last executing test programs: 7m30.530855176s ago: executing program 32 (id=369): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair(0x0, 0x5, 0xbb0, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_bp={0x0, 0x1f}, 0x2010, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000080)=ANY=[], 0x11) 7m30.414412318s ago: executing program 33 (id=365): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f00000001c0), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x200000000000010e, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x10) 5m51.906607145s ago: executing program 2 (id=1729): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000001340), 0xede8, r1}, 0x38) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000e5ffffffffffffff0007d315567addfac92a22e26160bdf1c94dec2495e01b9aeb5bc132cc67ac155f7f98ff85d28ed3304b22fe173685df98a6be86bc40ade95cfbce7e97677673eec964f1", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYRES16=r1], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000007c0)=ANY=[], &(0x7f0000000040)=""/247, 0x1a, 0xf7, 0x1}, 0x28) (async, rerun: 32) bpf$MAP_CREATE(0x600000000000018, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x12, 0x6, &(0x7f0000000280)=@framed={{}, [@ldst={0x3, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(0xffffffffffffffff) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 5m51.825088537s ago: executing program 2 (id=1734): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/11, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000002085"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f0000000240)}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x18) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x14000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, 0x0, 0xfffffe49) r7 = openat$cgroup_procs(r1, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x37}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x18) (async) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r8, 0x0, 0x145, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075d10d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dcedf5112eeb1bdb71a53a44f4af0aa7fbbc2345b070f97f8a79465465dd9613e5ba40d57c37efab4d07240633e284273b6c214ce2f0726c2d45c1329fedd6c6cd1457ad4d3d4bf3a97ba378390161ca12832e879ecac056548026fd24e10dc78a7e6b7e32e1cf8a39e9a67ffe1931e5b13f56751ae31fe8f3b12a1225b524e006b496cd640b7337791884e3cb3e5ea4ed0d6233bb9d4b7092ccc6e973f89a5342487d351d4fb4f431a9baf1ef9339b4cbe718e004602b11a2aec997143b2b85f2602b3", 0x0, 0xc, 0x0, 0x3, 0x0, &(0x7f0000000180)="5d8a84", 0x0, 0x2, 0x0, 0x7c}, 0x50) (async) write$cgroup_pid(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x311dde5e44c46d9d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') (async) r10 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r10, &(0x7f00000000c0)=ANY=[], 0x4) 5m51.776610138s ago: executing program 2 (id=1737): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000880)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYBLOB="375f29c4ba", @ANYBLOB="0000ffffffffe8fffffffffffffd5f", @ANYRES8], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0600000004000000990500000a"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f00000001c0), 0x404, r0, 0x0, 0x1ba8847c99}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1, 0x0, 0xfffffffffffffffe}, 0x18) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40fd) close(r4) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000005000000010001ec0800000001000000785360db89602106d1ef7a981278146ac15e79e20b8965a974a9598790edbba4570a12002e2c8c29b1854b335ed63c00000000000000029680ee89bf46683e5f4665757f071abef3e28358e8013d35be8ef1d014bb75e86d874e733267ab1fdfd388fb9eeb514527ca313f3aca9c6607f0d36c1d859bc62ee98a53d4da2283e7bd140ab7f174578525440f046b1e8ac0fd91602751de43e30b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB='\x00'/21], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 5m51.466260054s ago: executing program 2 (id=1740): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) (async, rerun: 32) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) sendmsg$inet(r1, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) (async, rerun: 64) sendmsg$inet(r1, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) close(r1) (async, rerun: 64) sendmsg$inet(r2, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x7ffe}, 0x50) (async, rerun: 64) syz_clone(0x44044000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x90) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r8, 0x0, 0xe, 0x0, &(0x7f0000000180)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) 5m51.465857944s ago: executing program 2 (id=1741): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000580)={&(0x7f0000000280)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000440)=[{&(0x7f00000002c0)="8546ceaa3dc7de8819716bd6e7524f2cd3dd4250bdf6bd8b6e5dfa8ea37ce6e96dd1cfa2c42b56cca10d378456e5ce3a537c6549ec599d5b7d70625d7cddbad1caa6837b596223b2fc2765fe7d644ef9d080b6466199579663", 0x59}, {&(0x7f0000000340)="1b594b3f49b8fa76bbde53888aba1607d9c5eb8231e836d520dbccdb390f6e5d2d1600937760ee3dc23f25c43173d4d0702b7bf744df076e8a312a4c6580cb8fc546cd291206dabbf57a1e9138080bccc726c8bb5e2d4006ba070d78ffc1e0119e2d4e7166b10ca2057aa060739560f218eec2005d0bf7f49d612c1ba1779e8a6bd23c198af018bf6fce90a0f2fe39beecec64da16966970f5c2fb0decea6ba6b9a8935afc3aee44b06134e9937c4143790a0e3a060877dabb7f74d1b30122ef3a3d2b00b73133579fc751f47fcbc3dc101e041af3856e1d1737835f2c7e24e80470c1187d905a2e608ea8", 0xeb}], 0x2, &(0x7f0000000480)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x100}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0x60}, 0x800) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) socketpair(0xa, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="180000000000000000000000000000006112340000000000950000000000000039ff66a8d35b9a8db8662385249d0e49954967c507d58613b9cc81cf32a20736c39c4ec489febab6f4eebbb6a520f2b2b1ddd2c2b104b77f795899e4aa4ef67ae7ac3e9f008b21b487f6cdeaacfc21d8e0621793d01d6df377589b0a70b271c1"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) (async, rerun: 32) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001000)={&(0x7f0000000040)='cq_alloc\x00', 0xffffffffffffffff, 0x0, 0xa}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff356, 0xfffffffffffffffb}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x12711, 0x8, 0x7, 0x5, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000007000000000000000000008500000023000000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x94) 5m51.441709324s ago: executing program 2 (id=1742): ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = getpid() write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) close(0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) write$cgroup_type(r2, &(0x7f00000000c0), 0x9) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000140)=0x96) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='qrtr_ns_service_announce_del\x00', r2, 0x0, 0x6}, 0x18) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) syz_open_procfs$namespace(r1, &(0x7f0000000240)='ns/ipc\x00') r3 = syz_clone(0x4120000, &(0x7f0000000280)="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", 0x1000, &(0x7f0000001280), &(0x7f00000012c0), &(0x7f0000001300)="8c32429db9d751029c4209765efd5a550799958a19e3f81c040f7638348994d44558e1fad32c4ea70e26ef0e046b6adf24354e37d818d6a4dc0a17aeff1faed4") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001740)={r2, 0xe0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001480)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001500)=[0x0, 0x0], 0x0, 0x6c, &(0x7f0000001540)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001580), &(0x7f00000015c0), 0x8, 0x3a, 0x8, 0x8, &(0x7f0000001600)}}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000017c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xffff36da, '\x00', 0x0, r2, 0xa, 0x2, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000018c0)={{r2, 0xffffffffffffffff}, &(0x7f0000001840), &(0x7f0000001880)=r2}, 0x20) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001980)={0x18, 0x5, &(0x7f0000001340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000001380)='GPL\x00', 0x0, 0xa7, &(0x7f00000013c0)=""/167, 0x41000, 0x8, '\x00', r4, 0x0, r2, 0x8, &(0x7f0000001780)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001900)=[r2, r5, r2, r6, r2, r2, r2], &(0x7f0000001940), 0x10, 0xfffffffc}, 0x94) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001a40)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x3c, '\x00', 0x0, r0, 0x0, 0x2, 0x5}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = gettid() sendmsg$unix(r2, &(0x7f0000002100)={&(0x7f0000001ac0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001b40)="fd97ec8ad036afdc644be24bd86b27e340abf0e6ce091b6e01fb14f3139132ebe170be54936962aedc7991629f93d6fb9fea83ab80d1b84b9100111b34025495792657433b0c657e6bf2a9721d51cb73beca043671617e", 0x57}, {&(0x7f0000001bc0)="9af75d3032e9e6580ab31bfda334e0a6a6911fcd2562bc738dd42d1c21ae9149d03650226d17ec5ca1ad7411ec2eba97c9ee34f206e7bff69d310f8b6f42032fdfe74a308045930b2824ebc25a41054fd7c74799cc187f89843e7f41e92e493b630e19a0ecec9312bcceac6efaba9fedf50578028b0f351bacc9a4763904e370f0d864ccadd22295d3e5b617c21f2c237dd8ef9c9a6373889c768ce56d921dabaa71d9ef5e0165c40ca2e5acb166cb755d9729f968b365b5b289a9348fb984", 0xbf}, {&(0x7f0000001c80)="2a20effa73c9ae3b725040a08f8a6c5242b0efea3d9bc94b71408dc8065d2e53af1b67ebedbd6c4b83af8ef2dc022854e82003dd9d4253024492ee6ad0bd478048f7d61166de98c30d5a3921225126a78c94229dab917c54e23cc7e3262bba65fab58705b7cc2b72086b4b94a20d5454c309d4dde45428f52fc241d6bc7f3bf0b205770ceff94125d0da1fb20a04588a8bfe34b8669c2da80b96347b6180eb8b8bc14e4302a522d719226a723c9d54f1732e152a26f8", 0xb6}, {&(0x7f0000001d40)="be26d939edbb64620fd66c217837fde23a9f98a8bdce963143fd6daaa90be26308a85ab66838d4074e43d2e516c5d4ea5d314ea0232bb5d3ac9f78a12f6104646bc20a878c957e28650236b8203338b5a8ac94c938b5952c232aae287c74ad4e925cb649c0dbcbc25b0850beaba572c80ebda06dc68925279960e6ea76e35217314c24bd25a7620eb277007589cd2339f46f53b5b3081feb70db16bc57c567cc28c93b1c37443a39be80040d6ae50fbd44eaa35db88d59f9d1b126f03a77ac43c1b6dd94b4298857189e4e043c9764019441acc965f259417e7935d6f330b3864f4a6971a4fbb6bbbee81b10714f48a5afca142207120b58", 0xf8}, {&(0x7f0000001e40)="b68f7950f43bd1fcbc0cd4", 0xb}, {&(0x7f0000001e80)="460186c7a5ba89e5ece07002dbf05668f69562bea94689527da3c787a418c6b1899078d3cdf6a5bd49ada98e30806dd467c35c69544415d38c7b8a03324556c098338b5efe0e735f2662f87c920d80b375375165ead7aeefad9004ba111962d9f54d44fb612bc510b189d9c698ca685dbe7cd95a21325835a0db4c17386215859ac5aaf618c9fec89818991abdd15c7766ddb528137657c8adf3dacc69333fdb6a4edf6a9237b70dc958c6898987ea28a9bd9fd7b6574f4b0df1018b0b3d7460bd9ee45d85fb5cd1b493dfbd0811a95bf63c90573fdcf7f0ff116a10e53a51188f", 0xe1}], 0x6, &(0x7f0000002040)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r7]}}, @rights={{0x14, 0x1, 0x1, [r9]}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee01}}}], 0x90, 0x40}, 0x20008000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r12, &(0x7f00000025c0)={&(0x7f0000002180)=@abs, 0x6e, &(0x7f0000002480)=[{&(0x7f0000002200)=""/46, 0x2e}, {&(0x7f0000002240)=""/55, 0x37}, {&(0x7f0000002280)=""/31, 0x1f}, {&(0x7f00000022c0)=""/96, 0x60}, {&(0x7f0000002340)=""/3, 0x3}, {&(0x7f0000002380)=""/44, 0x2c}, {&(0x7f00000023c0)=""/149, 0x95}], 0x7, &(0x7f0000002500)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x100) ioctl$PERF_EVENT_IOC_PERIOD(r13, 0x40082404, &(0x7f0000002600)=0x10) write$cgroup_type(r16, &(0x7f0000002640), 0x9) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002680)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002800)={@map=r8, 0x9, 0x1, 0x9, &(0x7f0000002700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000002740)=[0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000027c0)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002840)={@fallback=r10, r16, 0x7, 0xa, r15, @void, @value=r14, @void, @void, r17}, 0x20) 5m36.337620387s ago: executing program 34 (id=1742): ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = getpid() write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) close(0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) write$cgroup_type(r2, &(0x7f00000000c0), 0x9) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000140)=0x96) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='qrtr_ns_service_announce_del\x00', r2, 0x0, 0x6}, 0x18) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) syz_open_procfs$namespace(r1, &(0x7f0000000240)='ns/ipc\x00') r3 = syz_clone(0x4120000, &(0x7f0000000280)="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", 0x1000, &(0x7f0000001280), &(0x7f00000012c0), &(0x7f0000001300)="8c32429db9d751029c4209765efd5a550799958a19e3f81c040f7638348994d44558e1fad32c4ea70e26ef0e046b6adf24354e37d818d6a4dc0a17aeff1faed4") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001740)={r2, 0xe0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001480)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001500)=[0x0, 0x0], 0x0, 0x6c, &(0x7f0000001540)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001580), &(0x7f00000015c0), 0x8, 0x3a, 0x8, 0x8, &(0x7f0000001600)}}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000017c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xffff36da, '\x00', 0x0, r2, 0xa, 0x2, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000018c0)={{r2, 0xffffffffffffffff}, &(0x7f0000001840), &(0x7f0000001880)=r2}, 0x20) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001980)={0x18, 0x5, &(0x7f0000001340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000001380)='GPL\x00', 0x0, 0xa7, &(0x7f00000013c0)=""/167, 0x41000, 0x8, '\x00', r4, 0x0, r2, 0x8, &(0x7f0000001780)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001900)=[r2, r5, r2, r6, r2, r2, r2], &(0x7f0000001940), 0x10, 0xfffffffc}, 0x94) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001a40)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x3c, '\x00', 0x0, r0, 0x0, 0x2, 0x5}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = gettid() sendmsg$unix(r2, &(0x7f0000002100)={&(0x7f0000001ac0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001b40)="fd97ec8ad036afdc644be24bd86b27e340abf0e6ce091b6e01fb14f3139132ebe170be54936962aedc7991629f93d6fb9fea83ab80d1b84b9100111b34025495792657433b0c657e6bf2a9721d51cb73beca043671617e", 0x57}, {&(0x7f0000001bc0)="9af75d3032e9e6580ab31bfda334e0a6a6911fcd2562bc738dd42d1c21ae9149d03650226d17ec5ca1ad7411ec2eba97c9ee34f206e7bff69d310f8b6f42032fdfe74a308045930b2824ebc25a41054fd7c74799cc187f89843e7f41e92e493b630e19a0ecec9312bcceac6efaba9fedf50578028b0f351bacc9a4763904e370f0d864ccadd22295d3e5b617c21f2c237dd8ef9c9a6373889c768ce56d921dabaa71d9ef5e0165c40ca2e5acb166cb755d9729f968b365b5b289a9348fb984", 0xbf}, {&(0x7f0000001c80)="2a20effa73c9ae3b725040a08f8a6c5242b0efea3d9bc94b71408dc8065d2e53af1b67ebedbd6c4b83af8ef2dc022854e82003dd9d4253024492ee6ad0bd478048f7d61166de98c30d5a3921225126a78c94229dab917c54e23cc7e3262bba65fab58705b7cc2b72086b4b94a20d5454c309d4dde45428f52fc241d6bc7f3bf0b205770ceff94125d0da1fb20a04588a8bfe34b8669c2da80b96347b6180eb8b8bc14e4302a522d719226a723c9d54f1732e152a26f8", 0xb6}, {&(0x7f0000001d40)="be26d939edbb64620fd66c217837fde23a9f98a8bdce963143fd6daaa90be26308a85ab66838d4074e43d2e516c5d4ea5d314ea0232bb5d3ac9f78a12f6104646bc20a878c957e28650236b8203338b5a8ac94c938b5952c232aae287c74ad4e925cb649c0dbcbc25b0850beaba572c80ebda06dc68925279960e6ea76e35217314c24bd25a7620eb277007589cd2339f46f53b5b3081feb70db16bc57c567cc28c93b1c37443a39be80040d6ae50fbd44eaa35db88d59f9d1b126f03a77ac43c1b6dd94b4298857189e4e043c9764019441acc965f259417e7935d6f330b3864f4a6971a4fbb6bbbee81b10714f48a5afca142207120b58", 0xf8}, {&(0x7f0000001e40)="b68f7950f43bd1fcbc0cd4", 0xb}, {&(0x7f0000001e80)="460186c7a5ba89e5ece07002dbf05668f69562bea94689527da3c787a418c6b1899078d3cdf6a5bd49ada98e30806dd467c35c69544415d38c7b8a03324556c098338b5efe0e735f2662f87c920d80b375375165ead7aeefad9004ba111962d9f54d44fb612bc510b189d9c698ca685dbe7cd95a21325835a0db4c17386215859ac5aaf618c9fec89818991abdd15c7766ddb528137657c8adf3dacc69333fdb6a4edf6a9237b70dc958c6898987ea28a9bd9fd7b6574f4b0df1018b0b3d7460bd9ee45d85fb5cd1b493dfbd0811a95bf63c90573fdcf7f0ff116a10e53a51188f", 0xe1}], 0x6, &(0x7f0000002040)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r7]}}, @rights={{0x14, 0x1, 0x1, [r9]}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee01}}}], 0x90, 0x40}, 0x20008000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r12, &(0x7f00000025c0)={&(0x7f0000002180)=@abs, 0x6e, &(0x7f0000002480)=[{&(0x7f0000002200)=""/46, 0x2e}, {&(0x7f0000002240)=""/55, 0x37}, {&(0x7f0000002280)=""/31, 0x1f}, {&(0x7f00000022c0)=""/96, 0x60}, {&(0x7f0000002340)=""/3, 0x3}, {&(0x7f0000002380)=""/44, 0x2c}, {&(0x7f00000023c0)=""/149, 0x95}], 0x7, &(0x7f0000002500)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x100) ioctl$PERF_EVENT_IOC_PERIOD(r13, 0x40082404, &(0x7f0000002600)=0x10) write$cgroup_type(r16, &(0x7f0000002640), 0x9) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002680)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002800)={@map=r8, 0x9, 0x1, 0x9, &(0x7f0000002700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000002740)=[0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000027c0)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002840)={@fallback=r10, r16, 0x7, 0xa, r15, @void, @value=r14, @void, @void, r17}, 0x20) 3m8.942939201s ago: executing program 6 (id=3477): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000004c0)=ANY=[@ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x4040086) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1f, 0xc, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r6, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0800f8686600"/21, @ANYRES32, @ANYRES16=r6, @ANYRESOCT=r6, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 3m8.825380634s ago: executing program 6 (id=3480): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)}, 0x0) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 3m8.695265006s ago: executing program 0 (id=3484): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xe115, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000005ac9124e3e3a870004a0d800652bc70ae75ce44a6b2d5b186c608d8a006604a9c9cc1d72abe856ad6e1bf79802ec512f23c06d1da12c47688cb1c429069c5bf0"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 3m8.635771257s ago: executing program 7 (id=3486): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x2}]}, @restrict={0x0, 0x0, 0x0, 0x4, 0x1000000}]}}, 0x0, 0x3e}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x10000}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b}, 0x94) unlink(&(0x7f0000000200)='./cgroup\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x0, 0x0, 0x0, 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 3m8.634167127s ago: executing program 0 (id=3487): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0xfa4b, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001880)={r3}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r4, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r4) sendmsg$inet(r5, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) 3m8.576092909s ago: executing program 0 (id=3488): socketpair(0x1e, 0x1, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x6, 0x600}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r2, 0x0, 0x80000fffe}, 0x38) 3m8.397244272s ago: executing program 7 (id=3492): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000080000002000000000001000080ffffffff000027"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r3, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000400)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x53, &(0x7f0000000840)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xb, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) write$cgroup_subtree(r7, 0x0, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x6, 0x0, 0x0, 0x0, 0xffffff81, 0xcb, &(0x7f0000000740)=""/203, 0x41100, 0x4e, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000980)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000b40)={0x3, 0x1, 0x7f, 0x4cba}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000b80)=[r2, r5, r2, r2, r2], &(0x7f0000000bc0)=[{0x4, 0x1, 0x2, 0x4}, {0x1, 0x4, 0xc}, {0x1, 0x1, 0x1, 0xa}], 0x10, 0x3}, 0x94) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x15, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000}, {}, {}, [@ldst={0x1, 0x3, 0x6, 0x0, 0x0, 0x1, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8882}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0xc4, &(0x7f00000008c0)=""/196, 0x41000, 0x22, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x5, 0x0, 0x5, 0x6}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000e40), &(0x7f0000000a40)=[{0x5, 0x2, 0x2, 0xa}, {0x0, 0x4, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x2}, {0x0, 0x5, 0xe, 0x8}, {0x3, 0x4, 0x5, 0x4}, {0x3, 0x5, 0x2, 0xb}, {0x4, 0x4, 0xc, 0x3}, {0x1, 0x3, 0xf, 0x5}, {0x4, 0x3, 0xb, 0x1}]}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@bloom_filter={0x1e, 0xfffffe00, 0xfff, 0x4, 0x40, r1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4, 0xa}, 0x50) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)=@o_path={&(0x7f0000000c40)='./file0\x00', 0x0, 0x10, r0}, 0x18) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000cc0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d80)=@bpf_tracing={0x1a, 0x21, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc377}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0xf4, &(0x7f00000007c0)=""/244, 0x41100, 0x30, '\x00', r6, 0x1c, r8, 0x8, &(0x7f0000000080)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x2dc72, r9, 0x0, &(0x7f0000000d40)=[r10, r11, r12, r1, r1, r13, r1, r1, r1, r1], 0x0, 0x10, 0xf044}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r14}, 0x10) r15 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r16 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r15}, 0x8) close(r16) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r15, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r16, r15, 0x4, r15}, 0x10) 3m8.270398594s ago: executing program 0 (id=3493): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb938, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x202000, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x9) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1428437b3c8026bdfeb6db4ee9bcb25b1811d40a203bf40b3a7da5a8a64db04ed6dd26eea2a37229c339b1f91201c2796", 0x3d}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r3) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[], 0x0, 0x4e}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) 3m7.96859601s ago: executing program 6 (id=3495): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x12, 0x4, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000000000000000000000007112050000000000950000000000000010443204684081d6a8394600fc83b700430668"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13}, 0x80) socketpair(0x3, 0x4, 0x52ce, &(0x7f0000000000)) 3m7.896687672s ago: executing program 6 (id=3496): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="12000000610000000800000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r4}, &(0x7f0000001d80), &(0x7f0000001d40)=r3}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdf, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0x1e, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0xa, 0x5, 0x7, 0x80, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x10}, @alu={0x4, 0x1, 0x0, 0xb, 0xb, 0x80}, @exit, @map_idx={0x18, 0x8, 0x5, 0x0, 0x9}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fffffff}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x4}], 0x0, 0x2c00, 0xea, &(0x7f00000001c0)=""/234, 0x41000, 0x60, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0x3, 0x4, 0x2}, 0x10, 0x24332, 0xffffffffffffffff, 0x0, &(0x7f00000006c0), 0x0, 0x10, 0x3e}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x80000000, 0x0, r2, 0x10, '\x00', r5, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0500000000f01f00810000007f00000001"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r8, 0x0, 0x0}, 0x20) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 3m7.883498912s ago: executing program 7 (id=3497): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x3b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) 3m7.837866282s ago: executing program 7 (id=3498): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xe115, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000005ac9124e3e3a870004a0d800652bc70ae75ce44a6b2d5b186c608d8a006604a9c9cc1d72abe856ad6e1bf79802ec512f23c06d1da12c47688cb1c429069c5bf0"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 3m7.806198463s ago: executing program 7 (id=3499): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="07000000040000001800000042a0000000000000", @ANYRES32, @ANYBLOB="21040000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r0, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xa0001f98, 0x0, 0x0, &(0x7f0000000440), 0x0, 0xa70a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x8, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000400"/28], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r10}, 0x10) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631380fc00082ce0db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r11}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 3m7.754274394s ago: executing program 4 (id=3500): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x3fd, 0x0, 0x0, 0x0, 0x1}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0x8000}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000001480)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000085000000a000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x3}, 0xfffffffffffffdb0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000140)='\xe8\x88\x9cH\x14]\x89\x11/') r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0xfa, 0x2, 0x3, 0xc0, 0x0, 0x2, 0x142101, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x55e0f7cd, 0x1, @perf_config_ext={0xfff, 0x6}, 0x40, 0x4004, 0xe, 0x9, 0xfda, 0x5, 0xe7ba, 0x0, 0x8287, 0x0, 0xc940}, r6, 0x10, r8, 0x5) 3m7.663566136s ago: executing program 0 (id=3501): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x61, 0x1, 0x0, 0x0, 0x0, 0x3, 0x30400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4}, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e0000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000180)={r1, r0}, 0xc) 3m7.644996846s ago: executing program 0 (id=3502): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xc, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0xffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffcbc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) openat$cgroup(r6, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r10}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0xfffffffffffffdf5, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3m7.626528537s ago: executing program 4 (id=3503): socketpair(0x1e, 0x1, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x6, 0x600}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r2, 0x0, 0x80000fffe}, 0x38) 3m7.305222943s ago: executing program 7 (id=3505): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{0x0}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 3m7.304798723s ago: executing program 4 (id=3506): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'wg0\x00', @broadcast}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3m7.236310084s ago: executing program 4 (id=3507): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000fb7335db91850b43fd75f29cd0fa6df6794fcfeda542311b2b04002da1a29d60b72c777a44f96002b043c21c38b280452208492d25873ea3c3ab065d51a73fd51d729a1085336990a3698a2ebe044d4aa5cc5dfc11d6aabcb08adf86420eef49df2696b38e20b4ba3bf3672bb2359a860ff0b2f015b6f2a3fcc3e9e5f27453b18adcbb1792244cb04bca766de16b426c925971f1b6a4b86227692a4d0e777c0fb3a3687f9cd466ba802c4b7af6972930c3036820541fd8fa4f63c14c6efed1c256345ac179733f00f5224e18fe82f58cf4"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r4}, 0x18) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0xfffffffffffffd46) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x0, 0xb, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000480)={'dvmrp1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1600000000000000040000d3f069110000002000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000c00)=ANY=[@ANYRES64=r8, @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095", @ANYBLOB="d3185337a153f3890c61f6b5d1409c8ae06f2ab9f39baafc4e808ad8fcf9efd237a98b78dd26df7d78e59b4c0b4622b7aeb19c388a2f1f1653ff880b7a9cc4", @ANYRES16=r1], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000e40)=ANY=[@ANYRES64=r5, @ANYBLOB="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", @ANYRESHEX=r9], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r11, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbe, &(0x7f0000000500)=[{}, {}, {}, {}, {}], 0x23, 0x0, 0x0, &(0x7f0000000580), 0x8, 0xfc, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', r12, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0xf, &(0x7f0000000b00)=ANY=[@ANYBLOB="180000000600000000000000dc01000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000000000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000c20ddb09b9718cfa0a7fd25dd04ea86282f7f8ec476c9bcd3027624071a166ddda2261cda2944c48a8319400f456c95a6273aff3a81137d41080365a85557d256522a347ea26eb93ea3aaf9fcb8e4a03093a871cd35d"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x29, &(0x7f0000000180)=""/41, 0x100, 0x2, '\x00', r12, 0x25, r13, 0x8, &(0x7f0000000700)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x20000003, 0x1, 0xb, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000840)=[r3, r3, r3, r10, r10], &(0x7f0000000880)=[{0x3, 0x4, 0xc, 0x8}, {0x1, 0x5, 0x0, 0xa}, {0x4, 0x8, 0x6, 0xa}, {0x5, 0x1, 0x10}, {0x0, 0x1, 0x9, 0x2}, {0x5, 0x4, 0xa, 0xa}], 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00'}, 0x18) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x8, 0x9b, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 3m7.178779646s ago: executing program 4 (id=3508): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001f80)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000500)='kmem_cache_free\x00', r2}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6151, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB], 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe31, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[], 0xfdef) 3m6.969928309s ago: executing program 6 (id=3509): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xe115, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000005ac9124e3e3a870004a0d800652bc70ae75ce44a6b2d5b186c608d8a006604a9c9cc1d72abe856ad6e1bf79802ec512f23c06d1da12c47688cb1c429069c5bf0"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 3m6.968351119s ago: executing program 4 (id=3510): perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) (async) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r0}, 0x8) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b000000080000000c000000fbbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000c000000000000000000000000000000000000c0cb92b626c876a426751b1a85722fd8c82fd0b8b999fa9c1cda71994f3c04a27419b0722e232ee66dd332ac213c209f23a66487f2622e7dde"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) (async, rerun: 32) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x1a, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) (async, rerun: 32) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async, rerun: 32) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x36, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x2000c940) (async) recvmsg$unix(r9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[], 0x48) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180000080000800000000000000000", @ANYRESDEC=0x0, @ANYRES8=r5], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x18}, 0x94) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) 3m6.967590059s ago: executing program 6 (id=3511): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000040)=@framed={{0x25, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0xfffffffc, 0x0, 0x0, 0x0, 0x1}, 0x50) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) r4 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r4, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r5, &(0x7f00000003c0)="6ff7dc15955b730fe69a9a0839ea5f5f23ce20820398", &(0x7f0000000400)=""/199}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x2c}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x24, 0x4, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r8, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r8}, 0x0, &(0x7f0000000740)=r6}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m44.73303905s ago: executing program 35 (id=3502): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xc, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0xffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffcbc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) openat$cgroup(r6, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r10}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0xfffffffffffffdf5, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2m44.71922025s ago: executing program 36 (id=3505): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{0x0}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 2m44.676822111s ago: executing program 37 (id=3511): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000040)=@framed={{0x25, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0xfffffffc, 0x0, 0x0, 0x0, 0x1}, 0x50) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) r4 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r4, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r5, &(0x7f00000003c0)="6ff7dc15955b730fe69a9a0839ea5f5f23ce20820398", &(0x7f0000000400)=""/199}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x2c}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x24, 0x4, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r8, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r8}, 0x0, &(0x7f0000000740)=r6}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m44.662253371s ago: executing program 38 (id=3510): perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) (async) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r0}, 0x8) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b000000080000000c000000fbbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000c000000000000000000000000000000000000c0cb92b626c876a426751b1a85722fd8c82fd0b8b999fa9c1cda71994f3c04a27419b0722e232ee66dd332ac213c209f23a66487f2622e7dde"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) (async, rerun: 32) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x1a, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) (async, rerun: 32) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async, rerun: 32) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x36, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x2000c940) (async) recvmsg$unix(r9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[], 0x48) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180000080000800000000000000000", @ANYRESDEC=0x0, @ANYRES8=r5], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x18}, 0x94) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) 5.656635721s ago: executing program 8 (id=5521): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3f, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x75, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0), 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYRES8=r0, @ANYRESHEX, @ANYRES64], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x74, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r1], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{r2}, &(0x7f0000000640), &(0x7f00000007c0)='%pi6 \x00'}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0x0, 0x1}, 0xc) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={&(0x7f00000000c0)="1c7860e006", &(0x7f0000000f80)=""/4096, &(0x7f0000000100)="65c7b50f1d09b662a7f955816b0ea441c0bbcf5553ecd018ab58e9cccd4cecb4eac254ee5f3d5f657617ccd963563c46c1b24c6847f340cb8b35a803f5dcbb88f10b75", &(0x7f0000000600)="4aa2ddc0264d3784155151b1c2d4d5ee06625637663d74096913e31951d7a9604220bfcd6a858d27003d89b1aa7513", 0x2, r5, 0x4}, 0x38) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 3.297260896s ago: executing program 5 (id=5556): perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000200), 0x3, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000001c0)={[{0x2d, 'blkio'}, {0x2b, 'rlimit'}]}, 0xf) 3.294376816s ago: executing program 5 (id=5558): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x4, &(0x7f0000000300)=ANY=[], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x4}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x400}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1d, 0x14, &(0x7f0000000400)=ANY=[@ANYRESHEX=r2, @ANYRES8=r0, @ANYRES16=r2], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x804, 0x14c9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, @perf_config_ext={0x1}, 0xa0, 0x58, 0x0, 0x4, 0x2, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0xc, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r6], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r8, 0x40047451, &(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x4f7d9539ee46e045) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) close(r1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x122, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.663791779s ago: executing program 1 (id=5566): bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000030000009500000c00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001240)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d0f65acc0d06d1a1434e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c690220b87b20581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f29e5dad9796edb697a8ad004eea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc518afc9ffc2cc788bee1b47683db01a2f9398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db00002e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d50200a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afd80e17000000000000000000000000000000000000000000000000000005205000000dc1c56d19f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db08407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4092140faed0c329be610c3082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d6fccbecfae5553d9950d48c774eaa35b24fce69a20d8bc410d9f48bf7eac90529cd6af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85e9bb70a3009a5d30f479e293a3302e11350ea857b37e76ca2f50378e4092ce2c574ad278b9b7b717c571afb2077b019fd9d89efd59b41f051ec5a8ff87ecc8df917a1e386d849fcd10e2f9ca52e02339c2f4666b0c545e25f1cd62421c28d25994be0cff7271a0dee38d7ac4ac736b090e1d29f981179186e4000000000000646174b55d251f7f8ca5ccc22a5efb33b237eff5597a3c3a5f3a9bb54abb40e54593e1a7ce4cfa17b3c3fe91c06363496341eae20dcc59b6179b32ddddef5c34000096a54c0c571a91878f61f74912e2299e5501d4d6943bfd74c856511726f0ac8f7d17f1c6b4451c1bcdc6b6e1700e4cd87709d97afc5423c96fa981873d4369b04bbf1fb9f68f17991540868e408201ad1a74179e489aa61f021a437a3fa935588be2068f7ff9b253106326fde795e530b93626cc68e06e602198724249b4445eef08401cd1a3e266db41474e69902e4d8f5da4e94cc36794258fd4032de7ab36bc24c5efd5c8495c1ccd580033c55725f2d60354f8ad5914a0155eaa743350ddb388f486b6de0549ef3b1b3c3b7d4d3a830ff39885776119408029be3788dd8422b1ab7b4c9d5b7d8682fd759c713108e1bdfc64b9121bbf07099def5c0ce3c861ae4b5cad8bba5a0b6059b9ef90c2f96a59320309e25df89484522bb1d6eaa92164f9e4042cb689a45a898354c17b08705205a9189772bcbcb6414e44b33a2470d3bc16f761c33f565b9da5e7991ad8482579cc1b16c1fcec815a5482ae8b1779c5e339971a6ec1217bcfd1ef24284de8a0a9f068f297037d6478c2434a9a18dcc6c7c791e444a79d7ce37f9cf2a434b9048ca6a2fa254aa02cd098026798a6d336348af0fc11fa2809a5ebbe17ca4d6356e4450d043ed20d313cd56a56d2e4cdf26f19af9a41695a58a9b6b45af1ca939b18d7b57791b99cfc6ec2a0848c29fea4eb8b82395a38e8aca5ab4bfc2ad8acf2e51b766f8ecd16194ad41ec097082f7fa32179ef99dafa6c2aa206a25ddc33e6f0a09169eeff428c71f54e1dfcfcd7cfc8f6e169f11c47d504"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000140)="b9ff03076804268cb89e14f088a847e0ffff20ffffa888000000ac141416e0885a049a179424", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) (rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000003a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000500)="b958945d8ae49c4f19be14f06558", 0x0, 0x1cb0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) (async, rerun: 64) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=0x0, @ANYRES16=r6, @ANYRESDEC=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'macsec0\x00', @local}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000fa0000d800000000000000e63fa1e513413e3342893320ecdea4f26e66cbd9b4a648c9f69be5f59a800c30a588b8", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) (rerun: 32) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r11, 0x3, 0x5, 0x2}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400), 0x101140, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.544502241s ago: executing program 3 (id=5568): perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000200), 0x3, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000001c0)={[{0x2d, 'blkio'}, {0x2b, 'rlimit'}]}, 0xf) 2.458336102s ago: executing program 9 (id=5569): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020a000000000000000000000b00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0xffffffffffffff81) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000002b80)={0x0, 0x80, 0xc2, 0x2, 0x0, 0x4, 0x0, 0x185e, 0x5020c, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={0x0}, 0x4, 0x8000000000000001, 0x3, 0x5, 0x5e1, 0x3, 0x2, 0x0, 0x57e1, 0x0, 0x8001}, r2, 0x6, 0xffffffffffffffff, 0x6) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180)=r2, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d95c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f0555a15f5c39cbc6fc096f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b732cda1ba46a2a42c4c333abc80e00fb000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a5feb47115ac44625090590c275a5f2cf4f8789450b8303e8fdb7449565e01a331f061e143b26ab8905449942ca2c339ffbe92f821d84b2dd89069e6b66174903a7e94fa7a055b52b1dc2f4d76ec4d98432d6cf396b9d61858bcd5ff958da1ff886e43ffbcb2d972f43031769718daaa6105a5188ed990122303d201404e179144da06ed1e7ddff0fac2edd58ea986b3b375a57d8e37a2952902d357386884e3e548196f1f1a3e59edcd7b9ced9b2782c41724b738a8d47236983a2db1146b7a925a02ebf7739f63057c4ae701c74622be55bd113a415f7b36818647ce0d39e3aeb2002d51ff70c1e464c5f5e26aa1af3e7299d23be"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='bdi_dirty_ratelimit\x00', r4}, 0x10) (async) r6 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r6, r5, 0x0, 0xffffffffffffff11, 0xfffffffffffffffe}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0000000008003b8db5fd54c72483828717d5882bdf2a68fb87b7c6de030ccdf90555aeab47aa836fc15d2c084d55fb898eef3d7f1d9c516df12082a5cb8c3f76501ca729ad92b52008ae33709ca34983c4f9c0c220ef5b556e404e57230f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r8, 0x0, 0x1}, 0x18) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='mm_page_free_batched\x00', r9}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r10, &(0x7f0000000180), 0x40010) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8a502, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000300)}, 0x18220, 0x10003, 0x0, 0x6, 0x8000000000000000, 0x25, 0x0, 0x0, 0x20}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) 2.457822422s ago: executing program 1 (id=5570): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x180, 0x4, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000050000850000001b000000b700000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x18) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.456567632s ago: executing program 3 (id=5571): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_type(r2, &(0x7f0000000280), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0xa, [@volatile={0x10, 0x0, 0x0, 0x9, 0x3}, @enum64={0x1, 0x1, 0x0, 0x13, 0x1, 0xec510bc650a9ea91, [{0xf, 0x7, 0x40}]}, @typedef={0xc}, @union={0x2, 0x1, 0x0, 0x5, 0x1, 0x3, [{0x7, 0x2, 0x77}]}, @volatile={0xc, 0x0, 0x0, 0x9, 0x1}, @union={0x4, 0x2, 0x0, 0x5, 0x0, 0x11a88260, [{0x4, 0x0, 0x3}, {0xc, 0x5, 0x7725}]}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x1}]}, {0x0, [0x30, 0x61, 0x2e, 0x30, 0x30, 0x30, 0x0, 0x2e]}}, &(0x7f0000000400)=""/18, 0xa6, 0x12, 0x1, 0x7}, 0x28) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 2.375807664s ago: executing program 5 (id=5572): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2010000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 2.324691335s ago: executing program 8 (id=5573): perf_event_open(&(0x7f00000007c0)={0x4, 0x80, 0x61, 0x1, 0x80, 0x0, 0x0, 0x3, 0x30400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x1000000000}, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) 2.323367815s ago: executing program 9 (id=5574): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000e80)=ANY=[@ANYBLOB="0000001100000086352bd852e5402fa1e4111202dec58a3aa0a97b67e3636ab29341b6c1930300000000000000ad4a94101552517afa6f9145db8c0e37", @ANYBLOB="0000000000000000b703000000000000850000002f000000b70900000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0x4, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x6}, 0x800, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x10400, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r5, 0x400454d1, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$unix(r4, 0x0, 0x20000040) sendmsg(r4, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) perf_event_open(&(0x7f0000001b40)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x200, 0x20008, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext={0x3}, 0x4920, 0x5, 0x8, 0x0, 0x0, 0x200000, 0x8004, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000300)='block_bio_complete\x00', 0xffffffffffffffff, 0x0, 0x10001}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x55, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r8, &(0x7f0000000500)={&(0x7f0000000240)=@phonet={0x23, 0x4, 0x8, 0x9}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000180)="3ae061ced5e6e47880074fecf84dc7ec582dbfe7cf7072517ab97a36073df09a7c5b6e42eca7511c35ed702882aa5ee270235c7967c7ddf058b325de37", 0x3d}, {&(0x7f00000006c0)="25dab8f25fe0310d0fc6964e2f17d384a31f50c3d9392bf0d8d9a849e76c676fc154cf807c9f9077785d979d6894e00a5205bbfd2a6211e7e49e1ebbd569519c07fbfbf44da2965eaf4b5a6d2caa459a4bfab534a5f9dfd58a78fa0ade16a55ba5e4a187872d9db2167baf26b25df6a4ea0644e16234d120ece445956b68c8e5492890ee1b49f6dbe2c0b94cb5ea52f12c6e7c040ebc90cc043263924e23f3c74b", 0xa1}, {&(0x7f0000000580)="fa6e92eaecd797fb6b7cd523813516f9972f0e7b86895ec80970c51c22ba240b60603679fcfa9efc1170ae0c062b2f1831542b9cdb30dbbcc7660c0e34952a29eea336ceca19bc24df4de1e91178081c85988000", 0x54}, {&(0x7f00000009c0)="3fc5e0de8946b407b2aea70cd5fb5704c2678b70baac5d82377f290e3cb9c4631680dd651cf03a433a0d9c006b977579d4a437c53dea303dbfb10729a85fb43ee855080eefae2b8ca645336a259cc2a0e377b647af5878934e0942690a2d6c4845f1d896698945641ab60bbad50a64f7edc2b853c6436af6e25a33703c756583323aab603199e28ef6f647c287b4d4a452075ba5cb2ab381efed17a35ed4fe1575ae238418e0f06bfa07f524ecf01b26aab0be43c45ed539a49fa478edb9ed686b8b38e331d305c75866aa3cc148994f3ef777f708b24b39af6b48", 0xdb}, {&(0x7f0000000ac0)="0d964b562ce8a0a846c7a7e729295830d5e558c28c309c0d7c055879cdb3a06c904eb3abc4a3b641d5bfb75cf3a28bdc5c9775ebf5845344d41c7f257c689bb63984390e1ec8ab9b0d2c581e63a18f4308b05c6348cabd4aaf2113ab7fed7a2411ac811194d2419859722a6702235f95cfddc193b3eb7e120aa5f36e2223c2d9c1a0d85b01576c8a106bf22f3a5079d1c4ba785cc55c3a88", 0x98}, {&(0x7f00000002c0)="53e1fc92afb3aedf5a2a28151b13ea7381ebaae9990d02ebc61ab5b23754e0b959082ea726d39079bb59f8acc725a7ce92837553aa2e6b4120f4bdcf13", 0x3d}], 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x2f0}, 0x804) 2.321586575s ago: executing program 1 (id=5575): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002064070000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0, r2}, 0x18) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000"], 0x48) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x7, 0xffffffffffffffff, 0x3) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r5}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="61104900000000009500000000000000"], &(0x7f0000000200)='GPL\x00'}, 0x80) (async, rerun: 32) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.current\x00', 0x0, 0x0) (rerun: 32) ioctl$TUNSETSNDBUF(r6, 0x400454d4, &(0x7f00000002c0)=0x147) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_procs(r7, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) (async) write$cgroup_pid(r8, &(0x7f0000000880), 0x12) (async, rerun: 32) r9 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) (rerun: 32) write$cgroup_subtree(r9, 0x0, 0x4) (async) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 2.320825665s ago: executing program 8 (id=5576): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a}, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x2}) (async) ioctl$TUNSETLINK(r6, 0x400454cd, 0x337) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x80}, {0x6}]}) 2.229117067s ago: executing program 1 (id=5577): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) 1.932198632s ago: executing program 5 (id=5578): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x2842, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000280), &(0x7f00000002c0)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000eaffffff00009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r2}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.914633973s ago: executing program 1 (id=5579): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000180000003d030100000000009500f000000000006926000000000000bf"], 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0xc8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r4, 0x0, &(0x7f0000001780)=""/4096}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000380)="a56a88caffff0000000040876f2f35", 0x0, 0x400000ff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)) (async) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d9301"], 0xfdef) 1.860886034s ago: executing program 8 (id=5580): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x40000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x2, 0x4, 0x4, 0x9}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xd, 0x9, 0x4, 0x1, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3}, &(0x7f0000000840), &(0x7f0000000880)=r2}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[], 0xfffffdef) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r6}, 0x18) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r7}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_bp={0x0, 0x1f}, 0x2010, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 1.860149744s ago: executing program 5 (id=5581): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c00)={{r2}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe8}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x2a, &(0x7f0000000100), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007bb1718af8ff00001200bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000003000000950000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000300)='f2fs_direct_IO_enter\x00'}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x104, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x5, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) 1.849063754s ago: executing program 3 (id=5582): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x20, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000040000009500000000000000000000000000000000000000950000000000000085100000fcffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r0, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e00000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ff, 0x21, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r3, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="2d63707520cff4f40300167eeb70331599c5223e7529f8e0bae5a26ad4300194808a04a1be5e4614"], 0x5) r6 = openat$cgroup_type(r2, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'veth1\x00', @random="b7bdae26ba68"}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) 1.724786207s ago: executing program 8 (id=5583): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xa0880, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00 \x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="f9ffff00"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 432.940962ms ago: executing program 9 (id=5584): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r1 = perf_event_open$cgroup(&(0x7f0000000500)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3fe, 0x486c79dd}, 0x41, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16, @ANYRES32, @ANYBLOB="0000000000000200"/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00'}, 0x10) (async) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) (async) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000ffff0000000000002700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014001d00b7030000100000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_generate\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffd) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x23) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000001c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x0, 0x0, 0xfffffffd, 0xd, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x2b, 0x2, 0x8000, &(0x7f00000002c0)) (async) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000004c0), 0x12) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a0300fef0ffffff79a4f0ff00000000b7060000ffffffff2e640500000000007502faff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000026000000b70000000001002995000000000000001da5ad3548ebb63d18db6a1c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6d5b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8c18119a6926083f4a2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa387a8077927a1ad367c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f20002b35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8c367d1bfd1aea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82dc568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000000000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac6f09c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccf5e882602897a85bf8523d891080593d831d758deb4f2c7e49c6d6b35d8fd92601c8500febb0c5fe0be294bf6bbbecad444695277a9e3992a354492513b43091d161c7c7cdbbe44e8e83b4cf333238a52f214b278c6485236ea880db2f113f6381187679a4620d6149808b0af024b3b3e6ba99b4b15ca"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x143}, 0x48) 432.500012ms ago: executing program 1 (id=5585): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000539d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x20008, [{0xe, 0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x3a}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x4004743d, 0x110e22fff6) close(r7) perf_event_open(&(0x7f00000008c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x404, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0xa) write$cgroup_type(r8, &(0x7f0000000280), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000800000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) 431.751912ms ago: executing program 9 (id=5586): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x180, 0x4, 0x28}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b703000000050000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x18) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 411.477202ms ago: executing program 3 (id=5587): perf_event_open(&(0x7f00000007c0)={0x4, 0x80, 0x61, 0x1, 0x80, 0x0, 0x0, 0x3, 0x30400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x1000000000}, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) 398.346072ms ago: executing program 5 (id=5588): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0], 0x0, 0xc5, &(0x7f0000000800)=[{}], 0x8, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0xc4, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r0, @ANYBLOB="0200"/20, @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="04000000040000000100"/26], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x20, 0x14, &(0x7f0000000b40)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xe}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) r4 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000340), 0x9) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x10) write$cgroup_pressure(r2, &(0x7f0000000b00)={'full', 0x20, 0x8, 0x20, 0x8}, 0x2f) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x43}]}}, 0x0, 0x26}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f00000006c0)={&(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000005c0)=[{&(0x7f00000022c0)="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", 0x7fe}, {&(0x7f0000000480)="98394755849309c480bfe4d40fdf45226dd7e2c5bc8d33c4c6544b7e033b9362065e0d967c99e7b40911fd8c2363ce70339f149b9536076be177b5605f3c30f4b483eaf594719aea8e9669235978c074000b221c10e9d7d87f3b95fc0592aeac9b62aff9161b528f7d976f542c03f40b3a0e499696b37dbab00c17a264d4587abe7c9922442d9c4a503676ef93c5492ad6aae064f97e62d77b36b6ef0ef942d6adb1765230c1b49b39b2bf0c890d3720958b05b44ea6bec04aa37a998aae00c798aeb617343cc59f5e91e0d1", 0xcc}, {&(0x7f0000000400)="b3d6559e56f50325c4611062a5c3cb8e790f756ecd08f649c9dd362b37d358d9903a1127b0ad0ffae3e4c85e22c8d9c129a5e6c1df138663a0aed9b245e81dce08e8b9210912b34361e1", 0x4a}, {&(0x7f0000000700)="d67154b3319046c876543a1821d18d5499df58e42924f4a7a3a13c275e5073130b8dd5b3b61f85ce6d920207894e3855eab7615de69ff1ef72930bd952cb20c3b519f9fec024", 0x46}, {&(0x7f0000000780)="fc9500b122857b2594df250bd9faed30f25d734d38d53f3065d30241e9421ea7557310d2e074f7f06cc4369ef00d2b646eb104f10884d0ceb9bffc114ae6bfceb042ad3c6d033b70fb86d8097beb4243338bb795ab6c25596ed9cac943a276e1c1729ddf3e1c1a4c021873bfec72def061", 0x71}, {&(0x7f00000032c0)="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", 0x1000}], 0x6}, 0x40) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 362.611693ms ago: executing program 3 (id=5589): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2010000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 147.702297ms ago: executing program 8 (id=5590): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x94, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xa, 0xf, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1838000005000000000000000000000018550000080000000000000000000000850000008700000018210000", @ANYRES32, @ANYBLOB="000000000900000001c20300000000006daa0001ffffffff18530000020001000000000000000000110000008d073a24f079e2c61531b577283bd4dbf707db71825b8a42cf0304ad628f3b552f41b65ebc4259c22883aa952a0abbd8992e5b2e6b9af7453c906396ff5358b3b8527738035c68aac0d33ef971524150bd57bf5699824c7266964492fe1a347178e0f5c275bd7a1b648baea0aba964ad39c57031aef40d7229f93a43ffbe4912268f62ef84be128fd066306996a19d205c84c9", @ANYRES32], &(0x7f0000000800)='GPL\x00', 0xffffff04, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0x0, 0x5, 0xff}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xd}, 0x0, 0xffffffff7fffffff, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x30120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8982, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x0, 0x0, &(0x7f0000001000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@ifindex, 0x2b, 0x0, 0x800000, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0]}, 0x40) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1, 0xc8, 0x0, 0x6, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x7, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000005"], 0x48) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00'}, 0x18) 140.529208ms ago: executing program 9 (id=5591): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", 0x0, 0x5, r0}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0x6, 0x104800}, 0x4dc6, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0xfffffffe, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffc000000002, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') 2.02986ms ago: executing program 3 (id=5592): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) write$cgroup_devices(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="63202a3a2a20776d00ed8f23d276df9a9f63309ca6a783fadfc7affbf1b692f93ffb2a03b31a42c21227213593313bbc090108280fd4d9ab09a72776683eef786d71076900709af05ddf7d51301ba3a3682246c28ac271fd2121c43b8c13a6c3da08b3764fd3500a7abaf24eded4a19d71b00c8c10cbbc156778224e6a87901b07caf2214b7351e417b067ebfc3cd3746a06fbd4d57559b3e0e37f4e52e0fd6fe6"], 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r5}, 0x10) socketpair(0x6, 0x23665e7c765f2ec6, 0x100, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@ifindex, 0x1, 0x1, 0x2c55, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={@map=r3, r0, 0x2b, 0xc, 0x0, @void, @value=r6, @void, @void, r7}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0xc, r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r6}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 0s ago: executing program 9 (id=5593): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 34) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) kernel console output (not intermixed with test programs): 524424][T12642] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.530291][T12642] RIP: 0033:0x7f484d7b3be9 [ 353.534693][T12642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.554276][T12642] RSP: 002b:00007f484c21c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 353.562663][T12642] RAX: ffffffffffffffda RBX: 00007f484d9eafa0 RCX: 00007f484d7b3be9 [ 353.570609][T12642] RDX: 000000000000000c RSI: 0000200000000180 RDI: 0000000000000023 [ 353.578580][T12642] RBP: 00007f484c21c090 R08: 0000000000000000 R09: 0000000000000000 [ 353.586630][T12642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.594613][T12642] R13: 00007f484d9eb038 R14: 00007f484d9eafa0 R15: 00007ffdc1349048 [ 353.602594][T12642] [ 353.637491][T12647] device sit0 left promiscuous mode [ 353.654863][T12647] device sit0 entered promiscuous mode [ 355.080630][T12704] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 355.105453][T12706] Â: renamed from pim6reg1 [ 355.486857][T12738] device pim6reg1 entered promiscuous mode [ 355.765196][T12757] device pim6reg1 entered promiscuous mode [ 356.177857][T12773] syz.5.3681[12773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.177953][T12773] syz.5.3681[12773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.310086][T12784] syz.5.3685[12784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.366458][T12784] syz.5.3685[12784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.730507][T12809] device syzkaller0 entered promiscuous mode [ 356.895561][T12813] device sit0 left promiscuous mode [ 356.958169][T12815] device sit0 entered promiscuous mode [ 357.033299][T12827] syz.5.3696[12827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.033366][T12827] syz.5.3696[12827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.240778][T12845] device pim6reg1 entered promiscuous mode [ 357.393255][T12853] device veth1_macvtap left promiscuous mode [ 357.650212][T12882] device sit0 left promiscuous mode [ 357.751025][T12886] device sit0 entered promiscuous mode [ 357.909334][T12894] device pim6reg1 entered promiscuous mode [ 362.444480][T12911] device sit0 left promiscuous mode [ 362.495216][T12919] FAULT_INJECTION: forcing a failure. [ 362.495216][T12919] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 362.516170][T12919] CPU: 1 PID: 12919 Comm: syz.1.3724 Not tainted syzkaller #0 [ 362.523657][T12919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 362.533722][T12919] Call Trace: [ 362.537011][T12919] [ 362.539946][T12919] __dump_stack+0x21/0x30 [ 362.544298][T12919] dump_stack_lvl+0xee/0x150 [ 362.548896][T12919] ? show_regs_print_info+0x20/0x20 [ 362.554102][T12919] ? vfs_write+0xc17/0xf70 [ 362.558523][T12919] dump_stack+0x15/0x20 [ 362.562688][T12919] should_fail+0x3c1/0x510 [ 362.567106][T12919] should_fail_usercopy+0x1a/0x20 [ 362.572107][T12919] _copy_from_user+0x20/0xd0 [ 362.576674][T12919] __sys_bpf+0x233/0x730 [ 362.580923][T12919] ? bpf_link_show_fdinfo+0x310/0x310 [ 362.586400][T12919] ? debug_smp_processor_id+0x17/0x20 [ 362.591808][T12919] __x64_sys_bpf+0x7c/0x90 [ 362.596243][T12919] x64_sys_call+0x4b9/0x9a0 [ 362.600759][T12919] do_syscall_64+0x4c/0xa0 [ 362.605205][T12919] ? clear_bhb_loop+0x50/0xa0 [ 362.609900][T12919] ? clear_bhb_loop+0x50/0xa0 [ 362.614694][T12919] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 362.620596][T12919] RIP: 0033:0x7f0f158aabe9 [ 362.625032][T12919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.644702][T12919] RSP: 002b:00007f0f14313038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 362.653215][T12919] RAX: ffffffffffffffda RBX: 00007f0f15ae1fa0 RCX: 00007f0f158aabe9 [ 362.661197][T12919] RDX: 0000000000000048 RSI: 0000200000000300 RDI: 0000000000000000 [ 362.669171][T12919] RBP: 00007f0f14313090 R08: 0000000000000000 R09: 0000000000000000 [ 362.677162][T12919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 362.685136][T12919] R13: 00007f0f15ae2038 R14: 00007f0f15ae1fa0 R15: 00007ffd71940bd8 [ 362.693116][T12919] [ 362.711845][T12920] device sit0 entered promiscuous mode [ 362.860867][T12931] device sit0 entered promiscuous mode [ 364.256363][T13000] syz.5.3747[13000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.256455][T13000] syz.5.3747[13000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.576261][T13088] device pim6reg1 entered promiscuous mode [ 366.267810][T13162] FAULT_INJECTION: forcing a failure. [ 366.267810][T13162] name failslab, interval 1, probability 0, space 0, times 0 [ 366.396269][T13162] CPU: 1 PID: 13162 Comm: syz.9.3785 Not tainted syzkaller #0 [ 366.403771][T13162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 366.413823][T13162] Call Trace: [ 366.417098][T13162] [ 366.420021][T13162] __dump_stack+0x21/0x30 [ 366.424352][T13162] dump_stack_lvl+0xee/0x150 [ 366.428967][T13162] ? show_regs_print_info+0x20/0x20 [ 366.434168][T13162] ? debug_smp_processor_id+0x17/0x20 [ 366.439532][T13162] ? get_random_u32+0x2ff/0x590 [ 366.444381][T13162] dump_stack+0x15/0x20 [ 366.448526][T13162] should_fail+0x3c1/0x510 [ 366.452939][T13162] __should_failslab+0xa4/0xe0 [ 366.457710][T13162] should_failslab+0x9/0x20 [ 366.462208][T13162] slab_pre_alloc_hook+0x3b/0xe0 [ 366.467135][T13162] __kmalloc+0x6d/0x2c0 [ 366.471282][T13162] ? bpf_map_area_alloc+0x49/0xe0 [ 366.476301][T13162] bpf_map_area_alloc+0x49/0xe0 [ 366.481147][T13162] htab_map_alloc+0xb29/0x14f0 [ 366.485909][T13162] map_create+0x455/0x21b0 [ 366.490316][T13162] __sys_bpf+0x2cf/0x730 [ 366.494548][T13162] ? bpf_link_show_fdinfo+0x310/0x310 [ 366.499922][T13162] ? debug_smp_processor_id+0x17/0x20 [ 366.505292][T13162] __x64_sys_bpf+0x7c/0x90 [ 366.509703][T13162] x64_sys_call+0x4b9/0x9a0 [ 366.514199][T13162] do_syscall_64+0x4c/0xa0 [ 366.518609][T13162] ? clear_bhb_loop+0x50/0xa0 [ 366.523282][T13162] ? clear_bhb_loop+0x50/0xa0 [ 366.527952][T13162] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 366.533844][T13162] RIP: 0033:0x7fa3e183bbe9 [ 366.538252][T13162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 366.557905][T13162] RSP: 002b:00007fa3e02a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 366.566315][T13162] RAX: ffffffffffffffda RBX: 00007fa3e1a72fa0 RCX: 00007fa3e183bbe9 [ 366.574286][T13162] RDX: 0000000000000048 RSI: 0000200000000300 RDI: 0000000000000000 [ 366.582247][T13162] RBP: 00007fa3e02a4090 R08: 0000000000000000 R09: 0000000000000000 [ 366.590210][T13162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 366.598169][T13162] R13: 00007fa3e1a73038 R14: 00007fa3e1a72fa0 R15: 00007fffea373978 [ 366.606141][T13162] [ 367.868202][T13218] FAULT_INJECTION: forcing a failure. [ 367.868202][T13218] name failslab, interval 1, probability 0, space 0, times 0 [ 367.940392][T13219] device syzkaller0 entered promiscuous mode [ 367.962787][T13218] CPU: 1 PID: 13218 Comm: syz.1.3804 Not tainted syzkaller #0 [ 367.970286][T13218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 367.980347][T13218] Call Trace: [ 367.983637][T13218] [ 367.986584][T13218] __dump_stack+0x21/0x30 [ 367.990932][T13218] dump_stack_lvl+0xee/0x150 [ 367.995551][T13218] ? show_regs_print_info+0x20/0x20 [ 368.000751][T13218] dump_stack+0x15/0x20 [ 368.004906][T13218] should_fail+0x3c1/0x510 [ 368.009322][T13218] __should_failslab+0xa4/0xe0 [ 368.014081][T13218] should_failslab+0x9/0x20 [ 368.018580][T13218] slab_pre_alloc_hook+0x3b/0xe0 [ 368.023515][T13218] kmem_cache_alloc_trace+0x48/0x270 [ 368.028803][T13218] ? selinux_bpf_map_alloc+0x51/0x140 [ 368.034178][T13218] selinux_bpf_map_alloc+0x51/0x140 [ 368.039369][T13218] security_bpf_map_alloc+0x62/0x90 [ 368.044568][T13218] map_create+0x149f/0x21b0 [ 368.049155][T13218] __sys_bpf+0x2cf/0x730 [ 368.053391][T13218] ? bpf_link_show_fdinfo+0x310/0x310 [ 368.058759][T13218] ? debug_smp_processor_id+0x17/0x20 [ 368.064128][T13218] __x64_sys_bpf+0x7c/0x90 [ 368.068537][T13218] x64_sys_call+0x4b9/0x9a0 [ 368.073034][T13218] do_syscall_64+0x4c/0xa0 [ 368.077456][T13218] ? clear_bhb_loop+0x50/0xa0 [ 368.082128][T13218] ? clear_bhb_loop+0x50/0xa0 [ 368.086798][T13218] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 368.092687][T13218] RIP: 0033:0x7f0f158aabe9 [ 368.097099][T13218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 368.116714][T13218] RSP: 002b:00007f0f14313038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 368.125136][T13218] RAX: ffffffffffffffda RBX: 00007f0f15ae1fa0 RCX: 00007f0f158aabe9 [ 368.133108][T13218] RDX: 0000000000000048 RSI: 0000200000000300 RDI: 0000000000000000 [ 368.141521][T13218] RBP: 00007f0f14313090 R08: 0000000000000000 R09: 0000000000000000 [ 368.149492][T13218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 368.157457][T13218] R13: 00007f0f15ae2038 R14: 00007f0f15ae1fa0 R15: 00007ffd71940bd8 [ 368.165428][T13218] [ 368.469267][T13235] device syzkaller0 entered promiscuous mode [ 368.728985][T13259] device sit0 left promiscuous mode [ 368.787562][T13270] device syzkaller0 entered promiscuous mode [ 368.797199][T13259] device sit0 entered promiscuous mode [ 369.371241][T13305] device syzkaller0 entered promiscuous mode [ 369.650750][T13318] device syzkaller0 entered promiscuous mode [ 370.346420][T13357] device veth1_macvtap left promiscuous mode [ 370.352779][T13357] device macsec0 entered promiscuous mode [ 370.436681][T13368] FAULT_INJECTION: forcing a failure. [ 370.436681][T13368] name failslab, interval 1, probability 0, space 0, times 0 [ 370.486146][T13368] CPU: 0 PID: 13368 Comm: syz.3.3851 Not tainted syzkaller #0 [ 370.493652][T13368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 370.503740][T13368] Call Trace: [ 370.507023][T13368] [ 370.509962][T13368] __dump_stack+0x21/0x30 [ 370.514387][T13368] dump_stack_lvl+0xee/0x150 [ 370.518983][T13368] ? show_regs_print_info+0x20/0x20 [ 370.524187][T13368] dump_stack+0x15/0x20 [ 370.528349][T13368] should_fail+0x3c1/0x510 [ 370.532777][T13368] __should_failslab+0xa4/0xe0 [ 370.537550][T13368] should_failslab+0x9/0x20 [ 370.542055][T13368] slab_pre_alloc_hook+0x3b/0xe0 [ 370.547002][T13368] ? __alloc_file+0x28/0x2a0 [ 370.551606][T13368] kmem_cache_alloc+0x44/0x260 [ 370.556399][T13368] __alloc_file+0x28/0x2a0 [ 370.560825][T13368] alloc_empty_file+0x97/0x180 [ 370.565586][T13368] alloc_file+0x59/0x540 [ 370.569825][T13368] alloc_file_pseudo+0x17a/0x1f0 [ 370.574757][T13368] ? alloc_empty_file_noaccount+0x80/0x80 [ 370.580473][T13368] __anon_inode_getfd+0x248/0x3b0 [ 370.585496][T13368] ? anon_inode_getfd+0x40/0x40 [ 370.590343][T13368] ? __kasan_check_write+0x14/0x20 [ 370.595447][T13368] ? selinux_bpf_map+0xd2/0x110 [ 370.600297][T13368] anon_inode_getfd+0x31/0x40 [ 370.604970][T13368] bpf_map_new_fd+0x5f/0x70 [ 370.609470][T13368] map_create+0x1590/0x21b0 [ 370.613967][T13368] __sys_bpf+0x2cf/0x730 [ 370.618201][T13368] ? bpf_link_show_fdinfo+0x310/0x310 [ 370.623572][T13368] ? debug_smp_processor_id+0x17/0x20 [ 370.628940][T13368] __x64_sys_bpf+0x7c/0x90 [ 370.633354][T13368] x64_sys_call+0x4b9/0x9a0 [ 370.637849][T13368] do_syscall_64+0x4c/0xa0 [ 370.642264][T13368] ? clear_bhb_loop+0x50/0xa0 [ 370.646931][T13368] ? clear_bhb_loop+0x50/0xa0 [ 370.651602][T13368] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.657486][T13368] RIP: 0033:0x7fb868059be9 [ 370.661901][T13368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.681515][T13368] RSP: 002b:00007fb866ac2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 370.689943][T13368] RAX: ffffffffffffffda RBX: 00007fb868290fa0 RCX: 00007fb868059be9 [ 370.697914][T13368] RDX: 0000000000000048 RSI: 0000200000000300 RDI: 0000000000000000 [ 370.706160][T13368] RBP: 00007fb866ac2090 R08: 0000000000000000 R09: 0000000000000000 [ 370.714142][T13368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.722119][T13368] R13: 00007fb868291038 R14: 00007fb868290fa0 R15: 00007fffee330568 [ 370.730099][T13368] [ 370.800244][T13378] device wg2 entered promiscuous mode [ 370.963499][T13402] device wg2 entered promiscuous mode [ 371.405093][T13435] device pim6reg1 entered promiscuous mode [ 371.482815][T13440] device pim6reg1 entered promiscuous mode [ 371.555447][T13445] device sit0 left promiscuous mode [ 371.593305][T13446] device sit0 entered promiscuous mode [ 372.245924][T13496] device syzkaller0 entered promiscuous mode [ 373.503288][T13520] ref_ctr_offset mismatch. inode: 0x1ef offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 373.815177][T13540] FAULT_INJECTION: forcing a failure. [ 373.815177][T13540] name failslab, interval 1, probability 0, space 0, times 0 [ 373.839225][T13540] CPU: 0 PID: 13540 Comm: syz.5.3907 Not tainted syzkaller #0 [ 373.846726][T13540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 373.856817][T13540] Call Trace: [ 373.860108][T13540] [ 373.863045][T13540] __dump_stack+0x21/0x30 [ 373.867511][T13540] dump_stack_lvl+0xee/0x150 [ 373.872201][T13540] ? show_regs_print_info+0x20/0x20 [ 373.877417][T13540] dump_stack+0x15/0x20 [ 373.881577][T13540] should_fail+0x3c1/0x510 [ 373.886014][T13540] __should_failslab+0xa4/0xe0 [ 373.890791][T13540] should_failslab+0x9/0x20 [ 373.895299][T13540] slab_pre_alloc_hook+0x3b/0xe0 [ 373.900247][T13540] ? security_file_alloc+0x33/0x120 [ 373.905456][T13540] kmem_cache_alloc+0x44/0x260 [ 373.910226][T13540] security_file_alloc+0x33/0x120 [ 373.915259][T13540] __alloc_file+0xb5/0x2a0 [ 373.919735][T13540] alloc_empty_file+0x97/0x180 [ 373.924503][T13540] alloc_file+0x59/0x540 [ 373.928753][T13540] alloc_file_pseudo+0x17a/0x1f0 [ 373.933699][T13540] ? alloc_empty_file_noaccount+0x80/0x80 [ 373.939430][T13540] __anon_inode_getfd+0x248/0x3b0 [ 373.944470][T13540] ? anon_inode_getfd+0x40/0x40 [ 373.949327][T13540] ? __kasan_check_write+0x14/0x20 [ 373.954448][T13540] ? selinux_bpf_map+0xd2/0x110 [ 373.959306][T13540] anon_inode_getfd+0x31/0x40 [ 373.963990][T13540] bpf_map_new_fd+0x5f/0x70 [ 373.968502][T13540] map_create+0x1590/0x21b0 [ 373.973016][T13540] __sys_bpf+0x2cf/0x730 [ 373.977264][T13540] ? bpf_link_show_fdinfo+0x310/0x310 [ 373.982677][T13540] ? debug_smp_processor_id+0x17/0x20 [ 373.988059][T13540] __x64_sys_bpf+0x7c/0x90 [ 373.992479][T13540] x64_sys_call+0x4b9/0x9a0 [ 373.996989][T13540] do_syscall_64+0x4c/0xa0 [ 374.001415][T13540] ? clear_bhb_loop+0x50/0xa0 [ 374.006099][T13540] ? clear_bhb_loop+0x50/0xa0 [ 374.010782][T13540] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 374.016682][T13540] RIP: 0033:0x7f484d7b3be9 [ 374.021098][T13540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 374.040691][T13540] RSP: 002b:00007f484c21c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 374.049098][T13540] RAX: ffffffffffffffda RBX: 00007f484d9eafa0 RCX: 00007f484d7b3be9 [ 374.057060][T13540] RDX: 0000000000000048 RSI: 0000200000000300 RDI: 0000000000000000 [ 374.065007][T13540] RBP: 00007f484c21c090 R08: 0000000000000000 R09: 0000000000000000 [ 374.072955][T13540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 374.080913][T13540] R13: 00007f484d9eb038 R14: 00007f484d9eafa0 R15: 00007ffdc1349048 [ 374.088873][T13540] [ 374.940723][T13594] FAULT_INJECTION: forcing a failure. [ 374.940723][T13594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 375.010255][T13594] CPU: 0 PID: 13594 Comm: syz.8.3922 Not tainted syzkaller #0 [ 375.017757][T13594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 375.027812][T13594] Call Trace: [ 375.031084][T13594] [ 375.034012][T13594] __dump_stack+0x21/0x30 [ 375.038345][T13594] dump_stack_lvl+0xee/0x150 [ 375.042926][T13594] ? show_regs_print_info+0x20/0x20 [ 375.048116][T13594] ? format_decode+0x1bb/0x1520 [ 375.052958][T13594] dump_stack+0x15/0x20 [ 375.057108][T13594] should_fail+0x3c1/0x510 [ 375.061518][T13594] should_fail_usercopy+0x1a/0x20 [ 375.066532][T13594] _copy_from_user+0x20/0xd0 [ 375.071117][T13594] kstrtouint_from_user+0xbe/0x200 [ 375.076218][T13594] ? kstrtol_from_user+0x260/0x260 [ 375.081406][T13594] ? 0xffffffff81000000 [ 375.085547][T13594] ? _copy_to_user+0x78/0x90 [ 375.090132][T13594] ? simple_read_from_buffer+0x10f/0x160 [ 375.095756][T13594] proc_fail_nth_write+0x85/0x1f0 [ 375.100776][T13594] ? proc_fail_nth_read+0x210/0x210 [ 375.105966][T13594] ? security_file_permission+0x79/0xa0 [ 375.111593][T13594] ? security_file_permission+0x83/0xa0 [ 375.117136][T13594] ? proc_fail_nth_read+0x210/0x210 [ 375.122326][T13594] vfs_write+0x3ee/0xf70 [ 375.126561][T13594] ? file_end_write+0x1b0/0x1b0 [ 375.131405][T13594] ? __kasan_check_write+0x14/0x20 [ 375.136516][T13594] ? mutex_lock+0x95/0x1a0 [ 375.140923][T13594] ? wait_for_completion_killable_timeout+0x10/0x10 [ 375.147504][T13594] ? __fget_files+0x2c4/0x320 [ 375.153055][T13594] ? __fdget_pos+0x2d2/0x380 [ 375.157657][T13594] ? ksys_write+0x71/0x240 [ 375.162072][T13594] ksys_write+0x140/0x240 [ 375.166404][T13594] ? __ia32_sys_read+0x90/0x90 [ 375.171177][T13594] ? debug_smp_processor_id+0x17/0x20 [ 375.176545][T13594] __x64_sys_write+0x7b/0x90 [ 375.181129][T13594] x64_sys_call+0x8ef/0x9a0 [ 375.185626][T13594] do_syscall_64+0x4c/0xa0 [ 375.190032][T13594] ? clear_bhb_loop+0x50/0xa0 [ 375.194705][T13594] ? clear_bhb_loop+0x50/0xa0 [ 375.199377][T13594] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 375.205267][T13594] RIP: 0033:0x7f823962269f [ 375.209679][T13594] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 375.229277][T13594] RSP: 002b:00007f823808c030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 375.237684][T13594] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f823962269f [ 375.245647][T13594] RDX: 0000000000000001 RSI: 00007f823808c0a0 RDI: 0000000000000003 [ 375.253629][T13594] RBP: 00007f823808c090 R08: 0000000000000000 R09: 0000000000000000 [ 375.261593][T13594] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 375.269557][T13594] R13: 00007f823985b038 R14: 00007f823985afa0 R15: 00007fffa12d9d78 [ 375.277532][T13594] [ 375.933658][T13656] device veth0_vlan left promiscuous mode [ 375.962997][T13656] device veth0_vlan entered promiscuous mode [ 376.013083][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.028283][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.061322][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 376.103344][T13662] -: renamed from syzkaller0 [ 377.640612][T13758] device sit0 left promiscuous mode [ 378.437843][T13799] device veth1_macvtap left promiscuous mode [ 379.771696][T13868] device syzkaller0 entered promiscuous mode [ 379.987744][T13887] device sit0 left promiscuous mode [ 380.053025][T13887] device sit0 entered promiscuous mode [ 381.353070][T13911] syz.3.4014[13911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.353138][T13911] syz.3.4014[13911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.051230][T13938] bond_slave_1: mtu less than device minimum [ 382.649108][T13971] syz.5.4035[13971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.649188][T13971] syz.5.4035[13971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.684243][T13971] device pim6reg1 entered promiscuous mode [ 383.267442][T13986] device syzkaller0 entered promiscuous mode [ 383.559061][T14027] device pim6reg1 entered promiscuous mode [ 383.588786][ T30] audit: type=1400 audit(1756995670.149:170): avc: denied { ioctl } for pid=14028 comm="syz.1.4055" path="" dev="cgroup2" ino=204 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 383.732094][T14033] device syzkaller0 entered promiscuous mode [ 384.584168][T14123] device syzkaller0 entered promiscuous mode [ 384.834968][T14140] device pim6reg1 entered promiscuous mode [ 384.979331][T14159] device sit0 left promiscuous mode [ 385.036176][T14159] device sit0 entered promiscuous mode [ 386.045981][T14223] cgroup: fork rejected by pids controller in /syz3 [ 386.109959][T14233] syz.9.4115[14233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.110030][T14233] syz.9.4115[14233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.663726][T14268] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.747677][T14268] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.755525][T14268] device bridge_slave_0 entered promiscuous mode [ 386.808320][T14268] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.829534][T14268] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.868498][T14268] device bridge_slave_1 entered promiscuous mode [ 387.187089][T14268] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.194183][T14268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.201508][T14268] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.208557][T14268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.244056][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.256257][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.345349][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 387.352958][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 387.681181][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 387.706422][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 387.714997][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.722077][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.781486][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 387.843584][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 387.881991][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.889098][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.937025][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 387.981404][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.021313][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 388.029618][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.169517][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 388.188979][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.258333][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 388.280732][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.318589][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.368965][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.399254][T14268] device veth0_vlan entered promiscuous mode [ 388.443707][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 388.477062][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 388.504012][T14268] device veth1_macvtap entered promiscuous mode [ 388.551046][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 388.566356][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 388.596390][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 388.605485][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 388.615240][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 388.849872][T14371] device syzkaller0 entered promiscuous mode [ 388.919275][T14375] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.926576][T14375] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.938695][T14376] device bridge_slave_1 left promiscuous mode [ 388.947952][T14376] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.955488][T14376] device bridge_slave_0 left promiscuous mode [ 388.962319][T14376] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.135187][T14384] syz.3.4156[14384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.135337][T14384] syz.3.4156[14384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.553156][T14405] device pim6reg1 entered promiscuous mode [ 389.753121][T14410] device syzkaller0 entered promiscuous mode [ 390.189453][T14420] device syzkaller0 entered promiscuous mode [ 391.686933][T14494] device pim6reg1 entered promiscuous mode [ 391.807925][T14501] device syzkaller0 entered promiscuous mode [ 392.127004][T14537] device sit0 left promiscuous mode [ 392.196970][T14537] device sit0 entered promiscuous mode [ 393.040766][T14590] device veth0_vlan left promiscuous mode [ 393.047709][T14590] device veth0_vlan entered promiscuous mode [ 393.054767][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.077372][T14586] syz.8.4217[14586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.077468][T14586] syz.8.4217[14586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.091442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.164040][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.218152][T14617] device pim6reg1 entered promiscuous mode [ 394.399818][T14691] device sit0 left promiscuous mode [ 394.567126][T14686] device sit0 entered promiscuous mode [ 395.074611][T14722] syz.3.4252[14722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.074683][T14722] syz.3.4252[14722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.532773][T14751] device pim6reg1 entered promiscuous mode [ 396.596116][T14790] syz.9.4272[14790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.596204][T14790] syz.9.4272[14790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.966708][T14810] device pim6reg1 entered promiscuous mode [ 397.641780][T14839] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 400.250107][T14943] device syzkaller0 entered promiscuous mode [ 400.264432][T14949] device pim6reg1 entered promiscuous mode [ 400.612765][T14977] device syzkaller0 entered promiscuous mode [ 402.542498][T15013] device syzkaller0 entered promiscuous mode [ 402.634175][T15011] device sit0 left promiscuous mode [ 403.803973][T15105] tap0: tun_chr_ioctl cmd 1074025677 [ 403.810103][T15105] tap0: linktype set to 774 [ 404.265607][T15142] device syzkaller0 entered promiscuous mode [ 404.537521][T15191] tap0: tun_chr_ioctl cmd 1074025680 [ 404.884100][T15204] device wg2 entered promiscuous mode [ 404.985190][T15211] device sit0 left promiscuous mode [ 405.029208][T15206] device sit0 entered promiscuous mode [ 408.706247][T15262] device syzkaller0 entered promiscuous mode [ 409.229883][T15300] device veth0_vlan left promiscuous mode [ 409.258360][T15300] device veth0_vlan entered promiscuous mode [ 409.265076][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.274090][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.281729][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 409.354402][T15311] syz.9.4418[15311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.354502][T15311] syz.9.4418[15311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.374508][T15311] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 409.762635][T15319] tap0: tun_chr_ioctl cmd 1074025677 [ 409.772646][T15319] tap0: linktype set to 774 [ 410.227851][T15347] bond_slave_1: mtu less than device minimum [ 410.917839][T15380] tap0: tun_chr_ioctl cmd 1074025677 [ 410.923225][T15380] tap0: linktype set to 774 [ 411.184115][T15394] syz.9.4443[15394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.184243][T15394] syz.9.4443[15394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.684644][T15420] device syzkaller0 entered promiscuous mode [ 411.852033][T15430] device syzkaller0 entered promiscuous mode [ 412.334133][T15462] device syzkaller0 entered promiscuous mode [ 412.410789][T15467] device syzkaller0 entered promiscuous mode [ 412.635409][T15470] device veth0_vlan left promiscuous mode [ 412.686926][T15470] device veth0_vlan entered promiscuous mode [ 412.744533][T15000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.754586][T15000] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.762108][T15000] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 413.514204][T15499] device syzkaller0 entered promiscuous mode [ 415.133829][T15545] device wg2 entered promiscuous mode [ 415.254622][T15547] device wg2 left promiscuous mode [ 416.722517][T15570] device syzkaller0 entered promiscuous mode [ 416.841833][T15581] device syzkaller0 entered promiscuous mode [ 416.905059][T15586] device pim6reg1 entered promiscuous mode [ 417.219143][T15607] syz.8.4506[15607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.219254][T15607] syz.8.4506[15607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.247847][T15607] syz.8.4506[15607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.279826][T15607] syz.8.4506[15607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.520107][T15627] device syzkaller0 entered promiscuous mode [ 418.546738][T15672] Â: renamed from pim6reg1 [ 418.884966][T15689] device syzkaller0 entered promiscuous mode [ 420.524530][T15776] device syzkaller0 entered promiscuous mode [ 420.579609][T15779] device syzkaller0 entered promiscuous mode [ 420.926737][T15817] device syzkaller0 entered promiscuous mode [ 421.513260][T15855] device syzkaller0 entered promiscuous mode [ 421.672299][T15874] device pim6reg1 entered promiscuous mode [ 422.278815][T15919] ref_ctr_offset mismatch. inode: 0x4c2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 422.294682][T15923] device syzkaller0 entered promiscuous mode [ 422.467346][T15929] device sit0 left promiscuous mode [ 422.541713][T15943] device sit0 entered promiscuous mode [ 423.067062][T15969] device syzkaller0 entered promiscuous mode [ 425.925455][T16073] syz.5.4640[16073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.925523][T16073] syz.5.4640[16073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.106244][T16073] device ip_vti0 entered promiscuous mode [ 426.571072][T16086] device syzkaller0 entered promiscuous mode [ 429.070825][T16123] ªªªªªª: renamed from vlan0 [ 429.509480][T16146] device macsec0 left promiscuous mode [ 429.990606][T16187] device GPL entered promiscuous mode [ 430.177936][T16195] device sit0 left promiscuous mode [ 430.239076][T16197] device sit0 entered promiscuous mode [ 431.230739][T16246] GPL: port 1(erspan0) entered blocking state [ 431.237039][T16246] GPL: port 1(erspan0) entered disabled state [ 431.244077][T16246] device erspan0 entered promiscuous mode [ 433.026335][T16282] syz.1.4704[16282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.026385][T16282] syz.1.4704[16282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.931149][T16308] FAULT_INJECTION: forcing a failure. [ 433.931149][T16308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 433.986121][T16308] CPU: 1 PID: 16308 Comm: syz.8.4711 Not tainted syzkaller #0 [ 433.993625][T16308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 434.003686][T16308] Call Trace: [ 434.006971][T16308] [ 434.009910][T16308] __dump_stack+0x21/0x30 [ 434.014250][T16308] dump_stack_lvl+0xee/0x150 [ 434.018844][T16308] ? show_regs_print_info+0x20/0x20 [ 434.024060][T16308] ? has_cap_mac_admin+0x330/0x330 [ 434.029176][T16308] dump_stack+0x15/0x20 [ 434.033339][T16308] should_fail+0x3c1/0x510 [ 434.037769][T16308] should_fail_usercopy+0x1a/0x20 [ 434.042796][T16308] _copy_from_user+0x20/0xd0 [ 434.047396][T16308] get_user_ifreq+0x6c/0x180 [ 434.051996][T16308] sock_ioctl+0x605/0x6b0 [ 434.056330][T16308] ? sock_poll+0x3d0/0x3d0 [ 434.060755][T16308] ? security_file_ioctl+0x84/0xa0 [ 434.065885][T16308] ? sock_poll+0x3d0/0x3d0 [ 434.070308][T16308] __se_sys_ioctl+0x121/0x1a0 [ 434.074994][T16308] __x64_sys_ioctl+0x7b/0x90 [ 434.079591][T16308] x64_sys_call+0x2f/0x9a0 [ 434.084011][T16308] do_syscall_64+0x4c/0xa0 [ 434.088449][T16308] ? clear_bhb_loop+0x50/0xa0 [ 434.093142][T16308] ? clear_bhb_loop+0x50/0xa0 [ 434.097847][T16308] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 434.103759][T16308] RIP: 0033:0x7f8239623be9 [ 434.108205][T16308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 434.127829][T16308] RSP: 002b:00007f823806b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 434.136265][T16308] RAX: ffffffffffffffda RBX: 00007f823985b090 RCX: 00007f8239623be9 [ 434.144250][T16308] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000009 [ 434.152218][T16308] RBP: 00007f823806b090 R08: 0000000000000000 R09: 0000000000000000 [ 434.160185][T16308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.168167][T16308] R13: 00007f823985b128 R14: 00007f823985b090 R15: 00007fffa12d9d78 [ 434.176145][T16308] [ 434.434147][T16325] device wg2 left promiscuous mode [ 434.454455][T16325] device wg2 entered promiscuous mode [ 434.732928][T16359] syz.3.4728[16359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.733012][T16359] syz.3.4728[16359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.960681][T16366] device veth1_macvtap left promiscuous mode [ 434.978264][T16366] device macsec0 entered promiscuous mode [ 435.282655][T16379] FAULT_INJECTION: forcing a failure. [ 435.282655][T16379] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.438861][T16379] CPU: 0 PID: 16379 Comm: syz.8.4734 Not tainted syzkaller #0 [ 435.446381][T16379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 435.456559][T16379] Call Trace: [ 435.459842][T16379] [ 435.462776][T16379] __dump_stack+0x21/0x30 [ 435.467226][T16379] dump_stack_lvl+0xee/0x150 [ 435.471835][T16379] ? show_regs_print_info+0x20/0x20 [ 435.477050][T16379] ? kasan_set_track+0x5b/0x70 [ 435.481838][T16379] ? kasan_set_free_info+0x23/0x40 [ 435.486966][T16379] ? ____kasan_slab_free+0x125/0x160 [ 435.492270][T16379] dump_stack+0x15/0x20 [ 435.496440][T16379] should_fail+0x3c1/0x510 [ 435.500876][T16379] should_fail_usercopy+0x1a/0x20 [ 435.505912][T16379] _copy_from_user+0x20/0xd0 [ 435.510504][T16379] ip_tunnel_siocdevprivate+0xa3/0x1c0 [ 435.515966][T16379] ? ip_tunnel_update+0xca0/0xca0 [ 435.520991][T16379] ? full_name_hash+0xa0/0xf0 [ 435.525664][T16379] dev_ifsioc+0xaf5/0xe70 [ 435.530079][T16379] ? dev_ioctl+0xd10/0xd10 [ 435.534490][T16379] ? __kasan_check_write+0x14/0x20 [ 435.539598][T16379] ? mutex_lock+0x95/0x1a0 [ 435.544009][T16379] ? wait_for_completion_killable_timeout+0x10/0x10 [ 435.550596][T16379] ? dev_get_by_name_rcu+0xc8/0xf0 [ 435.555707][T16379] dev_ioctl+0x5fd/0xd10 [ 435.559944][T16379] sock_ioctl+0x64a/0x6b0 [ 435.564271][T16379] ? sock_poll+0x3d0/0x3d0 [ 435.568684][T16379] ? security_file_ioctl+0x84/0xa0 [ 435.573789][T16379] ? sock_poll+0x3d0/0x3d0 [ 435.578203][T16379] __se_sys_ioctl+0x121/0x1a0 [ 435.582876][T16379] __x64_sys_ioctl+0x7b/0x90 [ 435.587459][T16379] x64_sys_call+0x2f/0x9a0 [ 435.591868][T16379] do_syscall_64+0x4c/0xa0 [ 435.596276][T16379] ? clear_bhb_loop+0x50/0xa0 [ 435.600947][T16379] ? clear_bhb_loop+0x50/0xa0 [ 435.605616][T16379] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 435.611502][T16379] RIP: 0033:0x7f8239623be9 [ 435.615912][T16379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 435.635516][T16379] RSP: 002b:00007f823806b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 435.643924][T16379] RAX: ffffffffffffffda RBX: 00007f823985b090 RCX: 00007f8239623be9 [ 435.651889][T16379] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000009 [ 435.659853][T16379] RBP: 00007f823806b090 R08: 0000000000000000 R09: 0000000000000000 [ 435.667817][T16379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.675782][T16379] R13: 00007f823985b128 R14: 00007f823985b090 R15: 00007fffa12d9d78 [ 435.683759][T16379] [ 435.708744][T16394] syz.9.4740[16394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.708835][T16394] syz.9.4740[16394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.796753][T16401] syz.9.4740[16401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.826316][T16401] syz.9.4740[16401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.861886][T16400] device syzkaller0 entered promiscuous mode [ 436.019227][T16410] device sit0 entered promiscuous mode [ 436.396224][T16437] device pim6reg1 entered promiscuous mode [ 436.408373][T16440] syz.9.4754[16440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.408454][T16440] syz.9.4754[16440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.905248][T16464] device syzkaller0 entered promiscuous mode [ 437.223329][T16466] device syzkaller0 entered promiscuous mode [ 437.369261][T16469] device wg2 left promiscuous mode [ 437.396995][T16479] device wg2 entered promiscuous mode [ 438.444886][T16556] device pim6reg1 entered promiscuous mode [ 438.571029][T16566] device veth1_macvtap left promiscuous mode [ 438.590872][T16566] device veth1_macvtap entered promiscuous mode [ 438.621304][T16566] device macsec0 entered promiscuous mode [ 438.627423][T16566] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 438.636752][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 439.070028][T16589] device syzkaller0 entered promiscuous mode [ 439.262434][T16593] device pim6reg1 entered promiscuous mode [ 439.656868][T16635] device wg2 left promiscuous mode [ 439.684521][T16635] device wg2 entered promiscuous mode [ 439.928374][T16657] device pim6reg1 entered promiscuous mode [ 440.072979][T16667] device wg2 left promiscuous mode [ 442.394520][T16727] device syzkaller0 entered promiscuous mode [ 442.749809][T16756] bpf_get_probe_write_proto: 2 callbacks suppressed [ 442.749825][T16756] syz.9.4843[16756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.758086][T16756] syz.9.4843[16756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.778305][T16756] syz.9.4843[16756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.794290][T16756] syz.9.4843[16756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.101965][T16781] device sit0 left promiscuous mode [ 443.190860][T16776] device sit0 entered promiscuous mode [ 443.360337][T16792] syz.8.4853[16792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.360418][T16792] syz.8.4853[16792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.399757][T16792] syz.8.4853[16792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.440429][T16792] syz.8.4853[16792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.459157][T16795] device pim6reg1 entered promiscuous mode [ 443.555756][T16803] device syzkaller0 entered promiscuous mode [ 443.808332][T16824] syz.3.4862[16824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.808420][T16824] syz.3.4862[16824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.921461][T16827] GPL: port 1(erspan0) entered blocking state [ 443.940330][T16827] GPL: port 1(erspan0) entered disabled state [ 443.951031][T16827] device erspan0 entered promiscuous mode [ 445.364556][T16902] device pim6reg1 entered promiscuous mode [ 445.454753][T16908] device sit0 entered promiscuous mode [ 445.902729][T16950] device pim6reg1 entered promiscuous mode [ 445.961598][T16954] device sit0 left promiscuous mode [ 445.989858][T16952] device veth0_vlan left promiscuous mode [ 445.997208][T16952] device veth0_vlan entered promiscuous mode [ 446.013956][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 446.022333][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 446.032407][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 446.041378][T16954] device sit0 entered promiscuous mode [ 446.188908][T16959] device veth1_macvtap left promiscuous mode [ 446.195666][T16959] device macsec0 left promiscuous mode [ 446.205082][T16962] device veth1_macvtap entered promiscuous mode [ 446.211969][T16962] device macsec0 entered promiscuous mode [ 446.218132][T16962] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 446.241041][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 448.383676][T16975] device syzkaller0 entered promiscuous mode [ 448.758409][T16993] device pim6reg1 entered promiscuous mode [ 448.855235][T17001] device pim6reg1 entered promiscuous mode [ 449.211622][T17010] device sit0 left promiscuous mode [ 449.375685][T17019] device sit0 entered promiscuous mode [ 449.866700][T17035] bpf_get_probe_write_proto: 20 callbacks suppressed [ 449.866720][T17035] syz.5.4927[17035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.879854][T17035] syz.5.4927[17035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.965560][T17038] syz.5.4927[17038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.036276][T17038] syz.5.4927[17038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.849718][T17066] device sit0 left promiscuous mode [ 451.483991][T17082] device pim6reg1 entered promiscuous mode [ 452.282413][T17106] device team_slave_1 entered promiscuous mode [ 452.299089][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 452.307922][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 452.408576][T17116] device veth0_vlan left promiscuous mode [ 452.429706][T17116] device veth0_vlan entered promiscuous mode [ 452.578281][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.595465][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.631475][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 453.383570][T17152] device sit0 entered promiscuous mode [ 453.424782][T17156] device pim6reg1 entered promiscuous mode [ 453.550925][T17164] syz.5.4966[17164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.551005][T17164] syz.5.4966[17164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.602175][T17168] syz.5.4966[17168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.635129][T17168] syz.5.4966[17168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 454.351574][T17209] syz.9.4978[17209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 454.401832][T17209] syz.9.4978[17209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.215840][T17250] bpf_get_probe_write_proto: 4 callbacks suppressed [ 455.215858][T17250] syz.3.4992[17250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.261808][T17250] syz.3.4992[17250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.298719][T17253] syz.3.4992[17253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.352230][T17253] syz.3.4992[17253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.448633][T17259] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.467389][T17259] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.616983][T17259] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.624092][T17259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.631420][T17259] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.638487][T17259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.675052][T17259] device bridge0 entered promiscuous mode [ 455.807218][T17270] device syzkaller0 entered promiscuous mode [ 456.551298][T17300] syz.1.5004[17300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.551373][T17300] syz.1.5004[17300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.676348][T17303] syz.1.5004[17303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.809608][T17303] syz.1.5004[17303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.934331][T17312] GPL: port 1(erspan0) entered blocking state [ 456.975454][T17312] GPL: port 1(erspan0) entered disabled state [ 457.003583][T17312] device erspan0 entered promiscuous mode [ 457.263592][T17327] syz.1.5013[17327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.263678][T17327] syz.1.5013[17327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.966256][T17345] device team_slave_1 entered promiscuous mode [ 457.990476][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 458.003068][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 460.512992][T17395] FAULT_INJECTION: forcing a failure. [ 460.512992][T17395] name failslab, interval 1, probability 0, space 0, times 0 [ 460.531525][T17395] CPU: 1 PID: 17395 Comm: syz.9.5032 Not tainted syzkaller #0 [ 460.539104][T17395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 460.549171][T17395] Call Trace: [ 460.552465][T17395] [ 460.555405][T17395] __dump_stack+0x21/0x30 [ 460.559752][T17395] dump_stack_lvl+0xee/0x150 [ 460.564368][T17395] ? show_regs_print_info+0x20/0x20 [ 460.569575][T17395] dump_stack+0x15/0x20 [ 460.573710][T17395] should_fail+0x3c1/0x510 [ 460.578116][T17395] __should_failslab+0xa4/0xe0 [ 460.582895][T17395] should_failslab+0x9/0x20 [ 460.587398][T17395] slab_pre_alloc_hook+0x3b/0xe0 [ 460.592311][T17395] __kmalloc+0x6d/0x2c0 [ 460.596446][T17395] ? security_prepare_creds+0x4e/0x140 [ 460.601920][T17395] security_prepare_creds+0x4e/0x140 [ 460.607222][T17395] prepare_creds+0x456/0x640 [ 460.611829][T17395] copy_creds+0xe4/0x640 [ 460.616091][T17395] copy_process+0x799/0x3210 [ 460.620693][T17395] ? kstrtol_from_user+0x260/0x260 [ 460.625821][T17395] ? __kasan_check_write+0x14/0x20 [ 460.630951][T17395] ? proc_fail_nth_write+0x17a/0x1f0 [ 460.636252][T17395] ? proc_fail_nth_read+0x210/0x210 [ 460.641464][T17395] ? __pidfd_prepare+0x150/0x150 [ 460.646415][T17395] ? security_file_permission+0x83/0xa0 [ 460.651979][T17395] kernel_clone+0x23f/0x940 [ 460.656499][T17395] ? create_io_thread+0x130/0x130 [ 460.661526][T17395] ? __kasan_check_write+0x14/0x20 [ 460.666637][T17395] ? mutex_unlock+0x89/0x220 [ 460.671230][T17395] __x64_sys_clone+0x176/0x1d0 [ 460.675996][T17395] ? __kasan_check_write+0x14/0x20 [ 460.681107][T17395] ? __ia32_sys_vfork+0xf0/0xf0 [ 460.685955][T17395] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 460.692043][T17395] x64_sys_call+0x41f/0x9a0 [ 460.696590][T17395] do_syscall_64+0x4c/0xa0 [ 460.701001][T17395] ? clear_bhb_loop+0x50/0xa0 [ 460.705676][T17395] ? clear_bhb_loop+0x50/0xa0 [ 460.710353][T17395] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 460.716244][T17395] RIP: 0033:0x7fa3e183bbe9 [ 460.720654][T17395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.740267][T17395] RSP: 002b:00007fa3e02a3fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 460.748675][T17395] RAX: ffffffffffffffda RBX: 00007fa3e1a72fa0 RCX: 00007fa3e183bbe9 [ 460.756641][T17395] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 460.764605][T17395] RBP: 00007fa3e02a4090 R08: 0000000000000000 R09: 0000000000000000 [ 460.772656][T17395] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 460.780630][T17395] R13: 00007fa3e1a73038 R14: 00007fa3e1a72fa0 R15: 00007fffea373978 [ 460.788603][T17395] [ 460.907684][T17409] bpf_get_probe_write_proto: 6 callbacks suppressed [ 460.907701][T17409] syz.1.5037[17409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.918349][T17409] syz.1.5037[17409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.989776][T17414] syz.1.5037[17414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.102318][T17414] syz.1.5037[17414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.558008][T17448] FAULT_INJECTION: forcing a failure. [ 462.558008][T17448] name failslab, interval 1, probability 0, space 0, times 0 [ 462.606102][T17448] CPU: 1 PID: 17448 Comm: syz.1.5048 Not tainted syzkaller #0 [ 462.613612][T17448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 462.623649][T17448] Call Trace: [ 462.626909][T17448] [ 462.629819][T17448] __dump_stack+0x21/0x30 [ 462.634128][T17448] dump_stack_lvl+0xee/0x150 [ 462.638692][T17448] ? show_regs_print_info+0x20/0x20 [ 462.643952][T17448] dump_stack+0x15/0x20 [ 462.648090][T17448] should_fail+0x3c1/0x510 [ 462.652483][T17448] __should_failslab+0xa4/0xe0 [ 462.657222][T17448] should_failslab+0x9/0x20 [ 462.661700][T17448] slab_pre_alloc_hook+0x3b/0xe0 [ 462.666613][T17448] ? alloc_vmap_area+0x63a/0x1990 [ 462.671612][T17448] kmem_cache_alloc+0x44/0x260 [ 462.676350][T17448] alloc_vmap_area+0x63a/0x1990 [ 462.681209][T17448] ? vm_map_ram+0xa60/0xa60 [ 462.685694][T17448] ? kmem_cache_alloc_trace+0x119/0x270 [ 462.691233][T17448] __get_vm_area_node+0x14e/0x350 [ 462.696276][T17448] __vmalloc_node_range+0xdf/0xaf0 [ 462.701431][T17448] ? copy_process+0x5a9/0x3210 [ 462.706210][T17448] ? slab_post_alloc_hook+0x6d/0x2b0 [ 462.711517][T17448] ? kmem_cache_alloc+0xf7/0x260 [ 462.716482][T17448] dup_task_struct+0x3f2/0xc10 [ 462.721261][T17448] ? copy_process+0x5a9/0x3210 [ 462.726025][T17448] ? recalc_sigpending+0x1ac/0x230 [ 462.731137][T17448] copy_process+0x5a9/0x3210 [ 462.735724][T17448] ? kstrtol_from_user+0x260/0x260 [ 462.740836][T17448] ? __kasan_check_write+0x14/0x20 [ 462.745946][T17448] ? proc_fail_nth_write+0x17a/0x1f0 [ 462.751234][T17448] ? proc_fail_nth_read+0x210/0x210 [ 462.756451][T17448] ? __pidfd_prepare+0x150/0x150 [ 462.761422][T17448] ? security_file_permission+0x83/0xa0 [ 462.766976][T17448] kernel_clone+0x23f/0x940 [ 462.771489][T17448] ? create_io_thread+0x130/0x130 [ 462.776555][T17448] ? __kasan_check_write+0x14/0x20 [ 462.781669][T17448] ? mutex_unlock+0x89/0x220 [ 462.786264][T17448] __x64_sys_clone+0x176/0x1d0 [ 462.791025][T17448] ? __kasan_check_write+0x14/0x20 [ 462.796132][T17448] ? __ia32_sys_vfork+0xf0/0xf0 [ 462.801014][T17448] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 462.807079][T17448] x64_sys_call+0x41f/0x9a0 [ 462.811583][T17448] do_syscall_64+0x4c/0xa0 [ 462.815995][T17448] ? clear_bhb_loop+0x50/0xa0 [ 462.820675][T17448] ? clear_bhb_loop+0x50/0xa0 [ 462.825355][T17448] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 462.831240][T17448] RIP: 0033:0x7f0f158aabe9 [ 462.835652][T17448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 462.855254][T17448] RSP: 002b:00007f0f142f1fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 462.863665][T17448] RAX: ffffffffffffffda RBX: 00007f0f15ae2090 RCX: 00007f0f158aabe9 [ 462.871632][T17448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 462.879595][T17448] RBP: 00007f0f142f2090 R08: 0000000000000000 R09: 0000000000000000 [ 462.887559][T17448] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 462.895530][T17448] R13: 00007f0f15ae2128 R14: 00007f0f15ae2090 R15: 00007ffd71940bd8 [ 462.903513][T17448] [ 463.439434][T17477] syz.8.5050[17477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.439493][T17477] syz.8.5050[17477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.527111][T17478] device wg2 left promiscuous mode [ 463.545221][T17482] syz.8.5050[17482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.545296][T17482] syz.8.5050[17482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.787615][T17492] FAULT_INJECTION: forcing a failure. [ 463.787615][T17492] name failslab, interval 1, probability 0, space 0, times 0 [ 463.970980][T17492] CPU: 1 PID: 17492 Comm: syz.3.5062 Not tainted syzkaller #0 [ 463.978494][T17492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 463.988555][T17492] Call Trace: [ 463.991838][T17492] [ 463.994770][T17492] __dump_stack+0x21/0x30 [ 463.999196][T17492] dump_stack_lvl+0xee/0x150 [ 464.003790][T17492] ? show_regs_print_info+0x20/0x20 [ 464.008996][T17492] dump_stack+0x15/0x20 [ 464.013161][T17492] should_fail+0x3c1/0x510 [ 464.017596][T17492] __should_failslab+0xa4/0xe0 [ 464.022370][T17492] should_failslab+0x9/0x20 [ 464.026873][T17492] slab_pre_alloc_hook+0x3b/0xe0 [ 464.031822][T17492] kmem_cache_alloc_trace+0x48/0x270 [ 464.037128][T17492] ? alloc_fdtable+0xb4/0x2b0 [ 464.041819][T17492] alloc_fdtable+0xb4/0x2b0 [ 464.046343][T17492] ? _find_last_bit+0x7c/0x120 [ 464.051147][T17492] dup_fd+0x870/0xb20 [ 464.055148][T17492] copy_files+0x76/0xe0 [ 464.059314][T17492] copy_process+0x10ac/0x3210 [ 464.064006][T17492] ? kstrtol_from_user+0x260/0x260 [ 464.069140][T17492] ? __kasan_check_write+0x14/0x20 [ 464.074263][T17492] ? __pidfd_prepare+0x150/0x150 [ 464.079204][T17492] ? security_file_permission+0x83/0xa0 [ 464.084757][T17492] kernel_clone+0x23f/0x940 [ 464.089278][T17492] ? create_io_thread+0x130/0x130 [ 464.094411][T17492] ? __kasan_check_write+0x14/0x20 [ 464.099528][T17492] ? mutex_unlock+0x89/0x220 [ 464.104129][T17492] __x64_sys_clone+0x176/0x1d0 [ 464.108911][T17492] ? __kasan_check_write+0x14/0x20 [ 464.114046][T17492] ? __ia32_sys_vfork+0xf0/0xf0 [ 464.118917][T17492] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 464.124997][T17492] x64_sys_call+0x41f/0x9a0 [ 464.129520][T17492] do_syscall_64+0x4c/0xa0 [ 464.133956][T17492] ? clear_bhb_loop+0x50/0xa0 [ 464.138665][T17492] ? clear_bhb_loop+0x50/0xa0 [ 464.143377][T17492] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 464.149286][T17492] RIP: 0033:0x7fcbf847dbe9 [ 464.153720][T17492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 464.173561][T17492] RSP: 002b:00007fcbf6ee5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 464.181998][T17492] RAX: ffffffffffffffda RBX: 00007fcbf86b4fa0 RCX: 00007fcbf847dbe9 [ 464.189986][T17492] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 464.197974][T17492] RBP: 00007fcbf6ee6090 R08: 0000000000000000 R09: 0000000000000000 [ 464.205958][T17492] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 464.213950][T17492] R13: 00007fcbf86b5038 R14: 00007fcbf86b4fa0 R15: 00007fff77ff2668 [ 464.221942][T17492] [ 464.388967][T17507] device syzkaller0 entered promiscuous mode [ 464.570831][T17518] syz.8.5071[17518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.570934][T17518] syz.8.5071[17518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.871786][ T30] audit: type=1400 audit(1756995751.439:171): avc: denied { create } for pid=17541 comm="syz.3.5079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 464.946938][T17545] device syzkaller0 entered promiscuous mode [ 465.081943][T17559] FAULT_INJECTION: forcing a failure. [ 465.081943][T17559] name failslab, interval 1, probability 0, space 0, times 0 [ 465.116103][T17559] CPU: 0 PID: 17559 Comm: syz.9.5086 Not tainted syzkaller #0 [ 465.123596][T17559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 465.133667][T17559] Call Trace: [ 465.136966][T17559] [ 465.139899][T17559] __dump_stack+0x21/0x30 [ 465.144229][T17559] dump_stack_lvl+0xee/0x150 [ 465.148821][T17559] ? show_regs_print_info+0x20/0x20 [ 465.154014][T17559] ? __kasan_kmalloc+0xec/0x110 [ 465.158858][T17559] ? kmem_cache_alloc_trace+0x119/0x270 [ 465.164398][T17559] ? alloc_fdtable+0xb4/0x2b0 [ 465.169068][T17559] ? dup_fd+0x870/0xb20 [ 465.173219][T17559] ? copy_process+0x10ac/0x3210 [ 465.178168][T17559] ? kernel_clone+0x23f/0x940 [ 465.183100][T17559] ? __x64_sys_clone+0x176/0x1d0 [ 465.188034][T17559] ? x64_sys_call+0x41f/0x9a0 [ 465.192709][T17559] dump_stack+0x15/0x20 [ 465.196989][T17559] should_fail+0x3c1/0x510 [ 465.201450][T17559] __should_failslab+0xa4/0xe0 [ 465.206218][T17559] should_failslab+0x9/0x20 [ 465.210724][T17559] slab_pre_alloc_hook+0x3b/0xe0 [ 465.215675][T17559] __kmalloc+0x6d/0x2c0 [ 465.219827][T17559] ? kvmalloc_node+0x206/0x300 [ 465.224598][T17559] kvmalloc_node+0x206/0x300 [ 465.229187][T17559] ? vm_mmap+0xb0/0xb0 [ 465.233257][T17559] ? kmem_cache_alloc_trace+0x119/0x270 [ 465.238794][T17559] ? alloc_fdtable+0xb4/0x2b0 [ 465.243465][T17559] alloc_fdtable+0xf2/0x2b0 [ 465.247960][T17559] ? _find_last_bit+0x7c/0x120 [ 465.252721][T17559] dup_fd+0x870/0xb20 [ 465.256707][T17559] copy_files+0x76/0xe0 [ 465.260873][T17559] copy_process+0x10ac/0x3210 [ 465.265632][T17559] ? kstrtol_from_user+0x260/0x260 [ 465.270748][T17559] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 465.276574][T17559] ? __pidfd_prepare+0x150/0x150 [ 465.281511][T17559] ? kernel_clone+0x120/0x940 [ 465.286180][T17559] ? memset_erms+0xb/0x10 [ 465.290511][T17559] kernel_clone+0x23f/0x940 [ 465.295013][T17559] ? create_io_thread+0x130/0x130 [ 465.300037][T17559] ? __kasan_check_write+0x14/0x20 [ 465.305140][T17559] ? mutex_unlock+0x89/0x220 [ 465.309728][T17559] __x64_sys_clone+0x176/0x1d0 [ 465.314494][T17559] ? __kasan_check_write+0x14/0x20 [ 465.319689][T17559] ? __ia32_sys_vfork+0xf0/0xf0 [ 465.324543][T17559] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 465.330608][T17559] x64_sys_call+0x41f/0x9a0 [ 465.335103][T17559] do_syscall_64+0x4c/0xa0 [ 465.339512][T17559] ? clear_bhb_loop+0x50/0xa0 [ 465.344190][T17559] ? clear_bhb_loop+0x50/0xa0 [ 465.348860][T17559] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 465.354755][T17559] RIP: 0033:0x7fa3e183bbe9 [ 465.359165][T17559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.378764][T17559] RSP: 002b:00007fa3e02a3fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 465.387175][T17559] RAX: ffffffffffffffda RBX: 00007fa3e1a72fa0 RCX: 00007fa3e183bbe9 [ 465.395146][T17559] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 465.403110][T17559] RBP: 00007fa3e02a4090 R08: 0000000000000000 R09: 0000000000000000 [ 465.411084][T17559] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 465.419047][T17559] R13: 00007fa3e1a73038 R14: 00007fa3e1a72fa0 R15: 00007fffea373978 [ 465.427019][T17559] [ 465.725979][T17581] device syzkaller0 entered promiscuous mode [ 466.261795][T17607] device pim6reg1 entered promiscuous mode [ 466.534810][T17611] device syzkaller0 entered promiscuous mode [ 466.583925][T17613] device wg2 left promiscuous mode [ 466.617414][T17613] device wg2 entered promiscuous mode [ 466.710541][T17625] device syzkaller0 entered promiscuous mode [ 466.907951][T17632] device sit0 entered promiscuous mode [ 467.067635][T17642] FAULT_INJECTION: forcing a failure. [ 467.067635][T17642] name failslab, interval 1, probability 0, space 0, times 0 [ 467.156325][T17642] CPU: 0 PID: 17642 Comm: syz.5.5114 Not tainted syzkaller #0 [ 467.163836][T17642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 467.173906][T17642] Call Trace: [ 467.177195][T17642] [ 467.180134][T17642] __dump_stack+0x21/0x30 [ 467.184487][T17642] dump_stack_lvl+0xee/0x150 [ 467.189091][T17642] ? show_regs_print_info+0x20/0x20 [ 467.194297][T17642] ? kvmalloc_node+0x231/0x300 [ 467.199075][T17642] ? vm_mmap+0xb0/0xb0 [ 467.203149][T17642] dump_stack+0x15/0x20 [ 467.207309][T17642] should_fail+0x3c1/0x510 [ 467.211741][T17642] __should_failslab+0xa4/0xe0 [ 467.216518][T17642] should_failslab+0x9/0x20 [ 467.221041][T17642] slab_pre_alloc_hook+0x3b/0xe0 [ 467.225993][T17642] ? copy_fs_struct+0x4c/0x220 [ 467.230762][T17642] kmem_cache_alloc+0x44/0x260 [ 467.235541][T17642] copy_fs_struct+0x4c/0x220 [ 467.240150][T17642] copy_fs+0x6f/0x140 [ 467.244139][T17642] copy_process+0x10d8/0x3210 [ 467.248827][T17642] ? __kasan_check_write+0x14/0x20 [ 467.253947][T17642] ? __pidfd_prepare+0x150/0x150 [ 467.258887][T17642] ? security_file_permission+0x83/0xa0 [ 467.264443][T17642] kernel_clone+0x23f/0x940 [ 467.268960][T17642] ? create_io_thread+0x130/0x130 [ 467.273988][T17642] ? __kasan_check_write+0x14/0x20 [ 467.279100][T17642] ? mutex_unlock+0x89/0x220 [ 467.283698][T17642] __x64_sys_clone+0x176/0x1d0 [ 467.288468][T17642] ? __kasan_check_write+0x14/0x20 [ 467.293580][T17642] ? __ia32_sys_vfork+0xf0/0xf0 [ 467.298447][T17642] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 467.304519][T17642] x64_sys_call+0x41f/0x9a0 [ 467.309033][T17642] do_syscall_64+0x4c/0xa0 [ 467.313459][T17642] ? clear_bhb_loop+0x50/0xa0 [ 467.318164][T17642] ? clear_bhb_loop+0x50/0xa0 [ 467.322856][T17642] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 467.328763][T17642] RIP: 0033:0x7f484d7b3be9 [ 467.333179][T17642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 467.352792][T17642] RSP: 002b:00007f484c21bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 467.361218][T17642] RAX: ffffffffffffffda RBX: 00007f484d9eafa0 RCX: 00007f484d7b3be9 [ 467.369197][T17642] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 467.377261][T17642] RBP: 00007f484c21c090 R08: 0000000000000000 R09: 0000000000000000 [ 467.385241][T17642] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 467.393247][T17642] R13: 00007f484d9eb038 R14: 00007f484d9eafa0 R15: 00007ffdc1349048 [ 467.401234][T17642] [ 467.783903][T17664] syz.3.5121[17664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.783981][T17664] syz.3.5121[17664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.897602][T17668] device syzkaller0 entered promiscuous mode [ 468.070367][T17685] FAULT_INJECTION: forcing a failure. [ 468.070367][T17685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 468.146394][T17685] CPU: 0 PID: 17685 Comm: syz.1.5128 Not tainted syzkaller #0 [ 468.153894][T17685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 468.163958][T17685] Call Trace: [ 468.167242][T17685] [ 468.170185][T17685] __dump_stack+0x21/0x30 [ 468.174530][T17685] dump_stack_lvl+0xee/0x150 [ 468.179129][T17685] ? show_regs_print_info+0x20/0x20 [ 468.184341][T17685] dump_stack+0x15/0x20 [ 468.188510][T17685] should_fail+0x3c1/0x510 [ 468.192936][T17685] should_fail_alloc_page+0x55/0x80 [ 468.198191][T17685] prepare_alloc_pages+0x156/0x600 [ 468.203322][T17685] ? __alloc_pages_bulk+0xab0/0xab0 [ 468.208535][T17685] ? __alloc_pages_bulk+0x47f/0xab0 [ 468.214014][T17685] __alloc_pages+0x10a/0x440 [ 468.218638][T17685] ? prep_new_page+0x110/0x110 [ 468.223421][T17685] ? __kmalloc+0x13d/0x2c0 [ 468.227856][T17685] ? __vmalloc_node_range+0x375/0xaf0 [ 468.233241][T17685] __vmalloc_node_range+0x505/0xaf0 [ 468.238450][T17685] dup_task_struct+0x3f2/0xc10 [ 468.243221][T17685] ? copy_process+0x5a9/0x3210 [ 468.248089][T17685] ? recalc_sigpending+0x1ac/0x230 [ 468.253206][T17685] copy_process+0x5a9/0x3210 [ 468.257813][T17685] ? kstrtol_from_user+0x260/0x260 [ 468.262947][T17685] ? __kasan_check_write+0x14/0x20 [ 468.268071][T17685] ? proc_fail_nth_write+0x17a/0x1f0 [ 468.273374][T17685] ? proc_fail_nth_read+0x210/0x210 [ 468.278599][T17685] ? __pidfd_prepare+0x150/0x150 [ 468.283557][T17685] ? security_file_permission+0x83/0xa0 [ 468.289125][T17685] kernel_clone+0x23f/0x940 [ 468.293671][T17685] ? create_io_thread+0x130/0x130 [ 468.298705][T17685] ? __kasan_check_write+0x14/0x20 [ 468.303854][T17685] ? mutex_unlock+0x89/0x220 [ 468.308452][T17685] __x64_sys_clone+0x176/0x1d0 [ 468.313221][T17685] ? __kasan_check_write+0x14/0x20 [ 468.318336][T17685] ? __ia32_sys_vfork+0xf0/0xf0 [ 468.323201][T17685] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 468.329276][T17685] x64_sys_call+0x41f/0x9a0 [ 468.333783][T17685] do_syscall_64+0x4c/0xa0 [ 468.338208][T17685] ? clear_bhb_loop+0x50/0xa0 [ 468.342894][T17685] ? clear_bhb_loop+0x50/0xa0 [ 468.347572][T17685] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 468.353474][T17685] RIP: 0033:0x7f0f158aabe9 [ 468.357897][T17685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 468.377514][T17685] RSP: 002b:00007f0f14312fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 468.385941][T17685] RAX: ffffffffffffffda RBX: 00007f0f15ae1fa0 RCX: 00007f0f158aabe9 [ 468.393916][T17685] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 468.401897][T17685] RBP: 00007f0f14313090 R08: 0000000000000000 R09: 0000000000000000 [ 468.409869][T17685] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 468.417832][T17685] R13: 00007f0f15ae2038 R14: 00007f0f15ae1fa0 R15: 00007ffd71940bd8 [ 468.425795][T17685] [ 468.714581][T17720] syz.8.5133[17720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.714657][T17720] syz.8.5133[17720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.753708][T17714] device syzkaller0 entered promiscuous mode [ 468.923961][T17733] FAULT_INJECTION: forcing a failure. [ 468.923961][T17733] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 468.967271][T17733] CPU: 1 PID: 17733 Comm: syz.8.5142 Not tainted syzkaller #0 [ 468.974894][T17733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 468.984956][T17733] Call Trace: [ 468.988236][T17733] [ 468.991165][T17733] __dump_stack+0x21/0x30 [ 468.995500][T17733] dump_stack_lvl+0xee/0x150 [ 469.000094][T17733] ? show_regs_print_info+0x20/0x20 [ 469.005299][T17733] dump_stack+0x15/0x20 [ 469.009450][T17733] should_fail+0x3c1/0x510 [ 469.013861][T17733] should_fail_alloc_page+0x55/0x80 [ 469.019056][T17733] prepare_alloc_pages+0x156/0x600 [ 469.024163][T17733] ? __alloc_pages_bulk+0xab0/0xab0 [ 469.029352][T17733] ? __alloc_pages_bulk+0x47f/0xab0 [ 469.034557][T17733] __alloc_pages+0x10a/0x440 [ 469.039143][T17733] ? prep_new_page+0x110/0x110 [ 469.043905][T17733] ? __kmalloc+0x13d/0x2c0 [ 469.048312][T17733] ? __vmalloc_node_range+0x375/0xaf0 [ 469.053678][T17733] __vmalloc_node_range+0x505/0xaf0 [ 469.058872][T17733] dup_task_struct+0x3f2/0xc10 [ 469.063627][T17733] ? copy_process+0x5a9/0x3210 [ 469.068386][T17733] ? recalc_sigpending+0x1ac/0x230 [ 469.073617][T17733] copy_process+0x5a9/0x3210 [ 469.078872][T17733] ? kstrtol_from_user+0x260/0x260 [ 469.083979][T17733] ? __kasan_check_write+0x14/0x20 [ 469.089084][T17733] ? proc_fail_nth_write+0x17a/0x1f0 [ 469.094362][T17733] ? proc_fail_nth_read+0x210/0x210 [ 469.099573][T17733] ? __pidfd_prepare+0x150/0x150 [ 469.104503][T17733] ? security_file_permission+0x83/0xa0 [ 469.110061][T17733] kernel_clone+0x23f/0x940 [ 469.114573][T17733] ? create_io_thread+0x130/0x130 [ 469.119592][T17733] ? __kasan_check_write+0x14/0x20 [ 469.124706][T17733] ? mutex_unlock+0x89/0x220 [ 469.129289][T17733] __x64_sys_clone+0x176/0x1d0 [ 469.134048][T17733] ? __kasan_check_write+0x14/0x20 [ 469.139150][T17733] ? __ia32_sys_vfork+0xf0/0xf0 [ 469.143996][T17733] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 469.150063][T17733] x64_sys_call+0x41f/0x9a0 [ 469.154650][T17733] do_syscall_64+0x4c/0xa0 [ 469.159064][T17733] ? clear_bhb_loop+0x50/0xa0 [ 469.163742][T17733] ? clear_bhb_loop+0x50/0xa0 [ 469.168559][T17733] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 469.174467][T17733] RIP: 0033:0x7f8239623be9 [ 469.178877][T17733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 469.198482][T17733] RSP: 002b:00007f823808bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 469.207079][T17733] RAX: ffffffffffffffda RBX: 00007f823985afa0 RCX: 00007f8239623be9 [ 469.215044][T17733] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 469.223011][T17733] RBP: 00007f823808c090 R08: 0000000000000000 R09: 0000000000000000 [ 469.230975][T17733] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 469.238941][T17733] R13: 00007f823985b038 R14: 00007f823985afa0 R15: 00007fffa12d9d78 [ 469.246997][T17733] [ 469.609507][T17761] syz.3.5152[17761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.609583][T17761] syz.3.5152[17761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.009580][T17767] device syzkaller0 entered promiscuous mode [ 470.169109][T17780] bond_slave_1: mtu less than device minimum [ 470.398519][T17791] device pim6reg1 entered promiscuous mode [ 470.668507][T17815] device sit0 left promiscuous mode [ 470.703552][T17815] device sit0 entered promiscuous mode [ 470.829195][T17820] device syzkaller0 entered promiscuous mode [ 471.360154][T17841] syz.1.5176[17841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.360242][T17841] syz.1.5176[17841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.526147][T17844] device sit0 left promiscuous mode [ 471.695984][T17857] syz.8.5181[17857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.696104][T17857] syz.8.5181[17857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.710128][T17859] device syzkaller0 entered promiscuous mode [ 471.753204][T17853] device pim6reg1 entered promiscuous mode [ 471.918089][T17886] FAULT_INJECTION: forcing a failure. [ 471.918089][T17886] name failslab, interval 1, probability 0, space 0, times 0 [ 471.944139][T17886] CPU: 1 PID: 17886 Comm: syz.1.5190 Not tainted syzkaller #0 [ 471.951645][T17886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 471.961715][T17886] Call Trace: [ 471.964999][T17886] [ 471.967940][T17886] __dump_stack+0x21/0x30 [ 471.972283][T17886] dump_stack_lvl+0xee/0x150 [ 471.976890][T17886] ? show_regs_print_info+0x20/0x20 [ 471.982102][T17886] dump_stack+0x15/0x20 [ 471.986266][T17886] should_fail+0x3c1/0x510 [ 471.990688][T17886] __should_failslab+0xa4/0xe0 [ 471.995468][T17886] should_failslab+0x9/0x20 [ 471.999990][T17886] slab_pre_alloc_hook+0x3b/0xe0 [ 472.004936][T17886] kmem_cache_alloc_trace+0x48/0x270 [ 472.010229][T17886] ? mm_init+0x36b/0x980 [ 472.014497][T17886] mm_init+0x36b/0x980 [ 472.018587][T17886] copy_mm+0x1dd/0x1390 [ 472.022751][T17886] ? _raw_spin_lock+0x8e/0xe0 [ 472.027438][T17886] ? _raw_spin_trylock_bh+0x130/0x130 [ 472.032826][T17886] ? copy_signal+0x600/0x600 [ 472.037421][T17886] ? __init_rwsem+0xfc/0x1d0 [ 472.042014][T17886] ? copy_signal+0x4cb/0x600 [ 472.046608][T17886] copy_process+0x115c/0x3210 [ 472.051306][T17886] ? __kasan_check_write+0x14/0x20 [ 472.056427][T17886] ? __pidfd_prepare+0x150/0x150 [ 472.061369][T17886] ? security_file_permission+0x83/0xa0 [ 472.066901][T17886] kernel_clone+0x23f/0x940 [ 472.071399][T17886] ? create_io_thread+0x130/0x130 [ 472.076409][T17886] ? __kasan_check_write+0x14/0x20 [ 472.081494][T17886] ? mutex_unlock+0x89/0x220 [ 472.086056][T17886] __x64_sys_clone+0x176/0x1d0 [ 472.090794][T17886] ? __kasan_check_write+0x14/0x20 [ 472.095877][T17886] ? __ia32_sys_vfork+0xf0/0xf0 [ 472.100702][T17886] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 472.106743][T17886] x64_sys_call+0x41f/0x9a0 [ 472.111277][T17886] do_syscall_64+0x4c/0xa0 [ 472.115680][T17886] ? clear_bhb_loop+0x50/0xa0 [ 472.120342][T17886] ? clear_bhb_loop+0x50/0xa0 [ 472.124999][T17886] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 472.130866][T17886] RIP: 0033:0x7f0f158aabe9 [ 472.135265][T17886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 472.154847][T17886] RSP: 002b:00007f0f14312fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 472.163249][T17886] RAX: ffffffffffffffda RBX: 00007f0f15ae1fa0 RCX: 00007f0f158aabe9 [ 472.171198][T17886] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 472.179152][T17886] RBP: 00007f0f14313090 R08: 0000000000000000 R09: 0000000000000000 [ 472.187099][T17886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 472.195046][T17886] R13: 00007f0f15ae2038 R14: 00007f0f15ae1fa0 R15: 00007ffd71940bd8 [ 472.202996][T17886] [ 472.302361][T17900] device sit0 left promiscuous mode [ 472.384232][T17908] device sit0 left promiscuous mode [ 472.412484][T17911] device sit0 entered promiscuous mode [ 472.499485][T17925] device syzkaller0 entered promiscuous mode [ 472.508080][T17928] device sit0 entered promiscuous mode [ 473.034463][T17953] device pim6reg1 entered promiscuous mode [ 473.629282][T17988] bpf_get_probe_write_proto: 4 callbacks suppressed [ 473.629304][T17988] syz.8.5217[17988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.707048][T17988] syz.8.5217[17988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.963467][T17998] device sit0 left promiscuous mode [ 474.099029][T18004] device sit0 entered promiscuous mode [ 474.388509][T18009] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 474.880199][T18027] syz.5.5229[18027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.880249][T18027] syz.5.5229[18027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.971685][T18035] syz.5.5233[18035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.986135][T18035] syz.5.5233[18035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.018921][T18034] syz.8.5231[18034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.040701][T18034] syz.8.5231[18034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.076314][T18039] syz.8.5231[18039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.093098][T18039] syz.8.5231[18039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.727466][T18050] cgroup: fork rejected by pids controller in /syz5 [ 476.497338][T18105] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.504645][T18105] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.512286][T18105] device bridge_slave_0 entered promiscuous mode [ 476.553769][T18105] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.567797][T18105] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.575567][T18105] device bridge_slave_1 entered promiscuous mode [ 476.830857][T18124] device pim6reg1 entered promiscuous mode [ 476.876844][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 476.884457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 476.947457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 476.961445][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 476.979890][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.986977][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.013440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 477.040490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 477.053703][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.060755][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.068129][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 477.076624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 477.084569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 477.125354][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 477.153515][T18105] device veth0_vlan entered promiscuous mode [ 477.178941][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 477.189012][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 477.217455][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 477.365707][ T30] audit: type=1400 audit(1756995763.929:172): avc: denied { create } for pid=18156 comm="syz.8.5267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 477.371167][T18105] device veth1_macvtap entered promiscuous mode [ 477.406108][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 477.449517][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 477.487153][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 477.504389][T18166] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 477.541194][T18170] device pim6reg1 entered promiscuous mode [ 477.558381][ T10] device erspan0 left promiscuous mode [ 477.590193][ T10] GPL: port 1(erspan0) entered disabled state [ 478.098786][T18197] device syzkaller0 entered promiscuous mode [ 478.120954][T18218] bond_slave_1: mtu less than device minimum [ 478.243695][T18233] device pim6reg1 entered promiscuous mode [ 478.271994][ T10] device bridge_slave_1 left promiscuous mode [ 478.293289][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.323296][ T10] device bridge_slave_0 left promiscuous mode [ 478.346481][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.368511][ T10] device veth0_vlan left promiscuous mode [ 478.689455][T18253] cgroup: fork rejected by pids controller in /syz8 [ 478.857765][T18262] bond_slave_1: mtu less than device minimum [ 479.198543][T18277] device pim6reg1 entered promiscuous mode [ 479.394077][T18278] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.462752][T18278] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.484490][T18278] device bridge_slave_0 entered promiscuous mode [ 479.553764][T18278] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.566063][T18278] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.573672][T18278] device bridge_slave_1 entered promiscuous mode [ 479.604677][T18307] bpf_get_probe_write_proto: 18 callbacks suppressed [ 479.604693][T18307] syz.3.5313[18307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.611679][T18307] syz.3.5313[18307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.630678][T18307] syz.3.5313[18307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.642580][T18307] syz.3.5313[18307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.872980][T18333] device pim6reg1 entered promiscuous mode [ 479.976118][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 480.008843][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 480.010191][T18351] FAULT_INJECTION: forcing a failure. [ 480.010191][T18351] name failslab, interval 1, probability 0, space 0, times 0 [ 480.028858][T18351] CPU: 0 PID: 18351 Comm: syz.3.5327 Not tainted syzkaller #0 [ 480.036334][T18351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 480.046396][T18351] Call Trace: [ 480.049678][T18351] [ 480.052615][T18351] __dump_stack+0x21/0x30 [ 480.056950][T18351] dump_stack_lvl+0xee/0x150 [ 480.061535][T18351] ? show_regs_print_info+0x20/0x20 [ 480.066738][T18351] dump_stack+0x15/0x20 [ 480.070888][T18351] should_fail+0x3c1/0x510 [ 480.075298][T18351] __should_failslab+0xa4/0xe0 [ 480.080054][T18351] should_failslab+0x9/0x20 [ 480.084550][T18351] slab_pre_alloc_hook+0x3b/0xe0 [ 480.089485][T18351] kmem_cache_alloc_trace+0x48/0x270 [ 480.094762][T18351] ? alloc_fdtable+0xb4/0x2b0 [ 480.099438][T18351] alloc_fdtable+0xb4/0x2b0 [ 480.103933][T18351] ? _find_last_bit+0x7c/0x120 [ 480.108692][T18351] dup_fd+0x870/0xb20 [ 480.112687][T18351] copy_files+0x76/0xe0 [ 480.116848][T18351] copy_process+0x10ac/0x3210 [ 480.121523][T18351] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 480.127322][T18351] ? __pidfd_prepare+0x150/0x150 [ 480.132257][T18351] kernel_clone+0x23f/0x940 [ 480.136763][T18351] ? create_io_thread+0x130/0x130 [ 480.141782][T18351] __x64_sys_clone+0x176/0x1d0 [ 480.146538][T18351] ? __kasan_check_write+0x14/0x20 [ 480.151645][T18351] ? __ia32_sys_vfork+0xf0/0xf0 [ 480.156492][T18351] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 480.162641][T18351] x64_sys_call+0x41f/0x9a0 [ 480.167135][T18351] do_syscall_64+0x4c/0xa0 [ 480.171544][T18351] ? clear_bhb_loop+0x50/0xa0 [ 480.176452][T18351] ? clear_bhb_loop+0x50/0xa0 [ 480.181142][T18351] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 480.187119][T18351] RIP: 0033:0x7fcbf847dbe9 [ 480.191528][T18351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 480.211131][T18351] RSP: 002b:00007fcbf6ee5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 480.219555][T18351] RAX: ffffffffffffffda RBX: 00007fcbf86b4fa0 RCX: 00007fcbf847dbe9 [ 480.227525][T18351] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 480.235496][T18351] RBP: 00007fcbf6ee6090 R08: 0000000000000000 R09: 0000000000000000 [ 480.243471][T18351] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 480.251451][T18351] R13: 00007fcbf86b5038 R14: 00007fcbf86b4fa0 R15: 00007fff77ff2668 [ 480.259438][T18351] [ 480.285184][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 480.293701][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 480.314697][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.321787][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 480.329347][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 480.365689][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 480.374213][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.381251][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 480.388925][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 480.397098][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 480.405109][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 480.413357][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 480.421282][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 480.429739][T18357] device sit0 left promiscuous mode [ 480.438808][T18359] device sit0 entered promiscuous mode [ 480.466114][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 480.475803][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 480.495734][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 480.508596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 480.524768][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 480.532480][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 480.548749][T18369] device syzkaller0 entered promiscuous mode [ 480.555992][T18278] device veth0_vlan entered promiscuous mode [ 480.565488][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 480.573910][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 480.604777][T18278] device veth1_macvtap entered promiscuous mode [ 480.622523][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 480.630266][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 480.641263][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 480.650958][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 480.664147][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 480.834111][T18395] device sit0 left promiscuous mode [ 481.092204][T18400] device sit0 entered promiscuous mode [ 481.124472][T18406] FAULT_INJECTION: forcing a failure. [ 481.124472][T18406] name failslab, interval 1, probability 0, space 0, times 0 [ 481.140357][T18406] CPU: 0 PID: 18406 Comm: syz.8.5341 Not tainted syzkaller #0 [ 481.147851][T18406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 481.157926][T18406] Call Trace: [ 481.161215][T18406] [ 481.164151][T18406] __dump_stack+0x21/0x30 [ 481.168496][T18406] dump_stack_lvl+0xee/0x150 [ 481.173095][T18406] ? show_regs_print_info+0x20/0x20 [ 481.178305][T18406] ? rwsem_write_trylock+0x130/0x300 [ 481.183602][T18406] dump_stack+0x15/0x20 [ 481.187766][T18406] should_fail+0x3c1/0x510 [ 481.192193][T18406] __should_failslab+0xa4/0xe0 [ 481.197077][T18406] should_failslab+0x9/0x20 [ 481.201601][T18406] slab_pre_alloc_hook+0x3b/0xe0 [ 481.206556][T18406] ? anon_vma_fork+0xf2/0x510 [ 481.211242][T18406] kmem_cache_alloc+0x44/0x260 [ 481.216017][T18406] anon_vma_fork+0xf2/0x510 [ 481.220535][T18406] copy_mm+0x9d1/0x1390 [ 481.224708][T18406] ? copy_signal+0x600/0x600 [ 481.229304][T18406] ? __init_rwsem+0xfc/0x1d0 [ 481.233917][T18406] ? copy_signal+0x4cb/0x600 [ 481.238523][T18406] copy_process+0x115c/0x3210 [ 481.243312][T18406] ? __kasan_check_write+0x14/0x20 [ 481.248424][T18406] ? __pidfd_prepare+0x150/0x150 [ 481.253359][T18406] ? security_file_permission+0x83/0xa0 [ 481.258907][T18406] kernel_clone+0x23f/0x940 [ 481.263417][T18406] ? create_io_thread+0x130/0x130 [ 481.268442][T18406] ? __kasan_check_write+0x14/0x20 [ 481.273546][T18406] ? mutex_unlock+0x89/0x220 [ 481.278130][T18406] __x64_sys_clone+0x176/0x1d0 [ 481.282893][T18406] ? __kasan_check_write+0x14/0x20 [ 481.288000][T18406] ? __ia32_sys_vfork+0xf0/0xf0 [ 481.292858][T18406] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 481.298921][T18406] x64_sys_call+0x41f/0x9a0 [ 481.303424][T18406] do_syscall_64+0x4c/0xa0 [ 481.307833][T18406] ? clear_bhb_loop+0x50/0xa0 [ 481.312511][T18406] ? clear_bhb_loop+0x50/0xa0 [ 481.317185][T18406] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 481.323070][T18406] RIP: 0033:0x7f56c2f9dbe9 [ 481.327480][T18406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 481.347085][T18406] RSP: 002b:00007f56c1a05fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 481.355497][T18406] RAX: ffffffffffffffda RBX: 00007f56c31d4fa0 RCX: 00007f56c2f9dbe9 [ 481.363462][T18406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 481.371513][T18406] RBP: 00007f56c1a06090 R08: 0000000000000000 R09: 0000000000000000 [ 481.379481][T18406] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 481.387446][T18406] R13: 00007f56c31d5038 R14: 00007f56c31d4fa0 R15: 00007ffec9616488 [ 481.395423][T18406] [ 481.603339][T18421] device syzkaller0 entered promiscuous mode [ 481.610957][T18421] FAULT_INJECTION: forcing a failure. [ 481.610957][T18421] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 481.626104][T18421] CPU: 0 PID: 18421 Comm: syz.1.5346 Not tainted syzkaller #0 [ 481.633589][T18421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 481.643658][T18421] Call Trace: [ 481.646939][T18421] [ 481.649904][T18421] __dump_stack+0x21/0x30 [ 481.654243][T18421] dump_stack_lvl+0xee/0x150 [ 481.658841][T18421] ? show_regs_print_info+0x20/0x20 [ 481.664054][T18421] dump_stack+0x15/0x20 [ 481.668219][T18421] should_fail+0x3c1/0x510 [ 481.672641][T18421] should_fail_usercopy+0x1a/0x20 [ 481.677672][T18421] _copy_from_iter+0x21a/0x1050 [ 481.682527][T18421] ? __kernel_text_address+0xa0/0x100 [ 481.687909][T18421] ? unwind_get_return_address+0x4d/0x90 [ 481.693552][T18421] ? copy_mc_pipe_to_iter+0x770/0x770 [ 481.698932][T18421] ? stack_trace_save+0x98/0xe0 [ 481.703790][T18421] tun_get_user+0x3dc/0x33c0 [ 481.708389][T18421] ? ____kasan_slab_free+0x125/0x160 [ 481.713679][T18421] ? __kasan_init_slab_obj+0x10/0x40 [ 481.718970][T18421] ? slab_free_freelist_hook+0xc2/0x190 [ 481.724533][T18421] ? kmem_cache_free+0x100/0x320 [ 481.729471][T18421] ? __x64_sys_openat+0x136/0x160 [ 481.734471][T18421] ? x64_sys_call+0x219/0x9a0 [ 481.739140][T18421] ? tun_do_read+0x1c40/0x1c40 [ 481.743879][T18421] ? kstrtouint_from_user+0x1a0/0x200 [ 481.749223][T18421] ? kstrtol_from_user+0x260/0x260 [ 481.754311][T18421] ? avc_policy_seqno+0x1b/0x70 [ 481.759148][T18421] ? selinux_file_permission+0x2aa/0x510 [ 481.764760][T18421] tun_chr_write_iter+0x1eb/0x2e0 [ 481.769770][T18421] vfs_write+0x802/0xf70 [ 481.774002][T18421] ? file_end_write+0x1b0/0x1b0 [ 481.778831][T18421] ? __fget_files+0x2c4/0x320 [ 481.783492][T18421] ? __fdget_pos+0x1f7/0x380 [ 481.788056][T18421] ? ksys_write+0x71/0x240 [ 481.792460][T18421] ksys_write+0x140/0x240 [ 481.796849][T18421] ? __ia32_sys_read+0x90/0x90 [ 481.801606][T18421] ? debug_smp_processor_id+0x17/0x20 [ 481.806968][T18421] __x64_sys_write+0x7b/0x90 [ 481.811531][T18421] x64_sys_call+0x8ef/0x9a0 [ 481.816015][T18421] do_syscall_64+0x4c/0xa0 [ 481.820418][T18421] ? clear_bhb_loop+0x50/0xa0 [ 481.825069][T18421] ? clear_bhb_loop+0x50/0xa0 [ 481.829739][T18421] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 481.835612][T18421] RIP: 0033:0x7f0f158aabe9 [ 481.840016][T18421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 481.859695][T18421] RSP: 002b:00007f0f14313038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 481.868090][T18421] RAX: ffffffffffffffda RBX: 00007f0f15ae1fa0 RCX: 00007f0f158aabe9 [ 481.876042][T18421] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 481.883992][T18421] RBP: 00007f0f14313090 R08: 0000000000000000 R09: 0000000000000000 [ 481.891962][T18421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 481.899932][T18421] R13: 00007f0f15ae2038 R14: 00007f0f15ae1fa0 R15: 00007ffd71940bd8 [ 481.907889][T18421] [ 482.098442][T18431] device syzkaller0 entered promiscuous mode [ 482.177379][T18441] syz.8.5352[18441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.177460][T18441] syz.8.5352[18441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.242996][T18452] FAULT_INJECTION: forcing a failure. [ 482.242996][T18452] name failslab, interval 1, probability 0, space 0, times 0 [ 482.268807][T18452] CPU: 1 PID: 18452 Comm: syz.1.5356 Not tainted syzkaller #0 [ 482.276297][T18452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 482.286376][T18452] Call Trace: [ 482.289660][T18452] [ 482.292599][T18452] __dump_stack+0x21/0x30 [ 482.296942][T18452] dump_stack_lvl+0xee/0x150 [ 482.301540][T18452] ? show_regs_print_info+0x20/0x20 [ 482.306753][T18452] dump_stack+0x15/0x20 [ 482.310919][T18452] should_fail+0x3c1/0x510 [ 482.315342][T18452] __should_failslab+0xa4/0xe0 [ 482.320119][T18452] should_failslab+0x9/0x20 [ 482.324626][T18452] slab_pre_alloc_hook+0x3b/0xe0 [ 482.329578][T18452] ? anon_vma_fork+0x200/0x510 [ 482.334351][T18452] kmem_cache_alloc+0x44/0x260 [ 482.339124][T18452] anon_vma_fork+0x200/0x510 [ 482.343722][T18452] copy_mm+0x9d1/0x1390 [ 482.347903][T18452] ? copy_signal+0x600/0x600 [ 482.352498][T18452] ? __init_rwsem+0xfc/0x1d0 [ 482.357099][T18452] ? copy_signal+0x4cb/0x600 [ 482.361698][T18452] copy_process+0x115c/0x3210 [ 482.366390][T18452] ? __kasan_check_write+0x14/0x20 [ 482.371533][T18452] ? __pidfd_prepare+0x150/0x150 [ 482.376477][T18452] ? security_file_permission+0x83/0xa0 [ 482.382033][T18452] kernel_clone+0x23f/0x940 [ 482.386544][T18452] ? create_io_thread+0x130/0x130 [ 482.391595][T18452] ? __kasan_check_write+0x14/0x20 [ 482.397145][T18452] ? mutex_unlock+0x89/0x220 [ 482.401752][T18452] __x64_sys_clone+0x176/0x1d0 [ 482.406531][T18452] ? __kasan_check_write+0x14/0x20 [ 482.411646][T18452] ? __ia32_sys_vfork+0xf0/0xf0 [ 482.416505][T18452] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 482.422581][T18452] x64_sys_call+0x41f/0x9a0 [ 482.427092][T18452] do_syscall_64+0x4c/0xa0 [ 482.431519][T18452] ? clear_bhb_loop+0x50/0xa0 [ 482.436203][T18452] ? clear_bhb_loop+0x50/0xa0 [ 482.440885][T18452] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 482.447132][T18452] RIP: 0033:0x7f0f158aabe9 [ 482.451563][T18452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 482.471178][T18452] RSP: 002b:00007f0f14312fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 482.479600][T18452] RAX: ffffffffffffffda RBX: 00007f0f15ae1fa0 RCX: 00007f0f158aabe9 [ 482.487583][T18452] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 482.495647][T18452] RBP: 00007f0f14313090 R08: 0000000000000000 R09: 0000000000000000 [ 482.503632][T18452] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 482.511609][T18452] R13: 00007f0f15ae2038 R14: 00007f0f15ae1fa0 R15: 00007ffd71940bd8 [ 482.519595][T18452] [ 482.534613][ T10] device bridge_slave_1 left promiscuous mode [ 482.548431][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.567415][ T10] device bridge_slave_0 left promiscuous mode [ 482.573529][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.841219][T18468] FAULT_INJECTION: forcing a failure. [ 482.841219][T18468] name failslab, interval 1, probability 0, space 0, times 0 [ 482.860096][T18468] CPU: 1 PID: 18468 Comm: syz.1.5360 Not tainted syzkaller #0 [ 482.867556][T18468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 482.877601][T18468] Call Trace: [ 482.880860][T18468] [ 482.883771][T18468] __dump_stack+0x21/0x30 [ 482.888084][T18468] dump_stack_lvl+0xee/0x150 [ 482.892672][T18468] ? show_regs_print_info+0x20/0x20 [ 482.897880][T18468] ? avc_has_perm_noaudit+0x2f4/0x460 [ 482.903272][T18468] dump_stack+0x15/0x20 [ 482.907413][T18468] should_fail+0x3c1/0x510 [ 482.911816][T18468] __should_failslab+0xa4/0xe0 [ 482.916585][T18468] should_failslab+0x9/0x20 [ 482.921079][T18468] slab_pre_alloc_hook+0x3b/0xe0 [ 482.925993][T18468] ? __alloc_skb+0xe0/0x740 [ 482.930478][T18468] kmem_cache_alloc+0x44/0x260 [ 482.935223][T18468] __alloc_skb+0xe0/0x740 [ 482.939531][T18468] alloc_skb_with_frags+0xa8/0x620 [ 482.944850][T18468] sock_alloc_send_pskb+0x853/0x980 [ 482.950034][T18468] ? __kernel_text_address+0xa0/0x100 [ 482.955397][T18468] ? sock_kzfree_s+0x60/0x60 [ 482.959965][T18468] ? iov_iter_advance+0x1f9/0x360 [ 482.964984][T18468] tun_get_user+0x4e6/0x33c0 [ 482.969588][T18468] ? ____kasan_slab_free+0x125/0x160 [ 482.974874][T18468] ? __kasan_init_slab_obj+0x10/0x40 [ 482.980155][T18468] ? slab_free_freelist_hook+0xc2/0x190 [ 482.985702][T18468] ? kmem_cache_free+0x100/0x320 [ 482.990642][T18468] ? __x64_sys_openat+0x136/0x160 [ 482.995663][T18468] ? x64_sys_call+0x219/0x9a0 [ 483.000338][T18468] ? tun_do_read+0x1c40/0x1c40 [ 483.005108][T18468] ? kstrtouint_from_user+0x1a0/0x200 [ 483.010505][T18468] ? kstrtol_from_user+0x260/0x260 [ 483.015618][T18468] ? putname+0x111/0x160 [ 483.019855][T18468] ? avc_policy_seqno+0x1b/0x70 [ 483.024701][T18468] ? selinux_file_permission+0x2aa/0x510 [ 483.030328][T18468] tun_chr_write_iter+0x1eb/0x2e0 [ 483.035348][T18468] vfs_write+0x802/0xf70 [ 483.039589][T18468] ? file_end_write+0x1b0/0x1b0 [ 483.044434][T18468] ? __fget_files+0x2c4/0x320 [ 483.049113][T18468] ? __fdget_pos+0x1f7/0x380 [ 483.053698][T18468] ? ksys_write+0x71/0x240 [ 483.058110][T18468] ksys_write+0x140/0x240 [ 483.062432][T18468] ? __ia32_sys_read+0x90/0x90 [ 483.067190][T18468] ? debug_smp_processor_id+0x17/0x20 [ 483.072559][T18468] __x64_sys_write+0x7b/0x90 [ 483.077145][T18468] x64_sys_call+0x8ef/0x9a0 [ 483.081640][T18468] do_syscall_64+0x4c/0xa0 [ 483.086055][T18468] ? clear_bhb_loop+0x50/0xa0 [ 483.090730][T18468] ? clear_bhb_loop+0x50/0xa0 [ 483.095401][T18468] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 483.101287][T18468] RIP: 0033:0x7f0f158aabe9 [ 483.105697][T18468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 483.125298][T18468] RSP: 002b:00007f0f14313038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 483.133706][T18468] RAX: ffffffffffffffda RBX: 00007f0f15ae1fa0 RCX: 00007f0f158aabe9 [ 483.141676][T18468] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 483.149638][T18468] RBP: 00007f0f14313090 R08: 0000000000000000 R09: 0000000000000000 [ 483.157603][T18468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 483.165569][T18468] R13: 00007f0f15ae2038 R14: 00007f0f15ae1fa0 R15: 00007ffd71940bd8 [ 483.173540][T18468] [ 483.242416][T18472] device syzkaller0 entered promiscuous mode [ 483.315193][T18477] device syzkaller0 entered promiscuous mode [ 483.660839][T18497] syz.5.5368[18497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.660921][T18497] syz.5.5368[18497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.900342][T18507] device pim6reg1 entered promiscuous mode [ 484.017128][T18512] syz.3.5373[18512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.017202][T18512] syz.3.5373[18512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.622434][T18541] bpf_get_probe_write_proto: 2 callbacks suppressed [ 484.622450][T18541] syz.1.5383[18541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.640903][T18541] syz.1.5383[18541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.663594][T18541] syz.1.5383[18541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.676888][T18541] syz.1.5383[18541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.720153][T18544] syz.9.5384[18544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.737525][T18547] syz.3.5385[18547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.741606][T18544] syz.9.5384[18544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.756728][T18547] syz.3.5385[18547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.796624][T18553] syz.9.5384[18553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.796814][T18551] syz.3.5385[18551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.968342][T18565] FAULT_INJECTION: forcing a failure. [ 484.968342][T18565] name failslab, interval 1, probability 0, space 0, times 0 [ 485.096181][T18565] CPU: 1 PID: 18565 Comm: syz.3.5392 Not tainted syzkaller #0 [ 485.103689][T18565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 485.113752][T18565] Call Trace: [ 485.117042][T18565] [ 485.119980][T18565] __dump_stack+0x21/0x30 [ 485.124321][T18565] dump_stack_lvl+0xee/0x150 [ 485.128922][T18565] ? show_regs_print_info+0x20/0x20 [ 485.134136][T18565] dump_stack+0x15/0x20 [ 485.138299][T18565] should_fail+0x3c1/0x510 [ 485.142725][T18565] __should_failslab+0xa4/0xe0 [ 485.147506][T18565] should_failslab+0x9/0x20 [ 485.152015][T18565] slab_pre_alloc_hook+0x3b/0xe0 [ 485.156966][T18565] ? copy_signal+0x54/0x600 [ 485.161478][T18565] kmem_cache_alloc+0x44/0x260 [ 485.166266][T18565] copy_signal+0x54/0x600 [ 485.170613][T18565] ? copy_process+0x110f/0x3210 [ 485.175490][T18565] copy_process+0x1130/0x3210 [ 485.180205][T18565] ? __kasan_check_write+0x14/0x20 [ 485.185336][T18565] ? __pidfd_prepare+0x150/0x150 [ 485.190290][T18565] ? security_file_permission+0x83/0xa0 [ 485.195854][T18565] kernel_clone+0x23f/0x940 [ 485.200463][T18565] ? create_io_thread+0x130/0x130 [ 485.205499][T18565] ? __kasan_check_write+0x14/0x20 [ 485.210626][T18565] ? mutex_unlock+0x89/0x220 [ 485.215229][T18565] __x64_sys_clone+0x176/0x1d0 [ 485.220001][T18565] ? __kasan_check_write+0x14/0x20 [ 485.225119][T18565] ? __ia32_sys_vfork+0xf0/0xf0 [ 485.229978][T18565] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 485.236055][T18565] x64_sys_call+0x41f/0x9a0 [ 485.240583][T18565] do_syscall_64+0x4c/0xa0 [ 485.245015][T18565] ? clear_bhb_loop+0x50/0xa0 [ 485.249716][T18565] ? clear_bhb_loop+0x50/0xa0 [ 485.254414][T18565] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 485.260312][T18565] RIP: 0033:0x7fcbf847dbe9 [ 485.264742][T18565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.284358][T18565] RSP: 002b:00007fcbf6ee5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 485.292873][T18565] RAX: ffffffffffffffda RBX: 00007fcbf86b4fa0 RCX: 00007fcbf847dbe9 [ 485.300867][T18565] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 485.308853][T18565] RBP: 00007fcbf6ee6090 R08: 0000000000000000 R09: 0000000000000000 [ 485.316835][T18565] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 485.324814][T18565] R13: 00007fcbf86b5038 R14: 00007fcbf86b4fa0 R15: 00007fff77ff2668 [ 485.332809][T18565] [ 487.715471][T18600] device syzkaller0 entered promiscuous mode [ 487.923995][T18610] device syzkaller0 entered promiscuous mode [ 488.928763][T18659] device macsec0 left promiscuous mode [ 489.705595][T18698] bpf_get_probe_write_proto: 22 callbacks suppressed [ 489.705614][T18698] syz.1.5434[18698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 489.796546][T18698] syz.1.5434[18698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 489.910412][T18706] syz.1.5434[18706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.027598][T18706] syz.1.5434[18706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.171885][T18722] syz.1.5438[18722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.183639][T18722] syz.1.5438[18722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.854184][T18761] device syzkaller0 entered promiscuous mode [ 490.873686][T18763] syz.3.5449[18763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.873788][T18763] syz.3.5449[18763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.886757][T18765] syz.1.5450[18765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.900599][T18763] syz.3.5449[18763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 491.027138][T18773] device pim6reg1 entered promiscuous mode [ 491.732943][T18810] ip6_vti0: mtu greater than device maximum [ 492.386748][T18821] device pim6reg1 entered promiscuous mode [ 492.600707][T18831] device veth0_vlan left promiscuous mode [ 492.618347][T18831] device veth0_vlan entered promiscuous mode [ 492.641905][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 492.671249][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 492.680009][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 492.880114][T18846] device pim6reg1 entered promiscuous mode [ 493.182379][T18862] device pim6reg1 entered promiscuous mode [ 493.678280][T18882] device pim6reg1 entered promiscuous mode [ 493.804689][T18888] device syzkaller0 entered promiscuous mode [ 493.811110][T18891] FAULT_INJECTION: forcing a failure. [ 493.811110][T18891] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 493.825648][T18891] CPU: 1 PID: 18891 Comm: syz.1.5492 Not tainted syzkaller #0 [ 493.833130][T18891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 493.843189][T18891] Call Trace: [ 493.846471][T18891] [ 493.849407][T18891] __dump_stack+0x21/0x30 [ 493.853749][T18891] dump_stack_lvl+0xee/0x150 [ 493.858352][T18891] ? show_regs_print_info+0x20/0x20 [ 493.863558][T18891] ? __kmalloc_track_caller+0x13c/0x2c0 [ 493.869122][T18891] ? alloc_skb_with_frags+0xa8/0x620 [ 493.874384][T18891] ? tun_chr_write_iter+0x1eb/0x2e0 [ 493.879560][T18891] ? vfs_write+0x802/0xf70 [ 493.883961][T18891] dump_stack+0x15/0x20 [ 493.888093][T18891] should_fail+0x3c1/0x510 [ 493.892485][T18891] should_fail_alloc_page+0x55/0x80 [ 493.897658][T18891] prepare_alloc_pages+0x156/0x600 [ 493.902747][T18891] ? __alloc_pages_bulk+0xab0/0xab0 [ 493.907946][T18891] __alloc_pages+0x10a/0x440 [ 493.912549][T18891] ? prep_new_page+0x110/0x110 [ 493.917330][T18891] ? __alloc_skb+0x463/0x740 [ 493.921929][T18891] alloc_skb_with_frags+0x20c/0x620 [ 493.927117][T18891] sock_alloc_send_pskb+0x853/0x980 [ 493.932329][T18891] ? __kernel_text_address+0xa0/0x100 [ 493.937725][T18891] ? sock_kzfree_s+0x60/0x60 [ 493.942337][T18891] ? iov_iter_advance+0x1f9/0x360 [ 493.947374][T18891] tun_get_user+0x4e6/0x33c0 [ 493.951980][T18891] ? ____kasan_slab_free+0x125/0x160 [ 493.957284][T18891] ? __kasan_init_slab_obj+0x10/0x40 [ 493.962583][T18891] ? memcpy+0x56/0x70 [ 493.966587][T18891] ? tun_do_read+0x1c40/0x1c40 [ 493.971411][T18891] ? kstrtouint_from_user+0x1a0/0x200 [ 493.976801][T18891] ? kstrtol_from_user+0x260/0x260 [ 493.981921][T18891] ? putname+0x111/0x160 [ 493.986180][T18891] ? avc_policy_seqno+0x1b/0x70 [ 493.991042][T18891] ? selinux_file_permission+0x2aa/0x510 [ 493.996684][T18891] tun_chr_write_iter+0x1eb/0x2e0 [ 494.001722][T18891] vfs_write+0x802/0xf70 [ 494.005979][T18891] ? file_end_write+0x1b0/0x1b0 [ 494.010836][T18891] ? __fget_files+0x2c4/0x320 [ 494.015526][T18891] ? __fdget_pos+0x1f7/0x380 [ 494.020116][T18891] ? ksys_write+0x71/0x240 [ 494.024530][T18891] ksys_write+0x140/0x240 [ 494.028858][T18891] ? __ia32_sys_read+0x90/0x90 [ 494.033618][T18891] ? debug_smp_processor_id+0x17/0x20 [ 494.038991][T18891] __x64_sys_write+0x7b/0x90 [ 494.043572][T18891] x64_sys_call+0x8ef/0x9a0 [ 494.048070][T18891] do_syscall_64+0x4c/0xa0 [ 494.052479][T18891] ? clear_bhb_loop+0x50/0xa0 [ 494.057329][T18891] ? clear_bhb_loop+0x50/0xa0 [ 494.062001][T18891] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 494.067887][T18891] RIP: 0033:0x7f0f158aabe9 [ 494.072728][T18891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 494.092764][T18891] RSP: 002b:00007f0f142f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 494.101177][T18891] RAX: ffffffffffffffda RBX: 00007f0f15ae2090 RCX: 00007f0f158aabe9 [ 494.109147][T18891] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 494.117113][T18891] RBP: 00007f0f142f2090 R08: 0000000000000000 R09: 0000000000000000 [ 494.125085][T18891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 494.133064][T18891] R13: 00007f0f15ae2128 R14: 00007f0f15ae2090 R15: 00007ffd71940bd8 [ 494.141060][T18891] [ 494.384924][T18899] device sit0 left promiscuous mode [ 494.717423][T18925] device pim6reg1 entered promiscuous mode [ 494.783124][T18937] device syzkaller0 entered promiscuous mode [ 494.801230][T18937] FAULT_INJECTION: forcing a failure. [ 494.801230][T18937] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.814877][T18937] CPU: 1 PID: 18937 Comm: syz.1.5507 Not tainted syzkaller #0 [ 494.822352][T18937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 494.832427][T18937] Call Trace: [ 494.835721][T18937] [ 494.838666][T18937] __dump_stack+0x21/0x30 [ 494.843013][T18937] dump_stack_lvl+0xee/0x150 [ 494.847619][T18937] ? show_regs_print_info+0x20/0x20 [ 494.852833][T18937] ? __kmalloc_track_caller+0x13c/0x2c0 [ 494.858388][T18937] ? alloc_skb_with_frags+0xa8/0x620 [ 494.863678][T18937] ? tun_chr_write_iter+0x1eb/0x2e0 [ 494.868967][T18937] ? vfs_write+0x802/0xf70 [ 494.873388][T18937] dump_stack+0x15/0x20 [ 494.877540][T18937] should_fail+0x3c1/0x510 [ 494.882045][T18937] should_fail_alloc_page+0x55/0x80 [ 494.887240][T18937] prepare_alloc_pages+0x156/0x600 [ 494.892411][T18937] ? __alloc_pages_bulk+0xab0/0xab0 [ 494.897604][T18937] __alloc_pages+0x10a/0x440 [ 494.902188][T18937] ? prep_new_page+0x110/0x110 [ 494.906946][T18937] ? __alloc_skb+0x463/0x740 [ 494.911534][T18937] alloc_skb_with_frags+0x20c/0x620 [ 494.916726][T18937] sock_alloc_send_pskb+0x853/0x980 [ 494.921928][T18937] ? __kernel_text_address+0xa0/0x100 [ 494.927301][T18937] ? sock_kzfree_s+0x60/0x60 [ 494.931892][T18937] ? iov_iter_advance+0x1f9/0x360 [ 494.936911][T18937] tun_get_user+0x4e6/0x33c0 [ 494.941497][T18937] ? ____kasan_slab_free+0x125/0x160 [ 494.946773][T18937] ? __kasan_init_slab_obj+0x10/0x40 [ 494.952049][T18937] ? slab_free_freelist_hook+0xc2/0x190 [ 494.957590][T18937] ? kmem_cache_free+0x100/0x320 [ 494.962523][T18937] ? __x64_sys_openat+0x136/0x160 [ 494.967544][T18937] ? x64_sys_call+0x219/0x9a0 [ 494.972216][T18937] ? tun_do_read+0x1c40/0x1c40 [ 494.976974][T18937] ? kstrtouint_from_user+0x1a0/0x200 [ 494.982438][T18937] ? kstrtol_from_user+0x260/0x260 [ 494.987556][T18937] ? avc_policy_seqno+0x1b/0x70 [ 494.992404][T18937] ? selinux_file_permission+0x2aa/0x510 [ 494.998033][T18937] tun_chr_write_iter+0x1eb/0x2e0 [ 495.003054][T18937] vfs_write+0x802/0xf70 [ 495.007292][T18937] ? file_end_write+0x1b0/0x1b0 [ 495.012138][T18937] ? __fget_files+0x2c4/0x320 [ 495.016817][T18937] ? __fdget_pos+0x1f7/0x380 [ 495.021403][T18937] ? ksys_write+0x71/0x240 [ 495.025812][T18937] ksys_write+0x140/0x240 [ 495.030140][T18937] ? __ia32_sys_read+0x90/0x90 [ 495.034899][T18937] ? debug_smp_processor_id+0x17/0x20 [ 495.040266][T18937] __x64_sys_write+0x7b/0x90 [ 495.044854][T18937] x64_sys_call+0x8ef/0x9a0 [ 495.049349][T18937] do_syscall_64+0x4c/0xa0 [ 495.053758][T18937] ? clear_bhb_loop+0x50/0xa0 [ 495.058434][T18937] ? clear_bhb_loop+0x50/0xa0 [ 495.063108][T18937] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 495.068995][T18937] RIP: 0033:0x7f0f158aabe9 [ 495.073413][T18937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 495.093014][T18937] RSP: 002b:00007f0f14313038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 495.101435][T18937] RAX: ffffffffffffffda RBX: 00007f0f15ae1fa0 RCX: 00007f0f158aabe9 [ 495.109401][T18937] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 495.117365][T18937] RBP: 00007f0f14313090 R08: 0000000000000000 R09: 0000000000000000 [ 495.125773][T18937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 495.133739][T18937] R13: 00007f0f15ae2038 R14: 00007f0f15ae1fa0 R15: 00007ffd71940bd8 [ 495.141714][T18937] [ 495.384883][T18960] device syzkaller0 entered promiscuous mode [ 495.885578][T18998] FAULT_INJECTION: forcing a failure. [ 495.885578][T18998] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 495.898951][T18998] CPU: 1 PID: 18998 Comm: syz.1.5523 Not tainted syzkaller #0 [ 495.906432][T18998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 495.909697][T18993] device syzkaller0 entered promiscuous mode [ 495.916499][T18998] Call Trace: [ 495.916507][T18998] [ 495.916514][T18998] __dump_stack+0x21/0x30 [ 495.916541][T18998] dump_stack_lvl+0xee/0x150 [ 495.916559][T18998] ? show_regs_print_info+0x20/0x20 [ 495.916578][T18998] ? __kmalloc_track_caller+0x13c/0x2c0 [ 495.916599][T18998] ? alloc_skb_with_frags+0xa8/0x620 [ 495.916617][T18998] ? tun_chr_write_iter+0x1eb/0x2e0 [ 495.916636][T18998] ? vfs_write+0x802/0xf70 [ 495.916653][T18998] dump_stack+0x15/0x20 [ 495.916671][T18998] should_fail+0x3c1/0x510 [ 495.971954][T18998] should_fail_alloc_page+0x55/0x80 [ 495.977153][T18998] prepare_alloc_pages+0x156/0x600 [ 495.982275][T18998] ? __alloc_pages_bulk+0xab0/0xab0 [ 495.987486][T18998] __alloc_pages+0x10a/0x440 [ 495.992101][T18998] ? prep_new_page+0x110/0x110 [ 495.996873][T18998] ? __alloc_skb+0x463/0x740 [ 496.001469][T18998] alloc_skb_with_frags+0x20c/0x620 [ 496.006758][T18998] sock_alloc_send_pskb+0x853/0x980 [ 496.011952][T18998] ? __kernel_text_address+0xa0/0x100 [ 496.017394][T18998] ? sock_kzfree_s+0x60/0x60 [ 496.021979][T18998] ? iov_iter_advance+0x1f9/0x360 [ 496.026999][T18998] tun_get_user+0x4e6/0x33c0 [ 496.031587][T18998] ? ____kasan_slab_free+0x125/0x160 [ 496.036863][T18998] ? __kasan_init_slab_obj+0x10/0x40 [ 496.042139][T18998] ? slab_free_freelist_hook+0xc2/0x190 [ 496.047677][T18998] ? kmem_cache_free+0x100/0x320 [ 496.052609][T18998] ? __x64_sys_openat+0x136/0x160 [ 496.057625][T18998] ? x64_sys_call+0x219/0x9a0 [ 496.062300][T18998] ? tun_do_read+0x1c40/0x1c40 [ 496.067057][T18998] ? kstrtouint_from_user+0x1a0/0x200 [ 496.072428][T18998] ? kstrtol_from_user+0x260/0x260 [ 496.077534][T18998] ? avc_policy_seqno+0x1b/0x70 [ 496.082378][T18998] ? selinux_file_permission+0x2aa/0x510 [ 496.088009][T18998] tun_chr_write_iter+0x1eb/0x2e0 [ 496.093035][T18998] vfs_write+0x802/0xf70 [ 496.097272][T18998] ? file_end_write+0x1b0/0x1b0 [ 496.102117][T18998] ? __fget_files+0x2c4/0x320 [ 496.106793][T18998] ? __fdget_pos+0x1f7/0x380 [ 496.111379][T18998] ? ksys_write+0x71/0x240 [ 496.115786][T18998] ksys_write+0x140/0x240 [ 496.120107][T18998] ? __ia32_sys_read+0x90/0x90 [ 496.124864][T18998] ? debug_smp_processor_id+0x17/0x20 [ 496.130234][T18998] __x64_sys_write+0x7b/0x90 [ 496.134823][T18998] x64_sys_call+0x8ef/0x9a0 [ 496.139324][T18998] do_syscall_64+0x4c/0xa0 [ 496.143737][T18998] ? clear_bhb_loop+0x50/0xa0 [ 496.148406][T18998] ? clear_bhb_loop+0x50/0xa0 [ 496.153082][T18998] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 496.158972][T18998] RIP: 0033:0x7f0f158aabe9 [ 496.163436][T18998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 496.183126][T18998] RSP: 002b:00007f0f142f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 496.191624][T18998] RAX: ffffffffffffffda RBX: 00007f0f15ae2090 RCX: 00007f0f158aabe9 [ 496.199595][T18998] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 496.207575][T18998] RBP: 00007f0f142f2090 R08: 0000000000000000 R09: 0000000000000000 [ 496.215640][T18998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 496.223614][T18998] R13: 00007f0f15ae2128 R14: 00007f0f15ae2090 R15: 00007ffd71940bd8 [ 496.231599][T18998] [ 496.500717][T19019] FAULT_INJECTION: forcing a failure. [ 496.500717][T19019] name failslab, interval 1, probability 0, space 0, times 0 [ 496.564960][T19019] CPU: 1 PID: 19019 Comm: syz.5.5530 Not tainted syzkaller #0 [ 496.572472][T19019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 496.582556][T19019] Call Trace: [ 496.585853][T19019] [ 496.588791][T19019] __dump_stack+0x21/0x30 [ 496.593136][T19019] dump_stack_lvl+0xee/0x150 [ 496.597733][T19019] ? show_regs_print_info+0x20/0x20 [ 496.602941][T19019] dump_stack+0x15/0x20 [ 496.607104][T19019] should_fail+0x3c1/0x510 [ 496.611535][T19019] __should_failslab+0xa4/0xe0 [ 496.616329][T19019] should_failslab+0x9/0x20 [ 496.620850][T19019] slab_pre_alloc_hook+0x3b/0xe0 [ 496.625805][T19019] ? vm_area_dup+0x26/0x210 [ 496.630310][T19019] kmem_cache_alloc+0x44/0x260 [ 496.635066][T19019] vm_area_dup+0x26/0x210 [ 496.639372][T19019] copy_mm+0x93a/0x1390 [ 496.643507][T19019] ? copy_signal+0x600/0x600 [ 496.648067][T19019] ? __init_rwsem+0xfc/0x1d0 [ 496.652629][T19019] ? copy_signal+0x4cb/0x600 [ 496.657197][T19019] copy_process+0x115c/0x3210 [ 496.661866][T19019] ? __kasan_check_write+0x14/0x20 [ 496.666952][T19019] ? __pidfd_prepare+0x150/0x150 [ 496.671869][T19019] ? security_file_permission+0x83/0xa0 [ 496.677415][T19019] kernel_clone+0x23f/0x940 [ 496.681908][T19019] ? create_io_thread+0x130/0x130 [ 496.686907][T19019] ? __kasan_check_write+0x14/0x20 [ 496.692006][T19019] ? mutex_unlock+0x89/0x220 [ 496.696571][T19019] __x64_sys_clone+0x176/0x1d0 [ 496.701308][T19019] ? __kasan_check_write+0x14/0x20 [ 496.706417][T19019] ? __ia32_sys_vfork+0xf0/0xf0 [ 496.711677][T19019] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 496.717718][T19019] x64_sys_call+0x41f/0x9a0 [ 496.722214][T19019] do_syscall_64+0x4c/0xa0 [ 496.726620][T19019] ? clear_bhb_loop+0x50/0xa0 [ 496.731366][T19019] ? clear_bhb_loop+0x50/0xa0 [ 496.736109][T19019] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 496.741984][T19019] RIP: 0033:0x7f29c177ebe9 [ 496.746373][T19019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 496.765950][T19019] RSP: 002b:00007f29c01e6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 496.774345][T19019] RAX: ffffffffffffffda RBX: 00007f29c19b5fa0 RCX: 00007f29c177ebe9 [ 496.782321][T19019] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 496.790292][T19019] RBP: 00007f29c01e7090 R08: 0000000000000000 R09: 0000000000000000 [ 496.798264][T19019] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 496.806231][T19019] R13: 00007f29c19b6038 R14: 00007f29c19b5fa0 R15: 00007fffd95b6788 [ 496.814202][T19019] [ 496.929265][T19029] device pim6reg1 entered promiscuous mode [ 497.061537][T19043] bpf_get_probe_write_proto: 20 callbacks suppressed [ 497.061555][T19043] syz.9.5541[19043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.072469][T19041] device syzkaller0 entered promiscuous mode [ 497.083968][T19043] syz.9.5541[19043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.091668][T19043] syz.9.5541[19043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.103721][T19043] syz.9.5541[19043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.133342][T19044] FAULT_INJECTION: forcing a failure. [ 497.133342][T19044] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 497.167521][T19044] CPU: 1 PID: 19044 Comm: syz.1.5540 Not tainted syzkaller #0 [ 497.175196][T19044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 497.185263][T19044] Call Trace: [ 497.188552][T19044] [ 497.191492][T19044] __dump_stack+0x21/0x30 [ 497.195843][T19044] dump_stack_lvl+0xee/0x150 [ 497.200452][T19044] ? show_regs_print_info+0x20/0x20 [ 497.205683][T19044] ? __kmalloc_track_caller+0x13c/0x2c0 [ 497.211245][T19044] ? alloc_skb_with_frags+0xa8/0x620 [ 497.216553][T19044] ? tun_chr_write_iter+0x1eb/0x2e0 [ 497.221771][T19044] ? vfs_write+0x802/0xf70 [ 497.226299][T19044] dump_stack+0x15/0x20 [ 497.230492][T19044] should_fail+0x3c1/0x510 [ 497.234920][T19044] should_fail_alloc_page+0x55/0x80 [ 497.240133][T19044] prepare_alloc_pages+0x156/0x600 [ 497.245258][T19044] ? __alloc_pages_bulk+0xab0/0xab0 [ 497.250468][T19044] __alloc_pages+0x10a/0x440 [ 497.255079][T19044] ? prep_new_page+0x110/0x110 [ 497.259862][T19044] ? __alloc_skb+0x463/0x740 [ 497.264464][T19044] alloc_skb_with_frags+0x20c/0x620 [ 497.269690][T19044] sock_alloc_send_pskb+0x853/0x980 [ 497.274898][T19044] ? __kernel_text_address+0xa0/0x100 [ 497.280282][T19044] ? sock_kzfree_s+0x60/0x60 [ 497.284877][T19044] ? iov_iter_advance+0x1f9/0x360 [ 497.289924][T19044] tun_get_user+0x4e6/0x33c0 [ 497.294533][T19044] ? ____kasan_slab_free+0x125/0x160 [ 497.299829][T19044] ? __kasan_init_slab_obj+0x10/0x40 [ 497.305119][T19044] ? slab_free_freelist_hook+0xc2/0x190 [ 497.310675][T19044] ? kmem_cache_free+0x100/0x320 [ 497.315622][T19044] ? __x64_sys_openat+0x136/0x160 [ 497.320654][T19044] ? x64_sys_call+0x219/0x9a0 [ 497.325344][T19044] ? tun_do_read+0x1c40/0x1c40 [ 497.330118][T19044] ? kstrtouint_from_user+0x1a0/0x200 [ 497.335496][T19044] ? kstrtol_from_user+0x260/0x260 [ 497.340616][T19044] ? avc_policy_seqno+0x1b/0x70 [ 497.345474][T19044] ? selinux_file_permission+0x2aa/0x510 [ 497.351112][T19044] tun_chr_write_iter+0x1eb/0x2e0 [ 497.356144][T19044] vfs_write+0x802/0xf70 [ 497.360390][T19044] ? file_end_write+0x1b0/0x1b0 [ 497.365253][T19044] ? __fget_files+0x2c4/0x320 [ 497.369935][T19044] ? __fdget_pos+0x1f7/0x380 [ 497.374533][T19044] ? ksys_write+0x71/0x240 [ 497.378960][T19044] ksys_write+0x140/0x240 [ 497.383293][T19044] ? __ia32_sys_read+0x90/0x90 [ 497.388065][T19044] ? debug_smp_processor_id+0x17/0x20 [ 497.393450][T19044] __x64_sys_write+0x7b/0x90 [ 497.398048][T19044] x64_sys_call+0x8ef/0x9a0 [ 497.402557][T19044] do_syscall_64+0x4c/0xa0 [ 497.406985][T19044] ? clear_bhb_loop+0x50/0xa0 [ 497.411671][T19044] ? clear_bhb_loop+0x50/0xa0 [ 497.416356][T19044] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 497.422255][T19044] RIP: 0033:0x7f0f158aabe9 [ 497.426675][T19044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 497.446284][T19044] RSP: 002b:00007f0f142f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 497.454726][T19044] RAX: ffffffffffffffda RBX: 00007f0f15ae2090 RCX: 00007f0f158aabe9 [ 497.462704][T19044] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 497.470685][T19044] RBP: 00007f0f142f2090 R08: 0000000000000000 R09: 0000000000000000 [ 497.478663][T19044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 497.486640][T19044] R13: 00007f0f15ae2128 R14: 00007f0f15ae2090 R15: 00007ffd71940bd8 [ 497.494627][T19044] [ 497.579084][T19049] device veth0_vlan left promiscuous mode [ 497.624529][T19049] device veth0_vlan entered promiscuous mode [ 497.649469][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 497.658015][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 497.665601][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 497.752191][T19070] FAULT_INJECTION: forcing a failure. [ 497.752191][T19070] name failslab, interval 1, probability 0, space 0, times 0 [ 497.766880][T19070] CPU: 1 PID: 19070 Comm: syz.5.5549 Not tainted syzkaller #0 [ 497.774369][T19070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 497.784519][T19070] Call Trace: [ 497.787795][T19070] [ 497.790720][T19070] __dump_stack+0x21/0x30 [ 497.795052][T19070] dump_stack_lvl+0xee/0x150 [ 497.799641][T19070] ? show_regs_print_info+0x20/0x20 [ 497.804841][T19070] dump_stack+0x15/0x20 [ 497.808991][T19070] should_fail+0x3c1/0x510 [ 497.813406][T19070] __should_failslab+0xa4/0xe0 [ 497.818168][T19070] should_failslab+0x9/0x20 [ 497.822668][T19070] slab_pre_alloc_hook+0x3b/0xe0 [ 497.827603][T19070] ? anon_vma_fork+0x200/0x510 [ 497.832381][T19070] kmem_cache_alloc+0x44/0x260 [ 497.837145][T19070] anon_vma_fork+0x200/0x510 [ 497.841740][T19070] copy_mm+0x9d1/0x1390 [ 497.845913][T19070] ? copy_signal+0x600/0x600 [ 497.850515][T19070] ? __init_rwsem+0xfc/0x1d0 [ 497.855116][T19070] ? copy_signal+0x4cb/0x600 [ 497.859790][T19070] copy_process+0x115c/0x3210 [ 497.864470][T19070] ? __kasan_check_write+0x14/0x20 [ 497.869579][T19070] ? __pidfd_prepare+0x150/0x150 [ 497.874521][T19070] ? security_file_permission+0x83/0xa0 [ 497.880071][T19070] kernel_clone+0x23f/0x940 [ 497.884577][T19070] ? create_io_thread+0x130/0x130 [ 497.889600][T19070] ? __kasan_check_write+0x14/0x20 [ 497.894711][T19070] ? mutex_unlock+0x89/0x220 [ 497.899303][T19070] __x64_sys_clone+0x176/0x1d0 [ 497.904065][T19070] ? __kasan_check_write+0x14/0x20 [ 497.909174][T19070] ? __ia32_sys_vfork+0xf0/0xf0 [ 497.914025][T19070] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 497.920088][T19070] x64_sys_call+0x41f/0x9a0 [ 497.924586][T19070] do_syscall_64+0x4c/0xa0 [ 497.928996][T19070] ? clear_bhb_loop+0x50/0xa0 [ 497.933666][T19070] ? clear_bhb_loop+0x50/0xa0 [ 497.938343][T19070] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 497.944229][T19070] RIP: 0033:0x7f29c177ebe9 [ 497.948645][T19070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 497.968247][T19070] RSP: 002b:00007f29c01e6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 497.976656][T19070] RAX: ffffffffffffffda RBX: 00007f29c19b5fa0 RCX: 00007f29c177ebe9 [ 497.984626][T19070] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 497.992593][T19070] RBP: 00007f29c01e7090 R08: 0000000000000000 R09: 0000000000000000 [ 498.000558][T19070] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 498.008608][T19070] R13: 00007f29c19b6038 R14: 00007f29c19b5fa0 R15: 00007fffd95b6788 [ 498.016579][T19070] [ 498.058000][T19072] device pim6reg1 entered promiscuous mode [ 498.238411][T19106] syz.1.5562[19106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.238528][T19106] syz.1.5562[19106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.256789][T19106] syz.1.5562[19106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.269029][T19104] device veth0_vlan left promiscuous mode [ 498.295088][T19106] syz.1.5562[19106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.301918][T19104] device veth0_vlan entered promiscuous mode [ 498.416796][T19114] FAULT_INJECTION: forcing a failure. [ 498.416796][T19114] name failslab, interval 1, probability 0, space 0, times 0 [ 498.435915][T19114] CPU: 0 PID: 19114 Comm: syz.1.5564 Not tainted syzkaller #0 [ 498.443407][T19114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 498.453526][T19114] Call Trace: [ 498.456812][T19114] [ 498.459748][T19114] __dump_stack+0x21/0x30 [ 498.464090][T19114] dump_stack_lvl+0xee/0x150 [ 498.468690][T19114] ? show_regs_print_info+0x20/0x20 [ 498.473895][T19114] dump_stack+0x15/0x20 [ 498.478056][T19114] should_fail+0x3c1/0x510 [ 498.482486][T19114] __should_failslab+0xa4/0xe0 [ 498.487261][T19114] should_failslab+0x9/0x20 [ 498.491772][T19114] slab_pre_alloc_hook+0x3b/0xe0 [ 498.496721][T19114] ? anon_vma_fork+0x200/0x510 [ 498.501492][T19114] kmem_cache_alloc+0x44/0x260 [ 498.506269][T19114] anon_vma_fork+0x200/0x510 [ 498.510873][T19114] copy_mm+0x9d1/0x1390 [ 498.515040][T19114] ? copy_signal+0x600/0x600 [ 498.519643][T19114] ? __init_rwsem+0xfc/0x1d0 [ 498.524244][T19114] ? copy_signal+0x4cb/0x600 [ 498.528832][T19114] copy_process+0x115c/0x3210 [ 498.533495][T19114] ? __kasan_check_write+0x14/0x20 [ 498.538598][T19114] ? __pidfd_prepare+0x150/0x150 [ 498.543514][T19114] ? security_file_permission+0x83/0xa0 [ 498.549047][T19114] kernel_clone+0x23f/0x940 [ 498.553618][T19114] ? create_io_thread+0x130/0x130 [ 498.559317][T19114] ? __kasan_check_write+0x14/0x20 [ 498.564491][T19114] ? mutex_unlock+0x89/0x220 [ 498.569054][T19114] __x64_sys_clone+0x176/0x1d0 [ 498.573793][T19114] ? __kasan_check_write+0x14/0x20 [ 498.578894][T19114] ? __ia32_sys_vfork+0xf0/0xf0 [ 498.583735][T19114] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 498.589814][T19114] x64_sys_call+0x41f/0x9a0 [ 498.594316][T19114] do_syscall_64+0x4c/0xa0 [ 498.598715][T19114] ? clear_bhb_loop+0x50/0xa0 [ 498.603368][T19114] ? clear_bhb_loop+0x50/0xa0 [ 498.608019][T19114] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 498.613891][T19114] RIP: 0033:0x7f0f158aabe9 [ 498.618282][T19114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 498.637948][T19114] RSP: 002b:00007f0f14312fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 498.646343][T19114] RAX: ffffffffffffffda RBX: 00007f0f15ae1fa0 RCX: 00007f0f158aabe9 [ 498.654313][T19114] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 498.662268][T19114] RBP: 00007f0f14313090 R08: 0000000000000000 R09: 0000000000000000 [ 498.670219][T19114] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 498.678169][T19114] R13: 00007f0f15ae2038 R14: 00007f0f15ae1fa0 R15: 00007ffd71940bd8 [ 498.686136][T19114] [ 499.086733][T19140] device pim6reg1 entered promiscuous mode [ 499.157132][T19158] FAULT_INJECTION: forcing a failure. [ 499.157132][T19158] name failslab, interval 1, probability 0, space 0, times 0 [ 499.206568][T19158] CPU: 1 PID: 19158 Comm: syz.1.5577 Not tainted syzkaller #0 [ 499.214069][T19158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 499.224130][T19158] Call Trace: [ 499.227422][T19158] [ 499.230360][T19158] __dump_stack+0x21/0x30 [ 499.234703][T19158] dump_stack_lvl+0xee/0x150 [ 499.239316][T19158] ? show_regs_print_info+0x20/0x20 [ 499.244527][T19158] dump_stack+0x15/0x20 [ 499.248690][T19158] should_fail+0x3c1/0x510 [ 499.253117][T19158] __should_failslab+0xa4/0xe0 [ 499.257932][T19158] should_failslab+0x9/0x20 [ 499.262451][T19158] slab_pre_alloc_hook+0x3b/0xe0 [ 499.267405][T19158] ? anon_vma_clone+0xc0/0x500 [ 499.272183][T19158] kmem_cache_alloc+0x44/0x260 [ 499.276956][T19158] anon_vma_clone+0xc0/0x500 [ 499.281563][T19158] anon_vma_fork+0x8c/0x510 [ 499.286089][T19158] copy_mm+0x9d1/0x1390 [ 499.290287][T19158] ? copy_signal+0x600/0x600 [ 499.294881][T19158] ? __init_rwsem+0xfc/0x1d0 [ 499.299480][T19158] ? copy_signal+0x4cb/0x600 [ 499.304081][T19158] copy_process+0x115c/0x3210 [ 499.308780][T19158] ? __kasan_check_write+0x14/0x20 [ 499.313904][T19158] ? __pidfd_prepare+0x150/0x150 [ 499.318854][T19158] ? security_file_permission+0x83/0xa0 [ 499.324426][T19158] kernel_clone+0x23f/0x940 [ 499.328939][T19158] ? create_io_thread+0x130/0x130 [ 499.333974][T19158] ? __kasan_check_write+0x14/0x20 [ 499.339093][T19158] ? mutex_unlock+0x89/0x220 [ 499.343699][T19158] __x64_sys_clone+0x176/0x1d0 [ 499.348473][T19158] ? __kasan_check_write+0x14/0x20 [ 499.353592][T19158] ? __ia32_sys_vfork+0xf0/0xf0 [ 499.358470][T19158] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 499.364568][T19158] x64_sys_call+0x41f/0x9a0 [ 499.369100][T19158] do_syscall_64+0x4c/0xa0 [ 499.373541][T19158] ? clear_bhb_loop+0x50/0xa0 [ 499.378228][T19158] ? clear_bhb_loop+0x50/0xa0 [ 499.382910][T19158] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 499.388808][T19158] RIP: 0033:0x7f0f158aabe9 [ 499.393233][T19158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 499.412849][T19158] RSP: 002b:00007f0f14312fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 499.421270][T19158] RAX: ffffffffffffffda RBX: 00007f0f15ae1fa0 RCX: 00007f0f158aabe9 [ 499.429245][T19158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 499.437218][T19158] RBP: 00007f0f14313090 R08: 0000000000000000 R09: 0000000000000000 [ 499.445196][T19158] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 499.453169][T19158] R13: 00007f0f15ae2038 R14: 00007f0f15ae1fa0 R15: 00007ffd71940bd8 [ 499.461151][T19158] [ 499.646382][T19176] device veth1 entered promiscuous mode [ 500.938709][T19176] device wg2 entered promiscuous mode [ 501.133517][T19187] device syzkaller0 entered promiscuous mode [ 501.150710][T19195] device sit0 entered promiscuous mode [ 501.206612][T19199] device pim6reg1 entered promiscuous mode [ 501.333894][T19205] device wg2 entered promiscuous mode [ 501.355400][T19206] device veth1_macvtap left promiscuous mode [ 501.442458][T19209] FAULT_INJECTION: forcing a failure. [ 501.442458][T19209] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 501.546378][T19209] CPU: 1 PID: 19209 Comm: syz.9.5593 Not tainted syzkaller #0 [ 501.553889][T19209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 501.563955][T19209] Call Trace: [ 501.567322][T19209] [ 501.570262][T19209] __dump_stack+0x21/0x30 [ 501.574603][T19209] dump_stack_lvl+0xee/0x150 [ 501.579196][T19209] ? show_regs_print_info+0x20/0x20 [ 501.584400][T19209] ? prep_new_page+0x1c/0x110 [ 501.589095][T19209] dump_stack+0x15/0x20 [ 501.593262][T19209] should_fail+0x3c1/0x510 [ 501.597683][T19209] should_fail_alloc_page+0x55/0x80 [ 501.602887][T19209] prepare_alloc_pages+0x156/0x600 [ 501.608012][T19209] ? __alloc_pages_bulk+0xab0/0xab0 [ 501.613303][T19209] ? __alloc_pages+0x440/0x440 [ 501.618086][T19209] __alloc_pages+0x10a/0x440 [ 501.622752][T19209] ? prep_new_page+0x110/0x110 [ 501.627528][T19209] ? __kasan_check_write+0x14/0x20 [ 501.632656][T19209] ? _raw_spin_lock+0x8e/0xe0 [ 501.637347][T19209] pte_alloc_one+0x70/0x180 [ 501.641859][T19209] ? pfn_modify_allowed+0x2f0/0x2f0 [ 501.647067][T19209] ? __mod_lruvec_page_state+0x15d/0x1c0 [ 501.652717][T19209] ? _raw_spin_unlock+0x4d/0x70 [ 501.657583][T19209] ? __pmd_alloc+0x3ef/0x4a0 [ 501.662187][T19209] ? __kasan_check_write+0x14/0x20 [ 501.667306][T19209] __pte_alloc+0x75/0x290 [ 501.671661][T19209] ? __pud_alloc+0x1a0/0x1a0 [ 501.676263][T19209] ? __kasan_slab_alloc+0xcf/0xf0 [ 501.681326][T19209] ? free_pgtables+0x280/0x280 [ 501.686110][T19209] ? _raw_spin_unlock+0x4d/0x70 [ 501.690980][T19209] copy_page_range+0x2348/0x2890 [ 501.695939][T19209] ? pfn_valid+0x1d0/0x1d0 [ 501.700371][T19209] copy_mm+0xbdc/0x1390 [ 501.704539][T19209] ? copy_signal+0x600/0x600 [ 501.709133][T19209] ? __init_rwsem+0xfc/0x1d0 [ 501.713735][T19209] ? copy_signal+0x4cb/0x600 [ 501.718329][T19209] copy_process+0x115c/0x3210 [ 501.723029][T19209] ? __kasan_check_write+0x14/0x20 [ 501.728153][T19209] ? __pidfd_prepare+0x150/0x150 [ 501.733105][T19209] ? security_file_permission+0x83/0xa0 [ 501.738660][T19209] kernel_clone+0x23f/0x940 [ 501.743177][T19209] ? create_io_thread+0x130/0x130 [ 501.748214][T19209] ? __kasan_check_write+0x14/0x20 [ 501.753337][T19209] ? mutex_unlock+0x89/0x220 [ 501.757933][T19209] __x64_sys_clone+0x176/0x1d0 [ 501.762708][T19209] ? __kasan_check_write+0x14/0x20 [ 501.767840][T19209] ? __ia32_sys_vfork+0xf0/0xf0 [ 501.772703][T19209] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 501.778790][T19209] x64_sys_call+0x41f/0x9a0 [ 501.783305][T19209] do_syscall_64+0x4c/0xa0 [ 501.787742][T19209] ? clear_bhb_loop+0x50/0xa0 [ 501.792437][T19209] ? clear_bhb_loop+0x50/0xa0 [ 501.797119][T19209] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 501.803104][T19209] RIP: 0033:0x7fa3e183bbe9 [ 501.807525][T19209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 501.827136][T19209] RSP: 002b:00007fa3e02a3fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 501.835565][T19209] RAX: ffffffffffffffda RBX: 00007fa3e1a72fa0 RCX: 00007fa3e183bbe9 [ 501.843554][T19209] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 501.851553][T19209] RBP: 00007fa3e02a4090 R08: 0000000000000000 R09: 0000000000000000 [ 501.859545][T19209] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 501.867530][T19209] R13: 00007fa3e1a73038 R14: 00007fa3e1a72fa0 R15: 00007fffea373978 [ 501.875528][T19209] Connection to 10.128.0.133 closed by remote host. [ 503.919441][ T10] device erspan0 left promiscuous mode [ 503.924920][ T10] GPL: port 1(erspan0) entered disabled state [ 503.933445][ T10] device erspan0 left promiscuous mode [ 503.938955][ T10] GPL: port 1(erspan0) entered disabled state [ 504.237184][ T10] device bridge_slave_1 left promiscuous mode [ 504.243283][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.250669][ T10] device bridge_slave_0 left promiscuous mode [ 504.256809][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.264304][ T10] device bridge_slave_1 left promiscuous mode [ 504.270461][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.277857][ T10] device bridge_slave_0 left promiscuous mode [ 504.283925][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.291958][ T10] device bridge_slave_1 left promiscuous mode [ 504.298095][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.305647][ T10] device bridge_slave_0 left promiscuous mode [ 504.311951][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.319673][ T10] device bridge_slave_1 left promiscuous mode [ 504.325761][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.333100][ T10] device bridge_slave_0 left promiscuous mode [ 504.339234][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.347414][ T10] device veth1_macvtap left promiscuous mode [ 504.353446][ T10] device veth1_macvtap left promiscuous mode [ 504.359644][ T10] device veth0_vlan left promiscuous mode [ 504.365451][ T10] device veth1_macvtap left promiscuous mode [ 504.371513][ T10] device veth0_vlan left promiscuous mode [ 504.377337][ T10] device veth0_vlan left promiscuous mode