comm="syz.1.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 112.004992][ T28] audit: type=1400 audit(1754692531.982:127): avc: denied { create } for pid=2499 comm="syz.4.700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 112.394458][ T2517] device veth0_vlan left promiscuous mode [ 112.478449][ T2517] device veth0_vlan entered promiscuous mode [ 112.642646][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.669847][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.685304][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.978437][ T2576] device veth0_vlan left promiscuous mode [ 115.076249][ T2576] device veth0_vlan entered promiscuous mode [ 115.160887][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.189394][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.202886][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.905699][ T2601] : port 1(veth1) entered blocking state [ 117.012812][ T2601] : port 1(veth1) entered disabled state [ 117.044372][ T2601] device veth1 entered promiscuous mode [ 117.678126][ T2604] bond_slave_1: mtu less than device minimum [ 121.727388][ T2696] bond_slave_1: mtu less than device minimum [ 124.022055][ T2742] bond_slave_1: mtu less than device minimum [ 124.081990][ T2746] bond_slave_1: mtu less than device minimum [ 124.363593][ T2745] device veth0_vlan left promiscuous mode [ 124.475293][ T2745] device veth0_vlan entered promiscuous mode [ 124.691370][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.774534][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.811352][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 124.935123][ T2768] device veth0_vlan left promiscuous mode [ 124.949322][ T2768] device veth0_vlan entered promiscuous mode [ 124.995113][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.036763][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.113722][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.662270][ T2781] bond_slave_1: mtu less than device minimum [ 126.790618][ T28] audit: type=1400 audit(1754692546.762:128): avc: denied { write } for pid=2805 comm="syz.0.794" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 127.443443][ T2816] bond_slave_1: mtu less than device minimum [ 128.357673][ T2830] bond_slave_1: mtu less than device minimum [ 128.505813][ T2838] bond_slave_1: mtu less than device minimum [ 128.739591][ T2837] device veth0_vlan left promiscuous mode [ 128.809653][ T2837] device veth0_vlan entered promiscuous mode [ 128.901363][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.912040][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.919779][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.809834][ T2868] bond_slave_1: mtu less than device minimum [ 131.533605][ T2899] bond_slave_1: mtu less than device minimum [ 132.649300][ T2935] bond_slave_1: mtu less than device minimum [ 133.404108][ T2950] Driver unsupported XDP return value 0 on prog (id 985) dev N/A, expect packet loss! [ 133.652054][ T2952] device syzkaller0 entered promiscuous mode [ 137.564688][ T3040] device veth1_macvtap entered promiscuous mode [ 137.626528][ T3040] device macsec0 entered promiscuous mode [ 137.636617][ T3037] device wg2 entered promiscuous mode [ 137.681325][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 137.828876][ T3047] bond_slave_1: mtu less than device minimum [ 138.232743][ T3060] bond_slave_1: mtu less than device minimum [ 139.179123][ T3089] bond_slave_1: mtu less than device minimum [ 139.221328][ T3083] device veth0_vlan left promiscuous mode [ 139.259881][ T3083] device veth0_vlan entered promiscuous mode [ 139.362509][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.381049][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.438159][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.662147][ T3118] bond_slave_1: mtu less than device minimum [ 139.810002][ T3124] bond_slave_1: mtu less than device minimum [ 139.845485][ T3128] bond_slave_1: mtu less than device minimum [ 139.856163][ T3125] device veth1_macvtap left promiscuous mode [ 139.862260][ T3125] device macsec0 entered promiscuous mode [ 139.967256][ T3132] : port 1(veth0) entered blocking state [ 139.976573][ T3132] : port 1(veth0) entered disabled state [ 140.023976][ T3132] device veth0 entered promiscuous mode [ 140.428759][ T3156] bond_slave_1: mtu less than device minimum [ 140.909402][ T3170] bond_slave_1: mtu less than device minimum [ 141.256483][ T3174] device veth1_macvtap left promiscuous mode [ 141.331528][ T28] audit: type=1400 audit(1754692561.302:129): avc: denied { create } for pid=3159 comm="syz.3.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 141.481289][ T3195] bond_slave_1: mtu less than device minimum [ 143.638726][ T3233] bond_slave_1: mtu less than device minimum [ 145.000299][ T3253] : port 2(veth0) entered blocking state [ 145.142534][ T3253] : port 2(veth0) entered disabled state [ 145.178672][ T3253] device veth0 entered promiscuous mode [ 145.256502][ T3264] bond_slave_1: mtu less than device minimum [ 147.483980][ T3312] syz.4.963[3312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.484060][ T3312] syz.4.963[3312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.766258][ T3320] device veth1_macvtap left promiscuous mode [ 147.784937][ T3318] : port 1(veth1) entered blocking state [ 147.790683][ T3318] : port 1(veth1) entered disabled state [ 147.808065][ T3318] device veth1 entered promiscuous mode [ 147.886621][ T3328] device veth0_vlan left promiscuous mode [ 147.903661][ T3328] device veth0_vlan entered promiscuous mode [ 147.910766][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.920448][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.929366][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.044215][ T3337] device sit0 left promiscuous mode [ 148.210479][ T3338] device sit0 entered promiscuous mode [ 148.894658][ T3355] device veth1_macvtap left promiscuous mode [ 148.914568][ T3355] device macsec0 entered promiscuous mode [ 149.113521][ T3363] : port 1(veth1) entered blocking state [ 149.119330][ T3363] : port 1(veth1) entered disabled state [ 149.125734][ T3363] device veth1 entered promiscuous mode [ 149.239261][ T3371] FAULT_INJECTION: forcing a failure. [ 149.239261][ T3371] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 149.252433][ T3371] CPU: 1 PID: 3371 Comm: syz.2.985 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 149.262152][ T3371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 149.272207][ T3371] Call Trace: [ 149.275492][ T3371] [ 149.278424][ T3371] __dump_stack+0x21/0x24 [ 149.282763][ T3371] dump_stack_lvl+0xee/0x150 [ 149.287526][ T3371] ? __cfi_dump_stack_lvl+0x8/0x8 [ 149.292550][ T3371] ? __kmalloc_node+0x125/0x1e0 [ 149.297405][ T3371] dump_stack+0x15/0x24 [ 149.301571][ T3371] should_fail_ex+0x3d4/0x520 [ 149.306262][ T3371] should_fail+0xb/0x10 [ 149.310425][ T3371] should_fail_usercopy+0x1a/0x20 [ 149.315450][ T3371] _copy_from_user+0x1e/0xc0 [ 149.320037][ T3371] btf_new_fd+0x349/0x7d0 [ 149.324369][ T3371] bpf_btf_load+0x6f/0x90 [ 149.328693][ T3371] __sys_bpf+0x556/0x780 [ 149.332933][ T3371] ? bpf_link_show_fdinfo+0x320/0x320 [ 149.338301][ T3371] ? __cfi_ksys_write+0x10/0x10 [ 149.343145][ T3371] ? do_user_addr_fault+0x9ac/0x1050 [ 149.348423][ T3371] ? debug_smp_processor_id+0x17/0x20 [ 149.353801][ T3371] __x64_sys_bpf+0x7c/0x90 [ 149.358220][ T3371] x64_sys_call+0x488/0x9a0 [ 149.362720][ T3371] do_syscall_64+0x4c/0xa0 [ 149.367137][ T3371] ? clear_bhb_loop+0x30/0x80 [ 149.371809][ T3371] ? clear_bhb_loop+0x30/0x80 [ 149.376479][ T3371] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 149.382448][ T3371] RIP: 0033:0x7f1fbb38ebe9 [ 149.386852][ T3371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.406449][ T3371] RSP: 002b:00007f1fbc1fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 149.414963][ T3371] RAX: ffffffffffffffda RBX: 00007f1fbb5b5fa0 RCX: 00007f1fbb38ebe9 [ 149.422935][ T3371] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000012 [ 149.430897][ T3371] RBP: 00007f1fbc1fe090 R08: 0000000000000000 R09: 0000000000000000 [ 149.438862][ T3371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.446824][ T3371] R13: 00007f1fbb5b6038 R14: 00007f1fbb5b5fa0 R15: 00007ffe818dfd48 [ 149.454794][ T3371] [ 149.831665][ T3401] : port 2(veth1) entered blocking state [ 149.837548][ T3401] : port 2(veth1) entered disabled state [ 149.843780][ T3401] device veth1 entered promiscuous mode [ 149.909824][ T3407] bond_slave_1: mtu less than device minimum [ 151.992190][ T3481] bond_slave_1: mtu less than device minimum [ 152.030642][ T3476] FAULT_INJECTION: forcing a failure. [ 152.030642][ T3476] name failslab, interval 1, probability 0, space 0, times 0 [ 152.202866][ T3476] CPU: 0 PID: 3476 Comm: syz.4.1019 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 152.212728][ T3476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 152.222873][ T3476] Call Trace: [ 152.226152][ T3476] [ 152.229082][ T3476] __dump_stack+0x21/0x24 [ 152.233428][ T3476] dump_stack_lvl+0xee/0x150 [ 152.238018][ T3476] ? __cfi_dump_stack_lvl+0x8/0x8 [ 152.243048][ T3476] dump_stack+0x15/0x24 [ 152.247238][ T3476] should_fail_ex+0x3d4/0x520 [ 152.251920][ T3476] ? prepare_creds+0x2f/0x640 [ 152.256595][ T3476] __should_failslab+0xac/0xf0 [ 152.261359][ T3476] should_failslab+0x9/0x20 [ 152.265861][ T3476] kmem_cache_alloc+0x3b/0x330 [ 152.270632][ T3476] prepare_creds+0x2f/0x640 [ 152.275132][ T3476] copy_creds+0xe4/0x640 [ 152.279377][ T3476] ? kasan_check_range+0x5c/0x290 [ 152.284404][ T3476] copy_process+0x828/0x3470 [ 152.289007][ T3476] ? irqentry_exit+0x37/0x40 [ 152.293596][ T3476] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 152.299399][ T3476] ? idle_dummy+0x10/0x10 [ 152.303736][ T3476] kernel_clone+0x23a/0x810 [ 152.308246][ T3476] ? __cfi_kernel_clone+0x10/0x10 [ 152.313287][ T3476] __x64_sys_clone+0x168/0x1b0 [ 152.318060][ T3476] ? __cfi___x64_sys_clone+0x10/0x10 [ 152.323359][ T3476] ? __bpf_trace_sys_enter+0x62/0x70 [ 152.328732][ T3476] ? trace_sys_enter+0x3d/0x50 [ 152.333496][ T3476] x64_sys_call+0x990/0x9a0 [ 152.337999][ T3476] do_syscall_64+0x4c/0xa0 [ 152.342420][ T3476] ? clear_bhb_loop+0x30/0x80 [ 152.347097][ T3476] ? clear_bhb_loop+0x30/0x80 [ 152.351773][ T3476] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.357661][ T3476] RIP: 0033:0x7f70f4f8ebe9 [ 152.362071][ T3476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.381682][ T3476] RSP: 002b:00007f70f5d51fe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 152.390121][ T3476] RAX: ffffffffffffffda RBX: 00007f70f51b5fa0 RCX: 00007f70f4f8ebe9 [ 152.398110][ T3476] RDX: 0000200000000a00 RSI: 0000000000000000 RDI: 00000000c0001480 [ 152.406086][ T3476] RBP: 00007f70f5d52090 R08: 0000000000000000 R09: 0000000000000000 [ 152.414056][ T3476] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 152.422029][ T3476] R13: 00007f70f51b6038 R14: 00007f70f51b5fa0 R15: 00007ffc6e9dcea8 [ 152.430100][ T3476] [ 152.684913][ T3493] bond_slave_1: mtu less than device minimum [ 153.384873][ T3502] bond_slave_1: mtu less than device minimum [ 153.691425][ T3504] device veth1_macvtap left promiscuous mode [ 153.913829][ T3516] bond_slave_1: mtu less than device minimum [ 154.401157][ T3531] bond_slave_1: mtu less than device minimum [ 154.574693][ T3543] bond_slave_1: mtu less than device minimum [ 156.922586][ T3564] bond_slave_1: mtu less than device minimum [ 158.403973][ T3582] device pim6reg1 entered promiscuous mode [ 158.965629][ T3599] bond_slave_1: mtu less than device minimum [ 160.289847][ T3618] device veth0_vlan left promiscuous mode [ 160.446313][ T3618] device veth0_vlan entered promiscuous mode [ 160.503636][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.519185][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.533443][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.584095][ T3629] : port 2(veth0) entered blocking state [ 160.616157][ T3629] : port 2(veth0) entered disabled state [ 160.623068][ T3629] device veth0 entered promiscuous mode [ 161.350998][ T3643] bond_slave_1: mtu less than device minimum [ 163.075936][ T3687] FAULT_INJECTION: forcing a failure. [ 163.075936][ T3687] name failslab, interval 1, probability 0, space 0, times 0 [ 163.088619][ T3687] CPU: 0 PID: 3687 Comm: syz.1.1087 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 163.098424][ T3687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 163.108475][ T3687] Call Trace: [ 163.111743][ T3687] [ 163.114676][ T3687] __dump_stack+0x21/0x24 [ 163.119008][ T3687] dump_stack_lvl+0xee/0x150 [ 163.123594][ T3687] ? __cfi_dump_stack_lvl+0x8/0x8 [ 163.128619][ T3687] ? kasan_set_track+0x60/0x70 [ 163.133376][ T3687] ? kasan_save_alloc_info+0x25/0x30 [ 163.138654][ T3687] ? __kasan_slab_alloc+0x72/0x80 [ 163.143669][ T3687] ? slab_post_alloc_hook+0x4f/0x2d0 [ 163.148971][ T3687] ? kmem_cache_alloc+0x16e/0x330 [ 163.153990][ T3687] dump_stack+0x15/0x24 [ 163.158143][ T3687] should_fail_ex+0x3d4/0x520 [ 163.162823][ T3687] __should_failslab+0xac/0xf0 [ 163.167587][ T3687] ? ref_tracker_alloc+0x139/0x430 [ 163.172696][ T3687] should_failslab+0x9/0x20 [ 163.177200][ T3687] __kmem_cache_alloc_node+0x3d/0x2c0 [ 163.182573][ T3687] ? ref_tracker_alloc+0x139/0x430 [ 163.187675][ T3687] kmalloc_trace+0x29/0xb0 [ 163.192097][ T3687] ref_tracker_alloc+0x139/0x430 [ 163.197114][ T3687] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 163.202582][ T3687] ? slab_post_alloc_hook+0x6d/0x2d0 [ 163.208041][ T3687] ? __slab_alloc+0x6b/0xa0 [ 163.212542][ T3687] dst_init+0xc4/0x3d0 [ 163.216607][ T3687] dst_alloc+0x191/0x1e0 [ 163.220842][ T3687] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 163.226904][ T3687] ip_route_output_flow+0x12e/0x2e0 [ 163.232096][ T3687] ? arch_stack_walk+0xfc/0x150 [ 163.236953][ T3687] ? __cfi_ip_route_output_flow+0x10/0x10 [ 163.242669][ T3687] ip_tunnel_xmit+0xa4b/0x2700 [ 163.247438][ T3687] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 163.252646][ T3687] ? __kasan_check_write+0x14/0x20 [ 163.257769][ T3687] ? gre_build_header+0x25d/0x9b0 [ 163.262802][ T3687] ipgre_xmit+0x80b/0xb90 [ 163.267138][ T3687] dev_hard_start_xmit+0x20b/0x750 [ 163.272248][ T3687] __dev_queue_xmit+0x18d9/0x3420 [ 163.277271][ T3687] ? __dev_queue_xmit+0x250/0x3420 [ 163.282391][ T3687] ? __cfi___dev_queue_xmit+0x10/0x10 [ 163.287762][ T3687] ? __kasan_check_write+0x14/0x20 [ 163.292876][ T3687] ? skb_release_data+0x1d2/0x890 [ 163.297896][ T3687] ? skb_ensure_writable+0x2f8/0x470 [ 163.303178][ T3687] ? __kasan_check_write+0x14/0x20 [ 163.308551][ T3687] ? pskb_expand_head+0xc4a/0x1210 [ 163.313657][ T3687] __bpf_redirect+0x8db/0x1130 [ 163.318432][ T3687] bpf_clone_redirect+0x26a/0x3c0 [ 163.323471][ T3687] bpf_prog_208b094576c80b22+0x56/0x5b [ 163.328931][ T3687] ? kasan_set_track+0x60/0x70 [ 163.333691][ T3687] ? kasan_set_track+0x4b/0x70 [ 163.338454][ T3687] ? kasan_save_alloc_info+0x25/0x30 [ 163.343749][ T3687] ? __kasan_slab_alloc+0x72/0x80 [ 163.348770][ T3687] ? slab_post_alloc_hook+0x4f/0x2d0 [ 163.354053][ T3687] ? kmem_cache_alloc+0x16e/0x330 [ 163.359160][ T3687] ? build_skb+0x2a/0x220 [ 163.363493][ T3687] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 163.369039][ T3687] ? bpf_prog_test_run+0x3e3/0x630 [ 163.374163][ T3687] ? __sys_bpf+0x56d/0x780 [ 163.378600][ T3687] ? __x64_sys_bpf+0x7c/0x90 [ 163.383191][ T3687] ? x64_sys_call+0x488/0x9a0 [ 163.387863][ T3687] ? do_syscall_64+0x4c/0xa0 [ 163.392458][ T3687] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 163.398531][ T3687] ? ktime_get+0x141/0x170 [ 163.403202][ T3687] bpf_test_run+0x349/0x8d0 [ 163.407692][ T3687] ? convert___skb_to_skb+0x5b0/0x5b0 [ 163.413060][ T3687] ? __cfi_eth_type_trans+0x10/0x10 [ 163.418328][ T3687] ? convert___skb_to_skb+0x40/0x5b0 [ 163.423596][ T3687] bpf_prog_test_run_skb+0xaec/0x1290 [ 163.428952][ T3687] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 163.434737][ T3687] bpf_prog_test_run+0x3e3/0x630 [ 163.439662][ T3687] ? slab_free_freelist_hook+0xc2/0x190 [ 163.445207][ T3687] ? bpf_prog_query+0x270/0x270 [ 163.450045][ T3687] ? selinux_bpf+0xce/0xf0 [ 163.454457][ T3687] ? security_bpf+0x93/0xb0 [ 163.458960][ T3687] __sys_bpf+0x56d/0x780 [ 163.463189][ T3687] ? bpf_link_show_fdinfo+0x320/0x320 [ 163.468558][ T3687] ? __cfi_ksys_write+0x10/0x10 [ 163.473395][ T3687] ? __bpf_trace_sys_enter+0x62/0x70 [ 163.478836][ T3687] __x64_sys_bpf+0x7c/0x90 [ 163.483252][ T3687] x64_sys_call+0x488/0x9a0 [ 163.487760][ T3687] do_syscall_64+0x4c/0xa0 [ 163.492159][ T3687] ? clear_bhb_loop+0x30/0x80 [ 163.496828][ T3687] ? clear_bhb_loop+0x30/0x80 [ 163.501486][ T3687] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 163.507358][ T3687] RIP: 0033:0x7ff62658ebe9 [ 163.511752][ T3687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 163.531338][ T3687] RSP: 002b:00007ff62743c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 163.539745][ T3687] RAX: ffffffffffffffda RBX: 00007ff6267b5fa0 RCX: 00007ff62658ebe9 [ 163.547701][ T3687] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 163.555653][ T3687] RBP: 00007ff62743c090 R08: 0000000000000000 R09: 0000000000000000 [ 163.563603][ T3687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 163.571560][ T3687] R13: 00007ff6267b6038 R14: 00007ff6267b5fa0 R15: 00007fff02955908 [ 163.579625][ T3687] [ 163.582718][ T3687] memory allocation failure, unreliable refcount tracker. [ 163.661620][ T3693] bond_slave_1: mtu less than device minimum [ 166.005484][ T3739] bond_slave_1: mtu less than device minimum [ 166.207392][ T3746] device macsec0 left promiscuous mode [ 166.413872][ T3746] device veth1_macvtap entered promiscuous mode [ 166.421059][ T3746] device macsec0 entered promiscuous mode [ 166.530371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 166.787557][ T3758] device veth1_macvtap left promiscuous mode [ 167.238779][ T3775] bond_slave_1: mtu less than device minimum [ 167.874097][ T28] audit: type=1400 audit(1754692587.852:130): avc: denied { create } for pid=3781 comm="syz.1.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 168.416420][ T3794] device macsec0 left promiscuous mode [ 168.478419][ T3797] device veth1_macvtap entered promiscuous mode [ 168.494292][ T3797] device macsec0 entered promiscuous mode [ 168.583909][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.958023][ T3807] bond_slave_1: mtu less than device minimum [ 169.382405][ T3822] bond_slave_1: mtu less than device minimum [ 169.924394][ T3834] device veth1_macvtap left promiscuous mode [ 169.973619][ T3840] device macsec0 left promiscuous mode [ 169.991838][ T3840] device veth1_macvtap entered promiscuous mode [ 169.999547][ T3840] device macsec0 entered promiscuous mode [ 170.068541][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 170.134392][ T3849] bond_slave_1: mtu less than device minimum [ 171.289814][ T3867] device syzkaller0 entered promiscuous mode [ 172.351748][ T3905] bond_slave_1: mtu less than device minimum [ 173.300558][ T3939] device macsec0 left promiscuous mode [ 173.421937][ T3941] bond_slave_1: mtu less than device minimum [ 173.433094][ T3939] device veth1_macvtap entered promiscuous mode [ 173.445184][ T3939] device macsec0 entered promiscuous mode [ 173.477307][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 173.684959][ T3958] bond_slave_1: mtu greater than device maximum [ 173.986154][ T3969] device pim6reg1 entered promiscuous mode [ 174.068486][ T3969] FAULT_INJECTION: forcing a failure. [ 174.068486][ T3969] name failslab, interval 1, probability 0, space 0, times 0 [ 174.098596][ T3969] CPU: 0 PID: 3969 Comm: syz.4.1173 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 174.108545][ T3969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 174.118635][ T3969] Call Trace: [ 174.121926][ T3969] [ 174.124862][ T3969] __dump_stack+0x21/0x24 [ 174.129220][ T3969] dump_stack_lvl+0xee/0x150 [ 174.133934][ T3969] ? __cfi_dump_stack_lvl+0x8/0x8 [ 174.138967][ T3969] ? __kasan_check_write+0x14/0x20 [ 174.144170][ T3969] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 174.149640][ T3969] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 174.155655][ T3969] dump_stack+0x15/0x24 [ 174.159826][ T3969] should_fail_ex+0x3d4/0x520 [ 174.164515][ T3969] __should_failslab+0xac/0xf0 [ 174.169298][ T3969] ? ____ip_mc_inc_group+0x1ab/0x860 [ 174.174607][ T3969] should_failslab+0x9/0x20 [ 174.179121][ T3969] __kmem_cache_alloc_node+0x3d/0x2c0 [ 174.184500][ T3969] ? ____ip_mc_inc_group+0x1ab/0x860 [ 174.189793][ T3969] kmalloc_trace+0x29/0xb0 [ 174.194222][ T3969] ____ip_mc_inc_group+0x1ab/0x860 [ 174.199340][ T3969] ip_mc_up+0x112/0x1f0 [ 174.203607][ T3969] inetdev_event+0xc7e/0x10e0 [ 174.208301][ T3969] ? __cfi_inetdev_event+0x10/0x10 [ 174.213439][ T3969] ? arp_netdev_event+0xd4/0x2b0 [ 174.218477][ T3969] raw_notifier_call_chain+0xa1/0x110 [ 174.223859][ T3969] __dev_notify_flags+0x28f/0x500 [ 174.228975][ T3969] ? __cfi___dev_notify_flags+0x10/0x10 [ 174.234540][ T3969] ? __dev_change_flags+0x521/0x6b0 [ 174.239767][ T3969] ? __cfi___dev_change_flags+0x10/0x10 [ 174.245351][ T3969] dev_change_flags+0xe8/0x1a0 [ 174.250136][ T3969] dev_ifsioc+0x159/0xed0 [ 174.254550][ T3969] ? dev_ioctl+0xd10/0xd10 [ 174.259131][ T3969] ? __kasan_check_write+0x14/0x20 [ 174.264348][ T3969] ? mutex_lock+0x8d/0x1a0 [ 174.268776][ T3969] ? __cfi_mutex_lock+0x10/0x10 [ 174.273720][ T3969] ? dev_get_by_name_rcu+0xe5/0x130 [ 174.278930][ T3969] dev_ioctl+0x556/0xd10 [ 174.283184][ T3969] sock_do_ioctl+0x23f/0x310 [ 174.287782][ T3969] ? sock_show_fdinfo+0xb0/0xb0 [ 174.292634][ T3969] ? selinux_file_ioctl+0x377/0x480 [ 174.297844][ T3969] sock_ioctl+0x4d8/0x6e0 [ 174.302183][ T3969] ? __cfi_sock_ioctl+0x10/0x10 [ 174.307121][ T3969] ? __fget_files+0x2d5/0x330 [ 174.311853][ T3969] ? security_file_ioctl+0x95/0xc0 [ 174.316971][ T3969] ? __cfi_sock_ioctl+0x10/0x10 [ 174.321828][ T3969] __se_sys_ioctl+0x12f/0x1b0 [ 174.326508][ T3969] __x64_sys_ioctl+0x7b/0x90 [ 174.331196][ T3969] x64_sys_call+0x58b/0x9a0 [ 174.335719][ T3969] do_syscall_64+0x4c/0xa0 [ 174.340139][ T3969] ? clear_bhb_loop+0x30/0x80 [ 174.344812][ T3969] ? clear_bhb_loop+0x30/0x80 [ 174.349577][ T3969] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 174.355489][ T3969] RIP: 0033:0x7f70f4f8ebe9 [ 174.359914][ T3969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.379539][ T3969] RSP: 002b:00007f70f5d52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 174.388244][ T3969] RAX: ffffffffffffffda RBX: 00007f70f51b5fa0 RCX: 00007f70f4f8ebe9 [ 174.396481][ T3969] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 174.404474][ T3969] RBP: 00007f70f5d52090 R08: 0000000000000000 R09: 0000000000000000 [ 174.412552][ T3969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.420532][ T3969] R13: 00007f70f51b6038 R14: 00007f70f51b5fa0 R15: 00007ffc6e9dcea8 [ 174.428520][ T3969] [ 174.642159][ T3982] bond_slave_1: mtu less than device minimum [ 174.930084][ T3991] : port 2(dummy0) entered blocking state [ 174.963187][ T3991] : port 2(dummy0) entered disabled state [ 175.022080][ T3991] device dummy0 entered promiscuous mode [ 175.089655][ T3995] device veth1_macvtap left promiscuous mode [ 175.698979][ T4015] device veth0_vlan left promiscuous mode [ 175.724933][ T4015] device veth0_vlan entered promiscuous mode [ 175.794726][ T4024] bond_slave_1: mtu less than device minimum [ 175.800908][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.811338][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.821277][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.004537][ T4028] device veth0_vlan left promiscuous mode [ 176.029283][ T4028] device veth0_vlan entered promiscuous mode [ 176.151948][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.173119][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.199366][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.846435][ T4040] device syzkaller0 entered promiscuous mode [ 177.537743][ T4062] bond_slave_1: mtu less than device minimum [ 178.596648][ T4075] device pim6reg1 entered promiscuous mode [ 182.978887][ T4105] bond_slave_1: mtu less than device minimum [ 183.449582][ T4127] device sit0 left promiscuous mode [ 183.477100][ T4128] device sit0 entered promiscuous mode [ 184.698331][ T4145] bond_slave_1: mtu less than device minimum [ 186.224374][ T4171] device veth0_vlan left promiscuous mode [ 186.244414][ T4171] device veth0_vlan entered promiscuous mode [ 186.310424][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.331945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.361555][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.701043][ T4264] device veth0_vlan left promiscuous mode [ 190.757477][ T4264] device veth0_vlan entered promiscuous mode [ 191.001568][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.039480][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.140289][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.854670][ T4302] device pim6reg1 entered promiscuous mode [ 191.951078][ T4300] device sit0 left promiscuous mode [ 192.384688][ T4305] device sit0 entered promiscuous mode [ 192.946585][ T4323] device syzkaller0 entered promiscuous mode [ 193.879500][ T4353] device veth1_macvtap left promiscuous mode [ 194.308943][ T4368] device sit0 entered promiscuous mode [ 194.844818][ T4379] FAULT_INJECTION: forcing a failure. [ 194.844818][ T4379] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 194.984760][ T4379] CPU: 1 PID: 4379 Comm: syz.3.1292 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 194.994615][ T4379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 195.004679][ T4379] Call Trace: [ 195.007970][ T4379] [ 195.010893][ T4379] __dump_stack+0x21/0x24 [ 195.015244][ T4379] dump_stack_lvl+0xee/0x150 [ 195.019843][ T4379] ? __cfi_dump_stack_lvl+0x8/0x8 [ 195.024868][ T4379] dump_stack+0x15/0x24 [ 195.029022][ T4379] should_fail_ex+0x3d4/0x520 [ 195.033786][ T4379] should_fail+0xb/0x10 [ 195.037953][ T4379] should_fail_usercopy+0x1a/0x20 [ 195.042977][ T4379] _copy_from_user+0x1e/0xc0 [ 195.047568][ T4379] ip_tunnel_siocdevprivate+0xa3/0x1d0 [ 195.053026][ T4379] ? __cfi_ip_tunnel_siocdevprivate+0x10/0x10 [ 195.059100][ T4379] ? do_vfs_ioctl+0xc36/0x1c80 [ 195.063865][ T4379] ? __ia32_compat_sys_ioctl+0x790/0x790 [ 195.069497][ T4379] ipip6_tunnel_siocdevprivate+0x1de/0xc80 [ 195.075301][ T4379] ? __cfi_ipip6_tunnel_siocdevprivate+0x10/0x10 [ 195.081625][ T4379] ? full_name_hash+0x9d/0xf0 [ 195.086296][ T4379] dev_ifsioc+0xbc4/0xed0 [ 195.090625][ T4379] ? ioctl_has_perm+0x391/0x4c0 [ 195.095473][ T4379] ? dev_ioctl+0xd10/0xd10 [ 195.099897][ T4379] ? __kasan_check_write+0x14/0x20 [ 195.105021][ T4379] ? mutex_lock+0x8d/0x1a0 [ 195.109454][ T4379] ? __cfi_mutex_lock+0x10/0x10 [ 195.114309][ T4379] ? dev_get_by_name_rcu+0xe5/0x130 [ 195.119531][ T4379] dev_ioctl+0x5f3/0xd10 [ 195.123777][ T4379] sock_ioctl+0x675/0x6e0 [ 195.128112][ T4379] ? __cfi_sock_ioctl+0x10/0x10 [ 195.132986][ T4379] ? security_file_ioctl+0x95/0xc0 [ 195.138104][ T4379] ? __cfi_sock_ioctl+0x10/0x10 [ 195.142957][ T4379] __se_sys_ioctl+0x12f/0x1b0 [ 195.147635][ T4379] __x64_sys_ioctl+0x7b/0x90 [ 195.152231][ T4379] x64_sys_call+0x58b/0x9a0 [ 195.156729][ T4379] do_syscall_64+0x4c/0xa0 [ 195.161161][ T4379] ? clear_bhb_loop+0x30/0x80 [ 195.165834][ T4379] ? clear_bhb_loop+0x30/0x80 [ 195.170507][ T4379] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 195.176402][ T4379] RIP: 0033:0x7ff16d58ebe9 [ 195.180818][ T4379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.200420][ T4379] RSP: 002b:00007ff16e3f9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 195.208849][ T4379] RAX: ffffffffffffffda RBX: 00007ff16d7b5fa0 RCX: 00007ff16d58ebe9 [ 195.216820][ T4379] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 195.224795][ T4379] RBP: 00007ff16e3f9090 R08: 0000000000000000 R09: 0000000000000000 [ 195.232775][ T4379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.240739][ T4379] R13: 00007ff16d7b6038 R14: 00007ff16d7b5fa0 R15: 00007fffbf0e7558 [ 195.248711][ T4379] [ 198.864093][ T4441] device wg2 left promiscuous mode [ 198.968879][ T4441] device wg2 entered promiscuous mode [ 201.228551][ T4492] bond_slave_1: mtu less than device minimum [ 201.562557][ T4508] device syzkaller0 entered promiscuous mode [ 203.974633][ T4573] device veth0_vlan left promiscuous mode [ 203.993306][ T4573] device veth0_vlan entered promiscuous mode [ 204.127627][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.136420][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.144274][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.242314][ T4577] device veth0_vlan left promiscuous mode [ 204.253310][ T4577] device veth0_vlan entered promiscuous mode [ 204.263378][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.271816][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.280488][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.599769][ T4718] device sit0 left promiscuous mode [ 211.229745][ T4711] device veth0_vlan left promiscuous mode [ 211.250952][ T4711] device veth0_vlan entered promiscuous mode [ 211.317868][ T4721] device sit0 entered promiscuous mode [ 211.438418][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.446965][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.454819][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.547217][ T4742] FAULT_INJECTION: forcing a failure. [ 211.547217][ T4742] name failslab, interval 1, probability 0, space 0, times 0 [ 211.559875][ T4742] CPU: 1 PID: 4742 Comm: syz.3.1395 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 211.569693][ T4742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 211.579766][ T4742] Call Trace: [ 211.583054][ T4742] [ 211.585989][ T4742] __dump_stack+0x21/0x24 [ 211.590327][ T4742] dump_stack_lvl+0xee/0x150 [ 211.594917][ T4742] ? __cfi_dump_stack_lvl+0x8/0x8 [ 211.599943][ T4742] ? kasan_set_track+0x60/0x70 [ 211.604704][ T4742] ? kasan_save_alloc_info+0x25/0x30 [ 211.609989][ T4742] ? __kasan_slab_alloc+0x72/0x80 [ 211.615008][ T4742] ? slab_post_alloc_hook+0x4f/0x2d0 [ 211.620289][ T4742] ? kmem_cache_alloc+0x16e/0x330 [ 211.625314][ T4742] dump_stack+0x15/0x24 [ 211.629475][ T4742] should_fail_ex+0x3d4/0x520 [ 211.634158][ T4742] __should_failslab+0xac/0xf0 [ 211.639029][ T4742] ? ref_tracker_alloc+0x139/0x430 [ 211.644133][ T4742] should_failslab+0x9/0x20 [ 211.648643][ T4742] __kmem_cache_alloc_node+0x3d/0x2c0 [ 211.654029][ T4742] ? ref_tracker_alloc+0x139/0x430 [ 211.659148][ T4742] kmalloc_trace+0x29/0xb0 [ 211.663628][ T4742] ref_tracker_alloc+0x139/0x430 [ 211.668578][ T4742] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 211.674049][ T4742] ? slab_post_alloc_hook+0x6d/0x2d0 [ 211.679425][ T4742] dst_init+0xc4/0x3d0 [ 211.683479][ T4742] dst_alloc+0x191/0x1e0 [ 211.687713][ T4742] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 211.693852][ T4742] ip_route_output_flow+0x12e/0x2e0 [ 211.699029][ T4742] ? arch_stack_walk+0xfc/0x150 [ 211.703871][ T4742] ? __cfi_ip_route_output_flow+0x10/0x10 [ 211.709572][ T4742] ip_tunnel_xmit+0xa4b/0x2700 [ 211.714320][ T4742] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 211.719587][ T4742] ? unwind_get_return_address+0x4d/0x90 [ 211.725196][ T4742] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 211.731416][ T4742] ? gre_build_header+0x25d/0x9b0 [ 211.736426][ T4742] ipgre_xmit+0x80b/0xb90 [ 211.740745][ T4742] dev_hard_start_xmit+0x20b/0x750 [ 211.745929][ T4742] __dev_queue_xmit+0x18d9/0x3420 [ 211.750939][ T4742] ? __dev_queue_xmit+0x250/0x3420 [ 211.756029][ T4742] ? __cfi___dev_queue_xmit+0x10/0x10 [ 211.761382][ T4742] ? __kasan_check_write+0x14/0x20 [ 211.766500][ T4742] ? skb_release_data+0x1d2/0x890 [ 211.771597][ T4742] ? skb_ensure_writable+0x2f8/0x470 [ 211.776866][ T4742] ? __kasan_check_write+0x14/0x20 [ 211.781961][ T4742] ? pskb_expand_head+0xc4a/0x1210 [ 211.787065][ T4742] __bpf_redirect+0x8db/0x1130 [ 211.791842][ T4742] bpf_clone_redirect+0x26a/0x3c0 [ 211.796856][ T4742] bpf_prog_208b094576c80b22+0x56/0x5b [ 211.802297][ T4742] ? kasan_set_track+0x60/0x70 [ 211.807057][ T4742] ? kasan_set_track+0x4b/0x70 [ 211.811801][ T4742] ? kasan_save_alloc_info+0x25/0x30 [ 211.817076][ T4742] ? __kasan_slab_alloc+0x72/0x80 [ 211.822079][ T4742] ? slab_post_alloc_hook+0x4f/0x2d0 [ 211.827346][ T4742] ? kmem_cache_alloc+0x16e/0x330 [ 211.832352][ T4742] ? build_skb+0x2a/0x220 [ 211.836664][ T4742] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 211.842197][ T4742] ? bpf_prog_test_run+0x3e3/0x630 [ 211.847294][ T4742] ? __sys_bpf+0x56d/0x780 [ 211.851691][ T4742] ? __x64_sys_bpf+0x7c/0x90 [ 211.856264][ T4742] ? x64_sys_call+0x488/0x9a0 [ 211.860925][ T4742] ? do_syscall_64+0x4c/0xa0 [ 211.865502][ T4742] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 211.871646][ T4742] ? ktime_get+0x141/0x170 [ 211.876050][ T4742] bpf_test_run+0x349/0x8d0 [ 211.880550][ T4742] ? convert___skb_to_skb+0x5b0/0x5b0 [ 211.885904][ T4742] ? __cfi_eth_type_trans+0x10/0x10 [ 211.891174][ T4742] ? convert___skb_to_skb+0x40/0x5b0 [ 211.896451][ T4742] bpf_prog_test_run_skb+0xaec/0x1290 [ 211.901965][ T4742] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 211.908105][ T4742] bpf_prog_test_run+0x3e3/0x630 [ 211.913039][ T4742] ? slab_free_freelist_hook+0xc2/0x190 [ 211.918593][ T4742] ? bpf_prog_query+0x270/0x270 [ 211.923436][ T4742] ? selinux_bpf+0xce/0xf0 [ 211.927850][ T4742] ? security_bpf+0x93/0xb0 [ 211.932362][ T4742] __sys_bpf+0x56d/0x780 [ 211.936603][ T4742] ? bpf_link_show_fdinfo+0x320/0x320 [ 211.941970][ T4742] ? __cfi_ksys_write+0x10/0x10 [ 211.946817][ T4742] ? debug_smp_processor_id+0x17/0x20 [ 211.952175][ T4742] __x64_sys_bpf+0x7c/0x90 [ 211.956585][ T4742] x64_sys_call+0x488/0x9a0 [ 211.961074][ T4742] do_syscall_64+0x4c/0xa0 [ 211.965474][ T4742] ? clear_bhb_loop+0x30/0x80 [ 211.970134][ T4742] ? clear_bhb_loop+0x30/0x80 [ 211.974888][ T4742] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 211.980768][ T4742] RIP: 0033:0x7ff16d58ebe9 [ 211.985167][ T4742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 212.004761][ T4742] RSP: 002b:00007ff16e3f9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.013176][ T4742] RAX: ffffffffffffffda RBX: 00007ff16d7b5fa0 RCX: 00007ff16d58ebe9 [ 212.021137][ T4742] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 212.029091][ T4742] RBP: 00007ff16e3f9090 R08: 0000000000000000 R09: 0000000000000000 [ 212.037047][ T4742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.045001][ T4742] R13: 00007ff16d7b6038 R14: 00007ff16d7b5fa0 R15: 00007fffbf0e7558 [ 212.052957][ T4742] [ 212.094595][ T4748] : port 3(veth0) entered blocking state [ 212.100361][ T4748] : port 3(veth0) entered disabled state [ 212.163091][ T4748] device veth0 entered promiscuous mode [ 212.700892][ T4757] device sit0 left promiscuous mode [ 213.652598][ T4760] device sit0 entered promiscuous mode [ 213.802656][ T4773] device sit0 left promiscuous mode [ 213.977268][ T28] audit: type=1400 audit(1754692633.952:131): avc: denied { write } for pid=4776 comm="syz.1.1405" name="cgroup.subtree_control" dev="cgroup2" ino=167 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 214.257148][ T28] audit: type=1400 audit(1754692633.952:132): avc: denied { open } for pid=4776 comm="syz.1.1405" path="" dev="cgroup2" ino=167 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 214.346141][ T28] audit: type=1400 audit(1754692633.952:133): avc: denied { ioctl } for pid=4776 comm="syz.1.1405" path="" dev="cgroup2" ino=167 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 214.411711][ T4779] device sit0 entered promiscuous mode [ 214.962338][ T4785] device veth0_vlan left promiscuous mode [ 215.017459][ T4785] device veth0_vlan entered promiscuous mode [ 215.189853][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.223291][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.253255][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.540720][ T4824] device sit0 entered promiscuous mode [ 216.924904][ T4828] device macsec0 left promiscuous mode [ 217.090413][ T4833] device sit0 left promiscuous mode [ 217.110766][ T4835] device sit0 entered promiscuous mode [ 217.665388][ T4848] device veth0_vlan left promiscuous mode [ 217.683242][ T4848] device veth0_vlan entered promiscuous mode [ 217.771458][ T4850] device sit0 left promiscuous mode [ 218.137373][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.153814][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.166231][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.177140][ T4852] device sit0 entered promiscuous mode [ 220.045989][ T4884] device veth0_vlan left promiscuous mode [ 220.057337][ T4884] device veth0_vlan entered promiscuous mode [ 220.077562][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.088339][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.096619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 223.080395][ T4911] device sit0 left promiscuous mode [ 223.168927][ T4911] device sit0 entered promiscuous mode [ 224.416676][ T4938] device macsec0 entered promiscuous mode [ 229.133281][ T5029] bond_slave_1: mtu less than device minimum [ 229.676942][ T5044] device sit0 left promiscuous mode [ 229.942486][ T5052] FAULT_INJECTION: forcing a failure. [ 229.942486][ T5052] name failslab, interval 1, probability 0, space 0, times 0 [ 229.955163][ T5052] CPU: 1 PID: 5052 Comm: syz.1.1483 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 229.964983][ T5052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 229.975041][ T5052] Call Trace: [ 229.978321][ T5052] [ 229.981243][ T5052] __dump_stack+0x21/0x24 [ 229.985580][ T5052] dump_stack_lvl+0xee/0x150 [ 229.990172][ T5052] ? __cfi_dump_stack_lvl+0x8/0x8 [ 229.995202][ T5052] ? kasan_set_track+0x60/0x70 [ 229.999959][ T5052] ? kasan_save_alloc_info+0x25/0x30 [ 230.005241][ T5052] ? __kasan_slab_alloc+0x72/0x80 [ 230.010262][ T5052] ? slab_post_alloc_hook+0x4f/0x2d0 [ 230.015544][ T5052] ? kmem_cache_alloc+0x16e/0x330 [ 230.020567][ T5052] dump_stack+0x15/0x24 [ 230.024724][ T5052] should_fail_ex+0x3d4/0x520 [ 230.029406][ T5052] __should_failslab+0xac/0xf0 [ 230.034168][ T5052] ? ref_tracker_alloc+0x139/0x430 [ 230.039284][ T5052] should_failslab+0x9/0x20 [ 230.043797][ T5052] __kmem_cache_alloc_node+0x3d/0x2c0 [ 230.049171][ T5052] ? ref_tracker_alloc+0x139/0x430 [ 230.054278][ T5052] kmalloc_trace+0x29/0xb0 [ 230.058955][ T5052] ref_tracker_alloc+0x139/0x430 [ 230.064056][ T5052] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 230.069516][ T5052] ? slab_post_alloc_hook+0x6d/0x2d0 [ 230.074817][ T5052] dst_init+0xc4/0x3d0 [ 230.078892][ T5052] dst_alloc+0x191/0x1e0 [ 230.083132][ T5052] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 230.089199][ T5052] ip_route_output_flow+0x12e/0x2e0 [ 230.094397][ T5052] ? __cfi_ip_route_output_flow+0x10/0x10 [ 230.100115][ T5052] ip_tunnel_xmit+0xa4b/0x2700 [ 230.104875][ T5052] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 230.110073][ T5052] ? __kasan_check_write+0x14/0x20 [ 230.115188][ T5052] ? gre_build_header+0x25d/0x9b0 [ 230.120210][ T5052] ipgre_xmit+0x80b/0xb90 [ 230.124529][ T5052] dev_hard_start_xmit+0x20b/0x750 [ 230.129634][ T5052] __dev_queue_xmit+0x18d9/0x3420 [ 230.134653][ T5052] ? __dev_queue_xmit+0x250/0x3420 [ 230.139755][ T5052] ? __cfi___dev_queue_xmit+0x10/0x10 [ 230.145118][ T5052] ? __kasan_check_write+0x14/0x20 [ 230.150227][ T5052] ? skb_release_data+0x1d2/0x890 [ 230.155337][ T5052] ? skb_ensure_writable+0x2f8/0x470 [ 230.160626][ T5052] ? __kasan_check_write+0x14/0x20 [ 230.165822][ T5052] ? pskb_expand_head+0xc4a/0x1210 [ 230.170926][ T5052] __bpf_redirect+0x8db/0x1130 [ 230.175687][ T5052] bpf_clone_redirect+0x26a/0x3c0 [ 230.180709][ T5052] bpf_prog_208b094576c80b22+0x56/0x5b [ 230.186162][ T5052] ? kasan_set_track+0x60/0x70 [ 230.190917][ T5052] ? kasan_set_track+0x4b/0x70 [ 230.195756][ T5052] ? kasan_save_alloc_info+0x25/0x30 [ 230.201032][ T5052] ? __kasan_slab_alloc+0x72/0x80 [ 230.206053][ T5052] ? slab_post_alloc_hook+0x4f/0x2d0 [ 230.211331][ T5052] ? kmem_cache_alloc+0x16e/0x330 [ 230.216350][ T5052] ? build_skb+0x2a/0x220 [ 230.220675][ T5052] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 230.226211][ T5052] ? bpf_prog_test_run+0x3e3/0x630 [ 230.231310][ T5052] ? __sys_bpf+0x56d/0x780 [ 230.235712][ T5052] ? __x64_sys_bpf+0x7c/0x90 [ 230.240298][ T5052] ? x64_sys_call+0x488/0x9a0 [ 230.244972][ T5052] ? do_syscall_64+0x4c/0xa0 [ 230.249569][ T5052] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 230.255721][ T5052] ? ktime_get+0x141/0x170 [ 230.260133][ T5052] bpf_test_run+0x349/0x8d0 [ 230.264757][ T5052] ? __kasan_slab_alloc+0x72/0x80 [ 230.269775][ T5052] ? convert___skb_to_skb+0x5b0/0x5b0 [ 230.275137][ T5052] ? __cfi_eth_type_trans+0x10/0x10 [ 230.280327][ T5052] ? convert___skb_to_skb+0x40/0x5b0 [ 230.285611][ T5052] bpf_prog_test_run_skb+0xaec/0x1290 [ 230.290979][ T5052] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 230.296774][ T5052] bpf_prog_test_run+0x3e3/0x630 [ 230.301728][ T5052] ? slab_free_freelist_hook+0xc2/0x190 [ 230.307271][ T5052] ? bpf_prog_query+0x270/0x270 [ 230.312111][ T5052] ? selinux_bpf+0xce/0xf0 [ 230.316514][ T5052] ? security_bpf+0x93/0xb0 [ 230.321004][ T5052] __sys_bpf+0x56d/0x780 [ 230.325232][ T5052] ? bpf_link_show_fdinfo+0x320/0x320 [ 230.330594][ T5052] ? __cfi_ksys_write+0x10/0x10 [ 230.335441][ T5052] ? debug_smp_processor_id+0x17/0x20 [ 230.340808][ T5052] __x64_sys_bpf+0x7c/0x90 [ 230.345218][ T5052] x64_sys_call+0x488/0x9a0 [ 230.349716][ T5052] do_syscall_64+0x4c/0xa0 [ 230.354130][ T5052] ? clear_bhb_loop+0x30/0x80 [ 230.358796][ T5052] ? clear_bhb_loop+0x30/0x80 [ 230.363551][ T5052] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 230.369444][ T5052] RIP: 0033:0x7ff62658ebe9 [ 230.373852][ T5052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.393481][ T5052] RSP: 002b:00007ff62743c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 230.401916][ T5052] RAX: ffffffffffffffda RBX: 00007ff6267b5fa0 RCX: 00007ff62658ebe9 [ 230.409891][ T5052] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 230.417855][ T5052] RBP: 00007ff62743c090 R08: 0000000000000000 R09: 0000000000000000 [ 230.425902][ T5052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 230.433863][ T5052] R13: 00007ff6267b6038 R14: 00007ff6267b5fa0 R15: 00007fff02955908 [ 230.441830][ T5052] [ 230.453831][ T5047] bond_slave_1: mtu less than device minimum [ 230.468679][ T5048] device sit0 entered promiscuous mode [ 230.654864][ T5059] device veth0_vlan left promiscuous mode [ 230.670773][ T5059] device veth0_vlan entered promiscuous mode [ 230.773265][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.784113][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.792108][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.104275][ T5080] bond_slave_1: mtu less than device minimum [ 231.854823][ T5098] bond_slave_1: mtu less than device minimum [ 232.127444][ T5101] device sit0 left promiscuous mode [ 232.812731][ T5120] bond_slave_1: mtu less than device minimum [ 233.211868][ T5131] bond_slave_1: mtu less than device minimum [ 233.735421][ T5147] FAULT_INJECTION: forcing a failure. [ 233.735421][ T5147] name failslab, interval 1, probability 0, space 0, times 0 [ 233.748207][ T5147] CPU: 0 PID: 5147 Comm: syz.3.1512 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 233.758016][ T5147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 233.768074][ T5147] Call Trace: [ 233.771358][ T5147] [ 233.774281][ T5147] __dump_stack+0x21/0x24 [ 233.778619][ T5147] dump_stack_lvl+0xee/0x150 [ 233.783209][ T5147] ? __cfi_dump_stack_lvl+0x8/0x8 [ 233.788233][ T5147] ? slab_post_alloc_hook+0x4f/0x2d0 [ 233.793517][ T5147] ? skb_clone+0x1f5/0x380 [ 233.797938][ T5147] ? __neigh_event_send+0xcf9/0x12b0 [ 233.803229][ T5147] ? neigh_resolve_output+0x1b6/0x7f0 [ 233.808604][ T5147] ? ip6_finish_output+0x5f9/0xbb0 [ 233.813711][ T5147] dump_stack+0x15/0x24 [ 233.817954][ T5147] should_fail_ex+0x3d4/0x520 [ 233.822632][ T5147] __should_failslab+0xac/0xf0 [ 233.827393][ T5147] should_failslab+0x9/0x20 [ 233.831898][ T5147] kmem_cache_alloc_node+0x42/0x340 [ 233.837180][ T5147] ? __alloc_skb+0xea/0x4b0 [ 233.841682][ T5147] __alloc_skb+0xea/0x4b0 [ 233.846011][ T5147] ndisc_ns_create+0x26a/0x940 [ 233.850775][ T5147] ndisc_solicit+0x32e/0x580 [ 233.855374][ T5147] ? __copy_skb_header+0x49f/0x630 [ 233.860507][ T5147] ? __cfi_ndisc_solicit+0x10/0x10 [ 233.865722][ T5147] ? __kasan_check_write+0x14/0x20 [ 233.870848][ T5147] ? skb_clone+0x228/0x380 [ 233.875273][ T5147] ? __cfi_ndisc_solicit+0x10/0x10 [ 233.880405][ T5147] __neigh_event_send+0xd72/0x12b0 [ 233.885548][ T5147] neigh_resolve_output+0x1b6/0x7f0 [ 233.890767][ T5147] ip6_finish_output2+0x1607/0x1870 [ 233.895975][ T5147] ? ip6t_do_table+0x1d1/0x14e0 [ 233.900843][ T5147] ? __cfi_ip6t_do_table+0x10/0x10 [ 233.905970][ T5147] ? __cfi_ip6_finish_output2+0x10/0x10 [ 233.911530][ T5147] ? ip6table_mangle_hook+0x253/0x790 [ 233.917005][ T5147] ip6_finish_output+0x5f9/0xbb0 [ 233.921974][ T5147] ip6_output+0x1d1/0x3b0 [ 233.926318][ T5147] ? __cfi_ip6_output+0x10/0x10 [ 233.931184][ T5147] ? __cfi_ip6_finish_output+0x10/0x10 [ 233.936658][ T5147] ? __cfi_ip6t_do_table+0x10/0x10 [ 233.941778][ T5147] ip6_local_out+0x22b/0x3e0 [ 233.946374][ T5147] ? __cfi_ip6_local_out+0x10/0x10 [ 233.951491][ T5147] ? __cfi_dst_output+0x10/0x10 [ 233.956351][ T5147] ? __kasan_check_read+0x11/0x20 [ 233.961391][ T5147] ? ip6_setup_cork+0xb1d/0x10a0 [ 233.966330][ T5147] ip6_push_pending_frames+0x17d/0x2d0 [ 233.971792][ T5147] icmpv6_push_pending_frames+0x2e5/0x4a0 [ 233.977522][ T5147] icmp6_send+0xfff/0x1580 [ 233.981953][ T5147] ? icmp6_send+0x8bc/0x1580 [ 233.986558][ T5147] ? __cfi_icmp6_send+0x10/0x10 [ 233.991428][ T5147] ? prep_new_page+0x3b/0x110 [ 233.996143][ T5147] ? get_page_from_freelist+0x2c7b/0x2cf0 [ 234.001879][ T5147] ? cgroup_rstat_updated+0xf5/0x370 [ 234.007176][ T5147] ? __skb_flow_dissect+0x54de/0x5f40 [ 234.012646][ T5147] icmpv6_param_prob_reason+0x36/0x50 [ 234.018029][ T5147] ip6_parse_tlv+0x1a7d/0x1c20 [ 234.022803][ T5147] ipv6_parse_hopopts+0x2fa/0x5f0 [ 234.027825][ T5147] ip6_rcv_core+0xd83/0x1480 [ 234.032408][ T5147] ipv6_rcv+0xca/0x210 [ 234.036471][ T5147] ? __cfi_ipv6_rcv+0x10/0x10 [ 234.041144][ T5147] ? asm_exc_page_fault+0x27/0x30 [ 234.046165][ T5147] ? _copy_from_iter+0xf1/0xfd0 [ 234.051008][ T5147] ? __cfi_ipv6_rcv+0x10/0x10 [ 234.055670][ T5147] __netif_receive_skb+0xd7/0x2a0 [ 234.060685][ T5147] ? tun_rx_batched+0x158/0x770 [ 234.065524][ T5147] netif_receive_skb+0x98/0x3d0 [ 234.070361][ T5147] ? __cfi_netif_receive_skb+0x10/0x10 [ 234.075846][ T5147] ? __cfi__copy_from_iter+0x10/0x10 [ 234.081203][ T5147] ? tun_rx_batched+0x158/0x770 [ 234.086034][ T5147] tun_rx_batched+0x1b6/0x770 [ 234.090691][ T5147] ? pskb_may_pull+0x100/0x100 [ 234.095437][ T5147] ? stack_trace_save+0x98/0xe0 [ 234.100273][ T5147] ? tun_get_user+0x1f21/0x3320 [ 234.105107][ T5147] tun_get_user+0x2494/0x3320 [ 234.109772][ T5147] ? kstrtoull+0x137/0x1d0 [ 234.114183][ T5147] ? tun_do_read+0x1c20/0x1c20 [ 234.119020][ T5147] ? __kasan_check_write+0x14/0x20 [ 234.124123][ T5147] ? ref_tracker_alloc+0x30f/0x430 [ 234.129216][ T5147] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 234.134665][ T5147] ? avc_policy_seqno+0x1b/0x70 [ 234.139503][ T5147] ? selinux_file_permission+0x2a5/0x510 [ 234.145140][ T5147] tun_chr_write_iter+0x1fb/0x300 [ 234.150151][ T5147] vfs_write+0x5db/0xca0 [ 234.154380][ T5147] ? slab_free_freelist_hook+0xc2/0x190 [ 234.159912][ T5147] ? __cfi_vfs_write+0x10/0x10 [ 234.164818][ T5147] ? __fget_files+0x2d5/0x330 [ 234.169483][ T5147] ? __fdget_pos+0x1f2/0x380 [ 234.174049][ T5147] ? ksys_write+0x71/0x240 [ 234.178449][ T5147] ksys_write+0x140/0x240 [ 234.182767][ T5147] ? __cfi_ksys_write+0x10/0x10 [ 234.187599][ T5147] ? debug_smp_processor_id+0x17/0x20 [ 234.193043][ T5147] __x64_sys_write+0x7b/0x90 [ 234.197616][ T5147] x64_sys_call+0x27b/0x9a0 [ 234.202101][ T5147] do_syscall_64+0x4c/0xa0 [ 234.206504][ T5147] ? clear_bhb_loop+0x30/0x80 [ 234.211168][ T5147] ? clear_bhb_loop+0x30/0x80 [ 234.215836][ T5147] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 234.221712][ T5147] RIP: 0033:0x7ff16d58ebe9 [ 234.226113][ T5147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.245789][ T5147] RSP: 002b:00007ff16e3f9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 234.254191][ T5147] RAX: ffffffffffffffda RBX: 00007ff16d7b5fa0 RCX: 00007ff16d58ebe9 [ 234.262144][ T5147] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 234.270108][ T5147] RBP: 00007ff16e3f9090 R08: 0000000000000000 R09: 0000000000000000 [ 234.278090][ T5147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 234.286047][ T5147] R13: 00007ff16d7b6038 R14: 00007ff16d7b5fa0 R15: 00007fffbf0e7558 [ 234.294004][ T5147] [ 234.300852][ T5144] device syzkaller0 entered promiscuous mode [ 234.408065][ T5152] device sit0 left promiscuous mode [ 234.771448][ T5161] bond_slave_1: mtu less than device minimum [ 235.093035][ T5163] device veth0_vlan left promiscuous mode [ 235.132992][ T5163] device veth0_vlan entered promiscuous mode [ 235.186779][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.215200][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.223025][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.376184][ T5173] device veth0_vlan left promiscuous mode [ 235.398645][ T5173] device veth0_vlan entered promiscuous mode [ 235.451751][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.603324][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.733556][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.523185][ T5204] bond_slave_1: mtu less than device minimum [ 238.423135][ T5229] bond_slave_1: mtu less than device minimum [ 238.510384][ T5233] bond_slave_1: mtu less than device minimum [ 239.584405][ T5253] FAULT_INJECTION: forcing a failure. [ 239.584405][ T5253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 239.716510][ T5253] CPU: 1 PID: 5253 Comm: syz.4.1544 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 239.726374][ T5253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 239.736438][ T5253] Call Trace: [ 239.739727][ T5253] [ 239.742652][ T5253] __dump_stack+0x21/0x24 [ 239.746994][ T5253] dump_stack_lvl+0xee/0x150 [ 239.751673][ T5253] ? __cfi_dump_stack_lvl+0x8/0x8 [ 239.756711][ T5253] ? migrate_enable+0x19c/0x280 [ 239.761562][ T5253] dump_stack+0x15/0x24 [ 239.765730][ T5253] should_fail_ex+0x3d4/0x520 [ 239.770584][ T5253] should_fail+0xb/0x10 [ 239.774746][ T5253] should_fail_usercopy+0x1a/0x20 [ 239.779856][ T5253] _copy_from_user+0x1e/0xc0 [ 239.784446][ T5253] generic_map_update_batch+0x458/0x780 [ 239.790261][ T5253] ? __cfi_generic_map_update_batch+0x10/0x10 [ 239.796331][ T5253] ? __fdget+0x19c/0x220 [ 239.800578][ T5253] ? __cfi_generic_map_update_batch+0x10/0x10 [ 239.806641][ T5253] bpf_map_do_batch+0x48c/0x620 [ 239.811490][ T5253] __sys_bpf+0x624/0x780 [ 239.815734][ T5253] ? bpf_link_show_fdinfo+0x320/0x320 [ 239.821108][ T5253] ? __cfi_ksys_write+0x10/0x10 [ 239.825982][ T5253] ? debug_smp_processor_id+0x17/0x20 [ 239.831379][ T5253] __x64_sys_bpf+0x7c/0x90 [ 239.835819][ T5253] x64_sys_call+0x488/0x9a0 [ 239.840345][ T5253] do_syscall_64+0x4c/0xa0 [ 239.844770][ T5253] ? clear_bhb_loop+0x30/0x80 [ 239.849515][ T5253] ? clear_bhb_loop+0x30/0x80 [ 239.854200][ T5253] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 239.860090][ T5253] RIP: 0033:0x7f70f4f8ebe9 [ 239.864501][ T5253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 239.884113][ T5253] RSP: 002b:00007f70f5d52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 239.892527][ T5253] RAX: ffffffffffffffda RBX: 00007f70f51b5fa0 RCX: 00007f70f4f8ebe9 [ 239.900590][ T5253] RDX: 0000000000000038 RSI: 0000200000002340 RDI: 000000000000001a [ 239.908551][ T5253] RBP: 00007f70f5d52090 R08: 0000000000000000 R09: 0000000000000000 [ 239.916505][ T5253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 239.924552][ T5253] R13: 00007f70f51b6038 R14: 00007f70f51b5fa0 R15: 00007ffc6e9dcea8 [ 239.932601][ T5253] [ 240.055072][ T5255] device veth0_vlan left promiscuous mode [ 240.159616][ T5255] device veth0_vlan entered promiscuous mode [ 240.322713][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.334228][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.367245][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.378503][ T5257] device sit0 left promiscuous mode [ 240.499398][ T5258] device sit0 entered promiscuous mode [ 240.741365][ T5278] bond_slave_1: mtu less than device minimum [ 240.896855][ T5281] device pim6reg1 entered promiscuous mode [ 241.725919][ T5303] device pim6reg1 entered promiscuous mode [ 242.363198][ T5305] device veth0_vlan left promiscuous mode [ 242.511750][ T5305] device veth0_vlan entered promiscuous mode [ 242.614665][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.643222][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.659291][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.367852][ T5338] FAULT_INJECTION: forcing a failure. [ 244.367852][ T5338] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 244.392641][ T5338] CPU: 0 PID: 5338 Comm: syz.0.1571 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 244.402480][ T5338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 244.412541][ T5338] Call Trace: [ 244.415824][ T5338] [ 244.418751][ T5338] __dump_stack+0x21/0x24 [ 244.423087][ T5338] dump_stack_lvl+0xee/0x150 [ 244.427766][ T5338] ? __cfi_dump_stack_lvl+0x8/0x8 [ 244.432792][ T5338] dump_stack+0x15/0x24 [ 244.436948][ T5338] should_fail_ex+0x3d4/0x520 [ 244.441629][ T5338] should_fail+0xb/0x10 [ 244.445830][ T5338] should_fail_usercopy+0x1a/0x20 [ 244.450851][ T5338] _copy_from_user+0x1e/0xc0 [ 244.455442][ T5338] __sys_bpf+0x277/0x780 [ 244.459689][ T5338] ? bpf_link_show_fdinfo+0x320/0x320 [ 244.465070][ T5338] ? __cfi_ksys_write+0x10/0x10 [ 244.470020][ T5338] ? debug_smp_processor_id+0x17/0x20 [ 244.475394][ T5338] __x64_sys_bpf+0x7c/0x90 [ 244.479825][ T5338] x64_sys_call+0x488/0x9a0 [ 244.484421][ T5338] do_syscall_64+0x4c/0xa0 [ 244.488845][ T5338] ? clear_bhb_loop+0x30/0x80 [ 244.493527][ T5338] ? clear_bhb_loop+0x30/0x80 [ 244.498212][ T5338] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 244.504108][ T5338] RIP: 0033:0x7f8e0cd8ebe9 [ 244.508525][ T5338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.528161][ T5338] RSP: 002b:00007f8e0dbe0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 244.536678][ T5338] RAX: ffffffffffffffda RBX: 00007f8e0cfb5fa0 RCX: 00007f8e0cd8ebe9 [ 244.544658][ T5338] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 244.552639][ T5338] RBP: 00007f8e0dbe0090 R08: 0000000000000000 R09: 0000000000000000 [ 244.560616][ T5338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.568730][ T5338] R13: 00007f8e0cfb6038 R14: 00007f8e0cfb5fa0 R15: 00007ffdf8d8c1d8 [ 244.576709][ T5338] [ 245.256527][ T5348] device pim6reg1 entered promiscuous mode [ 247.196470][ T5370] device sit0 entered promiscuous mode [ 248.121595][ T5386] device sit0 left promiscuous mode [ 248.455174][ T5387] device sit0 entered promiscuous mode [ 249.172864][ T5404] device veth0_vlan left promiscuous mode [ 249.383021][ T5404] device veth0_vlan entered promiscuous mode [ 249.539311][ T5408] device sit0 left promiscuous mode [ 249.993950][ T5410] device sit0 entered promiscuous mode [ 251.133022][ T5445] bond_slave_1: mtu less than device minimum [ 256.646345][ T5514] device sit0 left promiscuous mode [ 257.222567][ T5520] device sit0 entered promiscuous mode [ 257.436880][ T5525] device pim6reg1 entered promiscuous mode [ 257.993348][ T5546] device sit0 left promiscuous mode [ 258.558722][ T5554] device sit0 entered promiscuous mode [ 258.972003][ T5567] device veth0_vlan left promiscuous mode [ 258.988813][ T5567] device veth0_vlan entered promiscuous mode [ 259.080407][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.105315][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.113520][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.206428][ T5571] device sit0 entered promiscuous mode [ 260.753048][ T5613] bond_slave_1: mtu less than device minimum [ 261.424853][ T5625] device veth0_vlan left promiscuous mode [ 261.558740][ T5625] device veth0_vlan entered promiscuous mode [ 261.681108][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.689554][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.697583][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.283517][ T5662] bond_slave_1: mtu less than device minimum [ 264.897778][ T5679] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 265.353265][ T5679] device syzkaller0 entered promiscuous mode [ 265.496813][ T5698] device sit0 left promiscuous mode [ 266.154355][ T5702] device sit0 entered promiscuous mode [ 266.226879][ T5701] device veth0_vlan left promiscuous mode [ 266.233316][ T5701] device veth0_vlan entered promiscuous mode [ 266.242533][ T5709] bond_slave_1: mtu less than device minimum [ 266.276681][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.285318][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.293103][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.348852][ T5715] bond_slave_1: mtu less than device minimum [ 267.877818][ T5744] device lo entered promiscuous mode [ 271.214571][ T5790] device veth0_vlan left promiscuous mode [ 271.243483][ T5790] device veth0_vlan entered promiscuous mode [ 271.288296][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.301937][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.331275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.513258][ T5830] device wg2 entered promiscuous mode [ 273.067203][ T5836] device sit0 left promiscuous mode [ 273.569472][ T5838] device sit0 entered promiscuous mode [ 273.604089][ T5845] device veth0_vlan left promiscuous mode [ 273.613344][ T5845] device veth0_vlan entered promiscuous mode [ 273.675999][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.708552][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.772070][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.940608][ T5862] device sit0 left promiscuous mode [ 274.388175][ T5861] device sit0 entered promiscuous mode [ 274.801042][ T28] audit: type=1400 audit(1754692694.772:134): avc: denied { create } for pid=5874 comm="syz.4.1721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 275.183913][ T5889] bond_slave_1: mtu less than device minimum [ 275.782370][ T5904] device sit0 left promiscuous mode [ 276.026927][ T5912] device sit0 entered promiscuous mode [ 276.074653][ T5914] tun0: tun_chr_ioctl cmd 1074025692 [ 276.080403][ T5900] tun0: tun_chr_ioctl cmd 1074025688 [ 276.205134][ T5925] bond_slave_1: mtu less than device minimum [ 276.581889][ T5933] device veth0_vlan left promiscuous mode [ 276.625936][ T5933] device veth0_vlan entered promiscuous mode [ 276.749739][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.775616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.788450][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.134657][ T5955] device sit0 left promiscuous mode [ 277.609567][ T5970] bond_slave_1: mtu less than device minimum [ 277.862986][ T5985] device sit0 left promiscuous mode [ 278.736178][ T6004] device veth0_vlan left promiscuous mode [ 278.742214][ T6004] device veth0_vlan entered promiscuous mode [ 278.810425][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 278.878512][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 278.993664][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.119172][ T6015] bond_slave_1: mtu less than device minimum [ 279.639224][ T6023] device sit0 left promiscuous mode [ 281.018047][ T6053] bond_slave_1: mtu less than device minimum [ 281.902147][ T6072] tap0: tun_chr_ioctl cmd 2147767521 [ 282.149307][ T6082] bond_slave_1: mtu less than device minimum [ 284.706765][ T6133] bond_slave_1: mtu less than device minimum [ 285.744529][ T6151] bond_slave_1: mtu less than device minimum [ 286.492163][ T6175] bond_slave_1: mtu less than device minimum [ 288.082510][ T28] audit: type=1400 audit(1754692708.052:135): avc: denied { create } for pid=6220 comm="syz.3.1828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 292.945246][ T6326] device pim6reg1 entered promiscuous mode [ 293.229457][ T6329] device sit0 entered promiscuous mode [ 293.890894][ T6354] device veth0_vlan left promiscuous mode [ 293.912204][ T6354] device veth0_vlan entered promiscuous mode [ 293.982475][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.013155][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.020984][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.465589][ T6382] FAULT_INJECTION: forcing a failure. [ 294.465589][ T6382] name failslab, interval 1, probability 0, space 0, times 0 [ 294.478355][ T6382] CPU: 1 PID: 6382 Comm: syz.4.1870 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 294.488162][ T6382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 294.498213][ T6382] Call Trace: [ 294.501490][ T6382] [ 294.504417][ T6382] __dump_stack+0x21/0x24 [ 294.508751][ T6382] dump_stack_lvl+0xee/0x150 [ 294.513430][ T6382] ? __cfi_dump_stack_lvl+0x8/0x8 [ 294.518451][ T6382] ? longest_prefix_match+0x43c/0x640 [ 294.523820][ T6382] dump_stack+0x15/0x24 [ 294.527982][ T6382] should_fail_ex+0x3d4/0x520 [ 294.532659][ T6382] __should_failslab+0xac/0xf0 [ 294.537415][ T6382] should_failslab+0x9/0x20 [ 294.541922][ T6382] kmem_cache_alloc_node+0x42/0x340 [ 294.547122][ T6382] ? bpf_trace_run2+0x104/0x250 [ 294.551971][ T6382] ? __alloc_skb+0xea/0x4b0 [ 294.556473][ T6382] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 294.562369][ T6382] __alloc_skb+0xea/0x4b0 [ 294.566873][ T6382] fdb_notify+0x78/0x130 [ 294.571122][ T6382] fdb_delete+0x8b9/0xb20 [ 294.575446][ T6382] fdb_delete_local+0x3c8/0x480 [ 294.580383][ T6382] br_fdb_changeaddr+0x1b3/0x1c0 [ 294.585317][ T6382] br_device_event+0x33c/0x770 [ 294.590079][ T6382] ? __cfi_br_device_event+0x10/0x10 [ 294.595358][ T6382] ? packet_notifier+0x8cf/0x8e0 [ 294.600292][ T6382] ? ip6mr_device_event+0x1e0/0x200 [ 294.605491][ T6382] raw_notifier_call_chain+0xa1/0x110 [ 294.610870][ T6382] dev_set_mac_address+0x329/0x430 [ 294.615976][ T6382] ? __cfi_dev_set_mac_address+0x10/0x10 [ 294.621605][ T6382] dev_set_mac_address_user+0x31/0x50 [ 294.627064][ T6382] dev_ifsioc+0x770/0xed0 [ 294.631394][ T6382] ? dev_ioctl+0xd10/0xd10 [ 294.635810][ T6382] ? __mutex_lock_slowpath+0xe/0x10 [ 294.641100][ T6382] ? mutex_lock+0xf8/0x1a0 [ 294.645526][ T6382] ? __cfi_mutex_lock+0x10/0x10 [ 294.650373][ T6382] ? dev_get_by_name_rcu+0xe5/0x130 [ 294.655669][ T6382] dev_ioctl+0x556/0xd10 [ 294.659911][ T6382] sock_do_ioctl+0x23f/0x310 [ 294.664513][ T6382] ? sock_show_fdinfo+0xb0/0xb0 [ 294.669370][ T6382] ? selinux_file_ioctl+0x377/0x480 [ 294.674657][ T6382] sock_ioctl+0x4d8/0x6e0 [ 294.678983][ T6382] ? __cfi_sock_ioctl+0x10/0x10 [ 294.683834][ T6382] ? __fget_files+0x2d5/0x330 [ 294.688520][ T6382] ? security_file_ioctl+0x95/0xc0 [ 294.693633][ T6382] ? __cfi_sock_ioctl+0x10/0x10 [ 294.698496][ T6382] __se_sys_ioctl+0x12f/0x1b0 [ 294.703172][ T6382] __x64_sys_ioctl+0x7b/0x90 [ 294.707764][ T6382] x64_sys_call+0x58b/0x9a0 [ 294.712265][ T6382] do_syscall_64+0x4c/0xa0 [ 294.716689][ T6382] ? clear_bhb_loop+0x30/0x80 [ 294.721362][ T6382] ? clear_bhb_loop+0x30/0x80 [ 294.726035][ T6382] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 294.731923][ T6382] RIP: 0033:0x7f70f4f8ebe9 [ 294.736337][ T6382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 294.755946][ T6382] RSP: 002b:00007f70f5d52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.764363][ T6382] RAX: ffffffffffffffda RBX: 00007f70f51b5fa0 RCX: 00007f70f4f8ebe9 [ 294.772347][ T6382] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 294.780318][ T6382] RBP: 00007f70f5d52090 R08: 0000000000000000 R09: 0000000000000000 [ 294.788287][ T6382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.796254][ T6382] R13: 00007f70f51b6038 R14: 00007f70f51b5fa0 R15: 00007ffc6e9dcea8 [ 294.804229][ T6382] [ 295.513247][ T6413] device wg2 entered promiscuous mode [ 296.996006][ T6449] device wg2 entered promiscuous mode [ 297.380294][ T6463] FAULT_INJECTION: forcing a failure. [ 297.380294][ T6463] name failslab, interval 1, probability 0, space 0, times 0 [ 297.555257][ T6463] CPU: 0 PID: 6463 Comm: syz.1.1892 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 297.565110][ T6463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 297.575174][ T6463] Call Trace: [ 297.578451][ T6463] [ 297.581396][ T6463] __dump_stack+0x21/0x24 [ 297.585735][ T6463] dump_stack_lvl+0xee/0x150 [ 297.590335][ T6463] ? __cfi_dump_stack_lvl+0x8/0x8 [ 297.595367][ T6463] dump_stack+0x15/0x24 [ 297.599520][ T6463] should_fail_ex+0x3d4/0x520 [ 297.604194][ T6463] ? security_inode_alloc+0x33/0x120 [ 297.609472][ T6463] __should_failslab+0xac/0xf0 [ 297.614316][ T6463] should_failslab+0x9/0x20 [ 297.618828][ T6463] kmem_cache_alloc+0x3b/0x330 [ 297.623583][ T6463] ? slab_pre_alloc_hook+0x30/0x1e0 [ 297.628777][ T6463] security_inode_alloc+0x33/0x120 [ 297.633880][ T6463] inode_init_always+0x6fc/0x960 [ 297.638810][ T6463] new_inode_pseudo+0xa2/0x1f0 [ 297.643569][ T6463] __sock_create+0x12c/0x7c0 [ 297.648161][ T6463] __sys_socketpair+0x1a1/0x5b0 [ 297.653009][ T6463] __x64_sys_socketpair+0x9b/0xb0 [ 297.658129][ T6463] x64_sys_call+0x6e/0x9a0 [ 297.662556][ T6463] do_syscall_64+0x4c/0xa0 [ 297.666974][ T6463] ? clear_bhb_loop+0x30/0x80 [ 297.671654][ T6463] ? clear_bhb_loop+0x30/0x80 [ 297.676330][ T6463] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 297.682256][ T6463] RIP: 0033:0x7ff62658ebe9 [ 297.686670][ T6463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.706275][ T6463] RSP: 002b:00007ff62743c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 297.714787][ T6463] RAX: ffffffffffffffda RBX: 00007ff6267b5fa0 RCX: 00007ff62658ebe9 [ 297.722927][ T6463] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000018 [ 297.730891][ T6463] RBP: 00007ff62743c090 R08: 0000000000000000 R09: 0000000000000000 [ 297.738869][ T6463] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.746832][ T6463] R13: 00007ff6267b6038 R14: 00007ff6267b5fa0 R15: 00007fff02955908 [ 297.754804][ T6463] [ 298.082793][ T6463] socket: no more sockets [ 303.548584][ T6538] device veth0_vlan left promiscuous mode [ 303.577345][ T6538] device veth0_vlan entered promiscuous mode [ 303.841599][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.863469][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.922819][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.258154][ T6591] device sit0 left promiscuous mode [ 308.873868][ T6647] syz.0.1946[6647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.288265][ T6660] device veth0_vlan left promiscuous mode [ 309.673299][ T6660] device veth0_vlan entered promiscuous mode [ 309.711050][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.753296][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.843116][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.100724][ T6672] device sit0 left promiscuous mode [ 311.511211][ T6713] FAULT_INJECTION: forcing a failure. [ 311.511211][ T6713] name failslab, interval 1, probability 0, space 0, times 0 [ 311.529402][ T6710] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.539165][ T6710] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.552511][ T6713] CPU: 1 PID: 6713 Comm: syz.2.1966 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 311.562338][ T6713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 311.572410][ T6713] Call Trace: [ 311.575686][ T6713] [ 311.578615][ T6713] __dump_stack+0x21/0x24 [ 311.582968][ T6713] dump_stack_lvl+0xee/0x150 [ 311.587563][ T6713] ? __cfi_dump_stack_lvl+0x8/0x8 [ 311.592596][ T6713] dump_stack+0x15/0x24 [ 311.596755][ T6713] should_fail_ex+0x3d4/0x520 [ 311.601435][ T6713] __should_failslab+0xac/0xf0 [ 311.606200][ T6713] should_failslab+0x9/0x20 [ 311.610710][ T6713] kmem_cache_alloc_node+0x42/0x340 [ 311.615910][ T6713] ? perf_event_alloc+0x118/0x1970 [ 311.621018][ T6713] ? _find_next_zero_bit+0x8d/0x140 [ 311.626219][ T6713] perf_event_alloc+0x118/0x1970 [ 311.631156][ T6713] ? alloc_fd+0x4e6/0x590 [ 311.635569][ T6713] __se_sys_perf_event_open+0x6c5/0x1b80 [ 311.641185][ T6713] ? __kasan_check_write+0x14/0x20 [ 311.646281][ T6713] ? mutex_unlock+0x89/0x220 [ 311.650953][ T6713] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 311.656571][ T6713] ? __cfi_ksys_write+0x10/0x10 [ 311.661407][ T6713] __x64_sys_perf_event_open+0xbf/0xd0 [ 311.666851][ T6713] x64_sys_call+0x385/0x9a0 [ 311.671345][ T6713] do_syscall_64+0x4c/0xa0 [ 311.675763][ T6713] ? clear_bhb_loop+0x30/0x80 [ 311.680460][ T6713] ? clear_bhb_loop+0x30/0x80 [ 311.685214][ T6713] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 311.691093][ T6713] RIP: 0033:0x7f1fbb38ebe9 [ 311.695488][ T6713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.715080][ T6713] RSP: 002b:00007f1fbc1fe038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 311.723494][ T6713] RAX: ffffffffffffffda RBX: 00007f1fbb5b5fa0 RCX: 00007f1fbb38ebe9 [ 311.731537][ T6713] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000100 [ 311.739515][ T6713] RBP: 00007f1fbc1fe090 R08: 0000000000000000 R09: 0000000000000000 [ 311.747560][ T6713] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 311.755521][ T6713] R13: 00007f1fbb5b6038 R14: 00007f1fbb5b5fa0 R15: 00007ffe818dfd48 [ 311.763506][ T6713] [ 314.073600][ T6762] device macsec0 left promiscuous mode [ 314.179150][ T6762] device veth1_macvtap entered promiscuous mode [ 314.198934][ T6762] device macsec0 entered promiscuous mode [ 314.406837][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 314.673293][ T6795] syz.1.1987[6795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.789890][ T28] audit: type=1400 audit(1754692734.762:136): avc: denied { create } for pid=6792 comm="syz.0.1986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 316.083324][ T6819] device macsec0 left promiscuous mode [ 316.136089][ T6814] device veth0_vlan left promiscuous mode [ 316.182842][ T6814] device veth0_vlan entered promiscuous mode [ 316.258424][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.294192][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.312038][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.324981][ T6819] device veth1_macvtap entered promiscuous mode [ 316.336679][ T6819] device macsec0 entered promiscuous mode [ 316.386662][ T732] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 316.909825][ T6852] syz.0.2003[6852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.936024][ T28] audit: type=1400 audit(1754692737.912:137): avc: denied { create } for pid=6870 comm="syz.2.2009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 319.002586][ T6883] device macsec0 left promiscuous mode [ 321.193219][ T6958] device macsec0 entered promiscuous mode [ 322.510673][ T28] audit: type=1400 audit(1754692742.482:138): avc: denied { create } for pid=6999 comm="syz.4.2044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 323.374871][ T7030] device macsec0 left promiscuous mode [ 323.716331][ T7030] device veth1_macvtap entered promiscuous mode [ 323.764946][ T7030] device macsec0 entered promiscuous mode [ 323.915006][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 324.172749][ T7054] device veth1_macvtap left promiscuous mode [ 327.014585][ T7128] device veth0_vlan left promiscuous mode [ 327.103042][ T7128] device veth0_vlan entered promiscuous mode [ 327.246418][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.274388][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.328466][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 327.437318][ T7138] device veth1_macvtap left promiscuous mode [ 327.446736][ T7138] device macsec0 left promiscuous mode [ 327.560987][ T7138] device veth1_macvtap entered promiscuous mode [ 327.574578][ T7138] device macsec0 entered promiscuous mode [ 328.630134][ T7167] device veth1_macvtap left promiscuous mode [ 330.361924][ T7210] device veth1_macvtap left promiscuous mode [ 330.835353][ T7222] syz.0.2108[7222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.949090][ T7229] device macsec0 left promiscuous mode [ 331.923630][ T7249] device veth0_vlan left promiscuous mode [ 331.929677][ T7249] device veth0_vlan entered promiscuous mode [ 332.000473][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.019904][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.214383][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 332.299663][ T7252] device macsec0 entered promiscuous mode [ 333.914637][ T7280] device veth0_vlan left promiscuous mode [ 333.940401][ T7280] device veth0_vlan entered promiscuous mode [ 334.082581][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.109252][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.117098][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.397537][ T7297] syz.0.2138[7297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.599509][ T7322] syz.2.2134[7322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.272455][ T7336] device veth0_vlan left promiscuous mode [ 337.385816][ T7336] device veth0_vlan entered promiscuous mode [ 337.477685][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.487762][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.495739][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 437.982432][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 437.989436][ C1] rcu: 0-...!: (1 GPs behind) idle=5c3c/1/0x4000000000000000 softirq=35900/35901 fqs=0 [ 437.999135][ C1] (detected by 1, t=10002 jiffies, g=47513, q=248 ncpus=2) [ 438.006407][ C1] Sending NMI from CPU 1 to CPUs 0: [ 438.011637][ C0] NMI backtrace for cpu 0 [ 438.011649][ C0] CPU: 0 PID: 7355 Comm: syz.0.2145 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 438.011665][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 438.011674][ C0] RIP: 0010:kvm_wait+0xcc/0x140 [ 438.011712][ C0] Code: 20 f6 44 24 21 02 75 24 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 48 0f b6 07 40 38 f0 75 a6 66 90 0f 00 2d d5 ab 13 04 f4 9a fa 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 3f 0f b6 07 [ 438.011724][ C0] RSP: 0018:ffffc9000fe57340 EFLAGS: 00000046 [ 438.011737][ C0] RAX: 0000000000000003 RBX: ffff88815cb8c140 RCX: ffffffff84f3ac82 [ 438.011748][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88815cb8c140 [ 438.011759][ C0] RBP: ffffc9000fe573d0 R08: dffffc0000000000 R09: ffffed102b971829 [ 438.011771][ C0] R10: ffffed102b971829 R11: 1ffff1102b971828 R12: 1ffff1103ee00001 [ 438.011782][ C0] R13: ffff8881f7038cf4 R14: dffffc0000000000 R15: 1ffff92001fcae68 [ 438.011793][ C0] FS: 00007f8e0dbe06c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 438.011807][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 438.011817][ C0] CR2: 00007ff16e2e56c0 CR3: 000000010d3f1000 CR4: 00000000003506b0 [ 438.011831][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 438.011839][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 438.011848][ C0] Call Trace: [ 438.011855][ C0] [ 438.011863][ C0] ? __cfi_kvm_wait+0x10/0x10 [ 438.011882][ C0] ? pv_hash+0x86/0x150 [ 438.011906][ C0] __pv_queued_spin_lock_slowpath+0x690/0xc40 [ 438.011925][ C0] ? __cfi___pv_queued_spin_lock_slowpath+0x10/0x10 [ 438.011942][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 438.011964][ C0] queued_spin_lock_slowpath+0x47/0x50 [ 438.011986][ C0] _raw_spin_lock_irqsave+0x108/0x110 [ 438.012008][ C0] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 438.012030][ C0] ? _raw_spin_unlock+0x4c/0x70 [ 438.012051][ C0] ? stack_map_get_build_id_offset+0x889/0x9a0 [ 438.012066][ C0] ? plist_check_list+0x240/0x270 [ 438.012088][ C0] __stack_map_get+0xec/0x3c0 [ 438.012109][ C0] ? __queue_map_get+0x3d0/0x3d0 [ 438.012127][ C0] ? enqueue_task_rt+0x8b9/0xed0 [ 438.012146][ C0] stack_map_peek_elem+0x1f/0x30 [ 438.012166][ C0] bpf_prog_00798911c748094f+0x3a/0x3e [ 438.012181][ C0] bpf_trace_run2+0xff/0x250 [ 438.012201][ C0] ? __cfi_bpf_trace_run2+0x10/0x10 [ 438.012220][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 438.012242][ C0] ? __kasan_check_read+0x11/0x20 [ 438.012264][ C0] __bpf_trace_contention_end+0xb/0x10 [ 438.012284][ C0] __pv_queued_spin_lock_slowpath+0xbff/0xc40 [ 438.012302][ C0] ? __cfi___pv_queued_spin_lock_slowpath+0x10/0x10 [ 438.012382][ C0] ? try_to_wake_up+0x613/0x1220 [ 438.012403][ C0] queued_spin_lock_slowpath+0x47/0x50 [ 438.012425][ C0] _raw_spin_lock_irqsave+0x108/0x110 [ 438.012447][ C0] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 438.012469][ C0] ? rcu_preempt_deferred_qs_irqrestore+0x89e/0x9d0 [ 438.012494][ C0] __stack_map_get+0xec/0x3c0 [ 438.012513][ C0] ? rcu_read_unlock_special+0xab/0x480 [ 438.012533][ C0] ? __queue_map_get+0x3d0/0x3d0 [ 438.012552][ C0] ? __rcu_read_unlock+0xa0/0xa0 [ 438.012571][ C0] ? migrate_enable+0x19c/0x280 [ 438.012587][ C0] ? __cfi_migrate_enable+0x10/0x10 [ 438.012604][ C0] stack_map_peek_elem+0x1f/0x30 [ 438.012623][ C0] bpf_prog_00798911c748094f+0x3a/0x3e [ 438.012638][ C0] bpf_flow_dissect+0x124/0x3e0 [ 438.012658][ C0] bpf_prog_test_run_flow_dissector+0x409/0x600 [ 438.012680][ C0] ? __cfi_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 438.012703][ C0] ? __kasan_check_write+0x14/0x20 [ 438.012725][ C0] ? __cfi_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 438.012745][ C0] bpf_prog_test_run+0x3e3/0x630 [ 438.012759][ C0] ? bpf_prog_query+0x270/0x270 [ 438.012772][ C0] ? selinux_bpf+0xce/0xf0 [ 438.012786][ C0] ? security_bpf+0x93/0xb0 [ 438.012802][ C0] __sys_bpf+0x56d/0x780 [ 438.012815][ C0] ? bpf_link_show_fdinfo+0x320/0x320 [ 438.012833][ C0] ? fpregs_restore_userregs+0x128/0x260 [ 438.012853][ C0] __x64_sys_bpf+0x7c/0x90 [ 438.012874][ C0] x64_sys_call+0x488/0x9a0 [ 438.012891][ C0] do_syscall_64+0x4c/0xa0 [ 438.012912][ C0] ? clear_bhb_loop+0x30/0x80 [ 438.012928][ C0] ? clear_bhb_loop+0x30/0x80 [ 438.012945][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 438.012961][ C0] RIP: 0033:0x7f8e0cd8ebe9 [ 438.012974][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 438.012985][ C0] RSP: 002b:00007f8e0dbe0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 438.013000][ C0] RAX: ffffffffffffffda RBX: 00007f8e0cfb5fa0 RCX: 00007f8e0cd8ebe9 [ 438.013011][ C0] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 438.013020][ C0] RBP: 00007f8e0ce11e19 R08: 0000000000000000 R09: 0000000000000000 [ 438.013030][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 438.013039][ C0] R13: 00007f8e0cfb6038 R14: 00007f8e0cfb5fa0 R15: 00007ffdf8d8c1d8 [ 438.013053][ C0] [ 438.013595][ C1] rcu: rcu_preempt kthread starved for 10002 jiffies! g47513 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 438.523408][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 438.533347][ C1] rcu: RCU grace-period kthread stack dump: [ 438.539207][ C1] task:rcu_preempt state:R running task stack:28064 pid:14 ppid:2 flags:0x00004000 [ 438.549974][ C1] Call Trace: [ 438.553227][ C1] [ 438.556135][ C1] __schedule+0xb87/0x14e0 [ 438.560526][ C1] ? release_firmware_map_entry+0x194/0x194 [ 438.566394][ C1] ? __mod_timer+0x7ae/0xb30 [ 438.570973][ C1] schedule+0xbd/0x170 [ 438.575010][ C1] schedule_timeout+0x12c/0x2e0 [ 438.579832][ C1] ? __cfi_schedule_timeout+0x10/0x10 [ 438.585174][ C1] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 438.590622][ C1] ? __cfi_process_timeout+0x10/0x10 [ 438.595876][ C1] ? prepare_to_swait_event+0x308/0x320 [ 438.601396][ C1] rcu_gp_fqs_loop+0x2d8/0x10a0 [ 438.606220][ C1] ? rcu_gp_init+0xf10/0xf10 [ 438.610799][ C1] rcu_gp_kthread+0x95/0x370 [ 438.615382][ C1] ? __cfi_rcu_gp_kthread+0x10/0x10 [ 438.620562][ C1] ? __kasan_check_read+0x11/0x20 [ 438.625561][ C1] ? __kthread_parkme+0x142/0x180 [ 438.630773][ C1] kthread+0x281/0x320 [ 438.634833][ C1] ? __cfi_rcu_gp_kthread+0x10/0x10 [ 438.640020][ C1] ? __cfi_kthread+0x10/0x10 [ 438.644596][ C1] ret_from_fork+0x1f/0x30 [ 438.649011][ C1] [ 438.652004][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 438.658298][ C1] CPU: 1 PID: 7361 Comm: syz.2.2148 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 438.668069][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 438.678111][ C1] RIP: 0010:smp_call_function_many_cond+0x872/0x960 [ 438.684681][ C1] Code: 41 8b 1f 89 de 83 e6 01 31 ff e8 39 66 09 00 83 e3 01 48 bb 00 00 00 00 00 fc ff df 75 0a e8 05 62 09 00 e9 38 ff ff ff f3 90 <41> 0f b6 44 1d 00 84 c0 75 14 41 f7 07 01 00 00 00 0f 84 1a ff ff [ 438.704280][ C1] RSP: 0018:ffffc900100af4a0 EFLAGS: 00000246 [ 438.710327][ C1] RAX: ffffffff8166a09e RBX: dffffc0000000000 RCX: 0000000000080000 [ 438.718279][ C1] RDX: ffffc9000267e000 RSI: 000000000007ffff RDI: 0000000000080000 [ 438.726226][ C1] RBP: ffffc900100af5d8 R08: dffffc0000000000 R09: ffffed103ee2721b [ 438.734171][ C1] R10: 0000000000000000 R11: ffffffff81342170 R12: 1ffff1103ee27218 [ 438.742122][ C1] R13: 1ffff1103ee07ae1 R14: 0000000000000000 R15: ffff8881f703d708 [ 438.750066][ C1] FS: 00007f1fbc1fe6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 438.759159][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 438.765746][ C1] CR2: 0000001b2ea22ff8 CR3: 00000001173a1000 CR4: 00000000003506a0 [ 438.773692][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 438.781741][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 438.789683][ C1] Call Trace: [ 438.792934][ C1] [ 438.795841][ C1] ? __cfi_do_sync_core+0x10/0x10 [ 438.800840][ C1] ? smp_call_function_many+0x40/0x40 [ 438.806190][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 438.812177][ C1] ? text_poke+0x30/0x30 [ 438.816398][ C1] ? __cfi_do_sync_core+0x10/0x10 [ 438.821514][ C1] on_each_cpu_cond_mask+0x43/0x80 [ 438.826609][ C1] text_poke_bp_batch+0x1cc/0x580 [ 438.831632][ C1] ? text_poke_loc_init+0x570/0x570 [ 438.836822][ C1] ? __stack_depot_save+0x36/0x480 [ 438.842001][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 438.847972][ C1] text_poke_bp+0xc8/0x140 [ 438.852374][ C1] ? __cfi_text_poke_bp+0x10/0x10 [ 438.857370][ C1] ? __kmalloc+0xb1/0x1e0 [ 438.861674][ C1] ? bpf_probe_register+0x13f/0x1d0 [ 438.866846][ C1] ? bpf_raw_tp_link_attach+0x3d1/0x550 [ 438.872364][ C1] ? __sys_bpf+0x4d1/0x780 [ 438.876843][ C1] __static_call_transform+0x318/0x500 [ 438.882288][ C1] ? __kasan_check_write+0x14/0x20 [ 438.887384][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 438.893347][ C1] ? text_poke_bp+0x140/0x140 [ 438.898011][ C1] ? __kasan_check_write+0x14/0x20 [ 438.903094][ C1] ? mutex_lock+0x8d/0x1a0 [ 438.907480][ C1] ? __cfi_mutex_lock+0x10/0x10 [ 438.912310][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 438.918300][ C1] ? __cfi___traceiter_sched_switch+0x10/0x10 [ 438.924357][ C1] arch_static_call_transform+0xd3/0x280 [ 438.929970][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 438.935936][ C1] __static_call_update+0xef/0x5c0 [ 438.941022][ C1] ? __cfi___traceiter_sched_switch+0x10/0x10 [ 438.947065][ C1] ? __cfi___static_call_update+0x10/0x10 [ 438.952760][ C1] ? kasan_save_alloc_info+0x25/0x30 [ 438.958016][ C1] ? __kasan_kmalloc+0x95/0xb0 [ 438.962750][ C1] ? memcpy+0x56/0x70 [ 438.966724][ C1] ? __cfi___traceiter_sched_switch+0x10/0x10 [ 438.972762][ C1] tracepoint_add_func+0x650/0x900 [ 438.977847][ C1] ? __cfi___bpf_trace_sched_switch+0x10/0x10 [ 438.983897][ C1] tracepoint_probe_register_prio_may_exist+0x5b/0x90 [ 438.990715][ C1] ? __cfi___bpf_trace_sched_switch+0x10/0x10 [ 438.996761][ C1] bpf_probe_register+0x13f/0x1d0 [ 439.001776][ C1] bpf_raw_tp_link_attach+0x3d1/0x550 [ 439.007140][ C1] ? bpf_insn_prepare_dump+0x840/0x840 [ 439.012590][ C1] ? __kasan_check_write+0x14/0x20 [ 439.017684][ C1] bpf_raw_tracepoint_open+0x258/0x480 [ 439.023118][ C1] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 439.028818][ C1] ? selinux_bpf+0xce/0xf0 [ 439.033209][ C1] ? security_bpf+0x93/0xb0 [ 439.037689][ C1] __sys_bpf+0x4d1/0x780 [ 439.041900][ C1] ? bpf_link_show_fdinfo+0x320/0x320 [ 439.047243][ C1] ? fpregs_restore_userregs+0x128/0x260 [ 439.052852][ C1] __x64_sys_bpf+0x7c/0x90 [ 439.057280][ C1] x64_sys_call+0x488/0x9a0 [ 439.061755][ C1] do_syscall_64+0x4c/0xa0 [ 439.066165][ C1] ? clear_bhb_loop+0x30/0x80 [ 439.070824][ C1] ? clear_bhb_loop+0x30/0x80 [ 439.075530][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 439.081395][ C1] RIP: 0033:0x7f1fbb38ebe9 [ 439.085801][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 439.105381][ C1] RSP: 002b:00007f1fbc1fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 439.113798][ C1] RAX: ffffffffffffffda RBX: 00007f1fbb5b5fa0 RCX: 00007f1fbb38ebe9 [ 439.121774][ C1] RDX: 0000000000000010 RSI: 0000200000000540 RDI: 0000000000000011 [ 439.129729][ C1] RBP: 00007f1fbb411e19 R08: 0000000000000000 R09: 0000000000000000 [ 439.137687][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 439.145665][ C1] R13: 00007f1fbb5b6038 R14: 00007f1fbb5b5fa0 R15: 00007ffe818dfd48 [ 439.153640][ C1] [ 573.121951][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 225s! [syz.2.2148:7361] [ 573.130331][ C1] Modules linked in: [ 573.134209][ C1] CPU: 1 PID: 7361 Comm: syz.2.2148 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 573.144086][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 573.154133][ C1] RIP: 0010:smp_call_function_many_cond+0x872/0x960 [ 573.160714][ C1] Code: 41 8b 1f 89 de 83 e6 01 31 ff e8 39 66 09 00 83 e3 01 48 bb 00 00 00 00 00 fc ff df 75 0a e8 05 62 09 00 e9 38 ff ff ff f3 90 <41> 0f b6 44 1d 00 84 c0 75 14 41 f7 07 01 00 00 00 0f 84 1a ff ff [ 573.180303][ C1] RSP: 0018:ffffc900100af4a0 EFLAGS: 00000246 [ 573.186348][ C1] RAX: ffffffff8166a09e RBX: dffffc0000000000 RCX: 0000000000080000 [ 573.194290][ C1] RDX: ffffc9000267e000 RSI: 000000000007ffff RDI: 0000000000080000 [ 573.202332][ C1] RBP: ffffc900100af5d8 R08: dffffc0000000000 R09: ffffed103ee2721b [ 573.210274][ C1] R10: 0000000000000000 R11: ffffffff81342170 R12: 1ffff1103ee27218 [ 573.218225][ C1] R13: 1ffff1103ee07ae1 R14: 0000000000000000 R15: ffff8881f703d708 [ 573.226168][ C1] FS: 00007f1fbc1fe6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 573.235083][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 573.241647][ C1] CR2: 0000001b2ea22ff8 CR3: 00000001173a1000 CR4: 00000000003506a0 [ 573.249591][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 573.257629][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 573.265601][ C1] Call Trace: [ 573.268877][ C1] [ 573.271826][ C1] ? __cfi_do_sync_core+0x10/0x10 [ 573.276831][ C1] ? smp_call_function_many+0x40/0x40 [ 573.282183][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 573.288140][ C1] ? text_poke+0x30/0x30 [ 573.292372][ C1] ? __cfi_do_sync_core+0x10/0x10 [ 573.297385][ C1] on_each_cpu_cond_mask+0x43/0x80 [ 573.302476][ C1] text_poke_bp_batch+0x1cc/0x580 [ 573.307496][ C1] ? text_poke_loc_init+0x570/0x570 [ 573.312677][ C1] ? __stack_depot_save+0x36/0x480 [ 573.317773][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 573.323731][ C1] text_poke_bp+0xc8/0x140 [ 573.328124][ C1] ? __cfi_text_poke_bp+0x10/0x10 [ 573.333120][ C1] ? __kmalloc+0xb1/0x1e0 [ 573.337424][ C1] ? bpf_probe_register+0x13f/0x1d0 [ 573.342614][ C1] ? bpf_raw_tp_link_attach+0x3d1/0x550 [ 573.348140][ C1] ? __sys_bpf+0x4d1/0x780 [ 573.352526][ C1] __static_call_transform+0x318/0x500 [ 573.357957][ C1] ? __kasan_check_write+0x14/0x20 [ 573.363054][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 573.369011][ C1] ? text_poke_bp+0x140/0x140 [ 573.373680][ C1] ? __kasan_check_write+0x14/0x20 [ 573.378851][ C1] ? mutex_lock+0x8d/0x1a0 [ 573.383240][ C1] ? __cfi_mutex_lock+0x10/0x10 [ 573.388060][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 573.394110][ C1] ? __cfi___traceiter_sched_switch+0x10/0x10 [ 573.400174][ C1] arch_static_call_transform+0xd3/0x280 [ 573.405792][ C1] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 573.411861][ C1] __static_call_update+0xef/0x5c0 [ 573.416969][ C1] ? __cfi___traceiter_sched_switch+0x10/0x10 [ 573.423015][ C1] ? __cfi___static_call_update+0x10/0x10 [ 573.428714][ C1] ? kasan_save_alloc_info+0x25/0x30 [ 573.433977][ C1] ? __kasan_kmalloc+0x95/0xb0 [ 573.438733][ C1] ? memcpy+0x56/0x70 [ 573.442712][ C1] ? __cfi___traceiter_sched_switch+0x10/0x10 [ 573.448752][ C1] tracepoint_add_func+0x650/0x900 [ 573.453853][ C1] ? __cfi___bpf_trace_sched_switch+0x10/0x10 [ 573.459910][ C1] tracepoint_probe_register_prio_may_exist+0x5b/0x90 [ 573.466669][ C1] ? __cfi___bpf_trace_sched_switch+0x10/0x10 [ 573.472717][ C1] bpf_probe_register+0x13f/0x1d0 [ 573.477719][ C1] bpf_raw_tp_link_attach+0x3d1/0x550 [ 573.483067][ C1] ? bpf_insn_prepare_dump+0x840/0x840 [ 573.488586][ C1] ? __kasan_check_write+0x14/0x20 [ 573.493673][ C1] bpf_raw_tracepoint_open+0x258/0x480 [ 573.499100][ C1] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 573.504801][ C1] ? selinux_bpf+0xce/0xf0 [ 573.509200][ C1] ? security_bpf+0x93/0xb0 [ 573.513677][ C1] __sys_bpf+0x4d1/0x780 [ 573.517890][ C1] ? bpf_link_show_fdinfo+0x320/0x320 [ 573.523347][ C1] ? fpregs_restore_userregs+0x128/0x260 [ 573.528968][ C1] __x64_sys_bpf+0x7c/0x90 [ 573.533389][ C1] x64_sys_call+0x488/0x9a0 [ 573.537890][ C1] do_syscall_64+0x4c/0xa0 [ 573.542311][ C1] ? clear_bhb_loop+0x30/0x80 [ 573.546966][ C1] ? clear_bhb_loop+0x30/0x80 [ 573.551623][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 573.557489][ C1] RIP: 0033:0x7f1fbb38ebe9 [ 573.561879][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 573.581458][ C1] RSP: 002b:00007f1fbc1fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 573.589845][ C1] RAX: ffffffffffffffda RBX: 00007f1fbb5b5fa0 RCX: 00007f1fbb38ebe9 [ 573.597879][ C1] RDX: 0000000000000010 RSI: 0000200000000540 RDI: 0000000000000011 [ 573.605846][ C1] RBP: 00007f1fbb411e19 R08: 0000000000000000 R09: 0000000000000000 [ 573.613791][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 573.621748][ C1] R13: 00007f1fbb5b6038 R14: 00007f1fbb5b5fa0 R15: 00007ffe818dfd48 [ 573.629698][ C1] [ 573.632694][ C1] Sending NMI from CPU 1 to CPUs 0: [ 573.637919][ C0] NMI backtrace for cpu 0 [ 573.637928][ C0] CPU: 0 PID: 7355 Comm: syz.0.2145 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 573.637944][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 573.637954][ C0] RIP: 0010:kvm_wait+0xcc/0x140 [ 573.637981][ C0] Code: 20 f6 44 24 21 02 75 24 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 48 0f b6 07 40 38 f0 75 a6 66 90 0f 00 2d d5 ab 13 04 f4 9a fa 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 3f 0f b6 07 [ 573.637994][ C0] RSP: 0018:ffffc9000fe57340 EFLAGS: 00000046 [ 573.638008][ C0] RAX: 0000000000000003 RBX: ffff88815cb8c140 RCX: ffffffff84f3ac82 [ 573.638019][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88815cb8c140 [ 573.638029][ C0] RBP: ffffc9000fe573d0 R08: dffffc0000000000 R09: ffffed102b971829 [ 573.638041][ C0] R10: ffffed102b971829 R11: 1ffff1102b971828 R12: 1ffff1103ee00001 [ 573.638052][ C0] R13: ffff8881f7038cf4 R14: dffffc0000000000 R15: 1ffff92001fcae68 [ 573.638064][ C0] FS: 00007f8e0dbe06c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 573.638077][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 573.638088][ C0] CR2: 00007ff16e2e56c0 CR3: 000000010d3f1000 CR4: 00000000003506b0 [ 573.638103][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 573.638112][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 573.638122][ C0] Call Trace: [ 573.638129][ C0] [ 573.638135][ C0] ? __cfi_kvm_wait+0x10/0x10 [ 573.638177][ C0] ? pv_hash+0x86/0x150 [ 573.638224][ C0] __pv_queued_spin_lock_slowpath+0x690/0xc40 [ 573.638266][ C0] ? __cfi___pv_queued_spin_lock_slowpath+0x10/0x10 [ 573.638304][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 573.638350][ C0] queued_spin_lock_slowpath+0x47/0x50 [ 573.638398][ C0] _raw_spin_lock_irqsave+0x108/0x110 [ 573.638432][ C0] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 573.638453][ C0] ? _raw_spin_unlock+0x4c/0x70 [ 573.638475][ C0] ? stack_map_get_build_id_offset+0x889/0x9a0 [ 573.638491][ C0] ? plist_check_list+0x240/0x270 [ 573.638508][ C0] __stack_map_get+0xec/0x3c0 [ 573.638529][ C0] ? __queue_map_get+0x3d0/0x3d0 [ 573.638548][ C0] ? enqueue_task_rt+0x8b9/0xed0 [ 573.638567][ C0] stack_map_peek_elem+0x1f/0x30 [ 573.638586][ C0] bpf_prog_00798911c748094f+0x3a/0x3e [ 573.638602][ C0] bpf_trace_run2+0xff/0x250 [ 573.638623][ C0] ? __cfi_bpf_trace_run2+0x10/0x10 [ 573.638643][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 573.638663][ C0] ? __kasan_check_read+0x11/0x20 [ 573.638705][ C0] __bpf_trace_contention_end+0xb/0x10 [ 573.638724][ C0] __pv_queued_spin_lock_slowpath+0xbff/0xc40 [ 573.638742][ C0] ? __cfi___pv_queued_spin_lock_slowpath+0x10/0x10 [ 573.638758][ C0] ? try_to_wake_up+0x613/0x1220 [ 573.638779][ C0] queued_spin_lock_slowpath+0x47/0x50 [ 573.638801][ C0] _raw_spin_lock_irqsave+0x108/0x110 [ 573.638823][ C0] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 573.638845][ C0] ? rcu_preempt_deferred_qs_irqrestore+0x89e/0x9d0 [ 573.638870][ C0] __stack_map_get+0xec/0x3c0 [ 573.638889][ C0] ? rcu_read_unlock_special+0xab/0x480 [ 573.638909][ C0] ? __queue_map_get+0x3d0/0x3d0 [ 573.638928][ C0] ? __rcu_read_unlock+0xa0/0xa0 [ 573.638947][ C0] ? migrate_enable+0x19c/0x280 [ 573.638963][ C0] ? __cfi_migrate_enable+0x10/0x10 [ 573.638979][ C0] stack_map_peek_elem+0x1f/0x30 [ 573.638999][ C0] bpf_prog_00798911c748094f+0x3a/0x3e [ 573.639013][ C0] bpf_flow_dissect+0x124/0x3e0 [ 573.639034][ C0] bpf_prog_test_run_flow_dissector+0x409/0x600 [ 573.639056][ C0] ? __cfi_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 573.639079][ C0] ? __kasan_check_write+0x14/0x20 [ 573.639100][ C0] ? __cfi_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 573.639119][ C0] bpf_prog_test_run+0x3e3/0x630 [ 573.639134][ C0] ? bpf_prog_query+0x270/0x270 [ 573.639148][ C0] ? selinux_bpf+0xce/0xf0 [ 573.639162][ C0] ? security_bpf+0x93/0xb0 [ 573.639178][ C0] __sys_bpf+0x56d/0x780 [ 573.639191][ C0] ? bpf_link_show_fdinfo+0x320/0x320 [ 573.639208][ C0] ? fpregs_restore_userregs+0x128/0x260 [ 573.639227][ C0] __x64_sys_bpf+0x7c/0x90 [ 573.639248][ C0] x64_sys_call+0x488/0x9a0 [ 573.639265][ C0] do_syscall_64+0x4c/0xa0 [ 573.639287][ C0] ? clear_bhb_loop+0x30/0x80 [ 573.639303][ C0] ? clear_bhb_loop+0x30/0x80 [ 573.639319][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 573.639335][ C0] RIP: 0033:0x7f8e0cd8ebe9 [ 573.639347][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 573.639373][ C0] RSP: 002b:00007f8e0dbe0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 573.639388][ C0] RAX: ffffffffffffffda RBX: 00007f8e0cfb5fa0 RCX: 00007f8e0cd8ebe9 [ 573.639399][ C0] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 573.639408][ C0] RBP: 00007f8e0ce11e19 R08: 0000000000000000 R09: 0000000000000000 [ 573.639417][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 573.639426][ C0] R13: 00007f8e0cfb6038 R14: 00007f8e0cfb5fa0 R15: 00007ffdf8d8c1d8 [ 573.639441][ C0]