last executing test programs: 10m5.523954146s ago: executing program 4 (id=1969): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="85000000ae00000025000000000000009500000000000000afcd48d649379071c33390e418ec470db2c6161dba392176dd296303406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ecec37e83efceefd7ca2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c126ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a8f27e02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420b75b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d988c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438a58c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e0bb24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c38680a377f8c26e6e382067f690089f34b13ee0633a171c7918401acd4575f1443815854f775308c083ff4f4046cfca8bca48e6db6b211113c06797722230af92290231a0f02e247cf96876257dac9ff0b8f07ff5916a8ccd3f15b389d34520f074c6f006e0383280bf0b9765c995ef1e696a1da41d9372a1c9d85f1a83b6213b5fb236fbeda8fb90dee70ca3cfc0833741a0e9341ab4dee09669b832840fef5a2bbebd5957503656c445a428efc5711d1c66093b360c63e63e91cb871f8dc43a915ec87be492daec18847de7032d5c97d0296a1fa97d17f8546290c1a325221f36f8d749d4a9aa1883a41d92228c93b60fe677f4f9d51fadbba6dd46222fd11f678d7e9a307024806cc28cba904f8d12870b4528b8d75fd29adacf0a52cdfaf4e43f00e532cfc15f394db7d521339aa980f81bd78a82d84dba575391bee41c95daf3b576feed54d448d36ad0000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1}, @ptr]}}, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00007e5e82572e1f64c5923024b17f0020000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRESHEX=r2, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1}, 0x0) 10m5.401180088s ago: executing program 4 (id=1972): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000002000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r1}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x18, &(0x7f0000000bc0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="4539b73c9216d22ca32ccb6443fe83d9a2d207a38c9ba9e4a55a86930803fa31b6a0092747988b4cc1963996dceba264ad76318aa15bcfe046c2bec1c4e0dbfa5d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f00000002c0)="bdd283327ac4dc87925f698277080fc790c4f68f5d51ef3eedcd290fc31d00f9ff545e2d2984487381d4fc24046b1421f6af876c1a330c52c171e7623e1454155a02c913c1bb459b70d44caf410949a09f67a7752d17ad2f85e43afdaf41cfa12c7c9e4c6fc285"}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r2}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) write$cgroup_int(r4, &(0x7f0000000540)=0xfffffffffffffffe, 0x33) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000400)={'vlan1\x00', @multicast}) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0)=0x8200000000000000, 0xfffffdef) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000803a3f70a800000000000018115e04", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x18, 0x27, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000007000000000000003300000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001800000000000000000000000004000085100000f9ffffffb7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="000000c5b0af7e0704d8c15f8598308ff1000000000000b70500000800000085000200a500000018130000", @ANYRES32=0x1, @ANYBLOB="00000000000000008510000006000000a490ffff080000008520000002000000186300000e000000000000000900000085100000f8ffffffbf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x5, 0xf7, &(0x7f0000000d00)=""/247, 0x40f00, 0x8, '\x00', 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x2, 0xc, 0x19f, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000006c0)=[r0, r6, r4, r7, r6, 0xffffffffffffffff, r5, r4], &(0x7f0000000e80)=[{0x3, 0x1, 0x10}, {0x5, 0x5, 0x6, 0xa}, {0x4, 0x2, 0x9, 0xf}, {0x0, 0x1, 0x2, 0x4}, {0x0, 0x2, 0x5, 0xc}], 0x10, 0x7d83, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r9, 0x0, 0x62, 0xfe, &(0x7f0000000140)="cb74445b7d4c0b24676c6c71ae37efcedaf40242309766deb4e793f90000000000000000dbc856cbc664650634231454ca2d8034c4ca29e0d99c3b6615e91835a600c08f989af45438a54981be310aad92ae545b1c961e5f3762a51fe4c736edec6f", &(0x7f0000000440)=""/254, 0x2f00, 0x0, 0xff, 0x194, &(0x7f0000000980)="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", &(0x7f00000007c0)="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", 0x2, 0x0, 0x10000}, 0x24) 10m4.179510257s ago: executing program 4 (id=1981): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 10m4.077513419s ago: executing program 4 (id=1984): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x40a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/cgroup\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xb702, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f0000000700)={&(0x7f00000010c0)=""/4096, 0xffffffffffffffae, 0x0, &(0x7f0000000740)=""/13, 0x1c}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0x4, 0x6, 0x1, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x25, 0x800, 0x6, &(0x7f0000000000)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000400), 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f0000000540), 0x8) r2 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x14000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000780)={r5, 0x0, 0x65, 0x0, &(0x7f0000000340)="bcd0e70032dd82394763db9b8578188ba3455e4f4a72ac563a4e3b04263542e1e19b09ae63b23f180c26347ff3355b5fcd51511905b56cf2a6f1845737da4618c9e53dd32f4cded3f7cfba587db2059763399443b432a825fdce23fe501f00c3f89fd09aee", 0x0, 0x2, 0x0, 0x94, 0x0, &(0x7f00000005c0)="3277b69705beb8553241c110a6ffa856285bb6fcde283ac83c9a3f5ebcc259e64924598857cfd1f26a8a5901caf5904d2c03b6044b3102714fea648ebb217dbc80ca80b6195eef16fb1e9922540445e2986600e14e27db0fa8b309d311b08082f87a7c540f3f40223f6b047d2dca072ab9ee9908fd1193c5e9b56b1d3fe584cd7e919ac53ac96fc60a06527af689dd0464650b49", 0x0, 0x2, 0x0, 0x8f2}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={0xffffffffffffffff, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000001c0)={0x5, 0x80, 0x3, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x401, 0x7ff}, 0x2, 0xfffffffffffffffe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0xfffffffffffffffe}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00\x00\b\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1900000004000000040000000200020000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000020000000000000000000000000000000000000000000200f60f8719ed2290b248f3e47ecfccd3b5bcb7fa2fca68c0eb14c2f611b63b883c7d59273f5118acfa2abb9bcf"], 0x48) 10m3.671127516s ago: executing program 4 (id=1989): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000040000000600", @ANYBLOB="0ba3d03c44aa6156d1e719a4dd12035394998f577ce62528bdcadbd7a291c28b777efdb3a8d0af06810a1f20a1ce60c871858d9acdbe768b3ed97c24985bebd4521c5c96585eafa68dbbe50de785610af83f86f7bec9f783064740f01341354565c6432423ebf2cfa3bf8afeaca242fba589f06a6071"], 0x48) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0aecffff03000000080f0000060000000000000071ef195a1133", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce220000000000000000003b0000000000007f"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 10m0.006568313s ago: executing program 4 (id=1994): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 9m30.432874409s ago: executing program 32 (id=1996): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xfffffffffffffe9b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r6 = syz_clone(0x40000000, &(0x7f00000001c0), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000300)="ee7caa7d70f7d073acbe41371fb25a1cd1cdd5a715ee4ba0884c2664fa515d295b400d1e59fab3c1faeffd0be69c8daaac427aee758bc0cdd81c34be135e6b7c7aefad3b3ff535c00e97397c7ca3dd9e1cc56512d13b64f79fd4dfe78b263eb53182e7064fbe6c7eb3d7135cce5a6b927edd227cbadb99eefdaf6eb67b10fa3525102cc57f7a") write$cgroup_pid(r5, &(0x7f0000000280)=r6, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) syz_clone(0x40840100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x5, &(0x7f0000000000)=[{0x15, 0x0, 0x3}, {0x0, 0x0, 0xfe}, {}, {}, {0x6, 0x3}]}) 9m30.420941539s ago: executing program 33 (id=1988): bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000300)=ANY=[@ANYRES32], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="85bc78006100000054000000000000009500000004000000"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe40, 0x0, &(0x7f00000000c0)="5cdd3086ddffff6633c9bbac88a8862608dffd00139fb7a884bdfc14f4870800", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000005740)=ANY=[@ANYBLOB], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe87) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0f00"/20, @ANYRES64=r3, @ANYBLOB="0000004a056067cea9a4c8f0f3e81a70879e910000000000000000000000000200000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x6a7}, 0x0, 0x0, 0xfffffffe, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="180200000100000000000000000000008500000053000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70600000000000085000000070000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x81) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000000c0)="c1b9545dd30a1d31677b2d0bfa91", 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000001b00)={0x1, &(0x7f0000001ac0)=[{0x74}]}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 9m30.3953023s ago: executing program 34 (id=1995): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0xa100, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100001100000000000000000000001812"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0xf5, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r5}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x55b600, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b00000000000000cade22000000000000ac9ccb"], 0xfdef) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xc00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r8, 0x0, 0x3}, 0x18) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x402002, 0x0) close(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r9, 0x40047451, &(0x7f0000000180)) 9m30.359785231s ago: executing program 35 (id=1992): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000500008000001c0000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff01000000bfa20000000000000702001c656ee52e188f180008"], 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000f1ffff0038a1ffffff0400a62564d30000", @ANYRES32, @ANYBLOB="3e1400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000100"/28], 0x50) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000580)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffff6c, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9b, &(0x7f00000008c0), 0x8, 0x10, &(0x7f0000000900), &(0x7f0000000540), 0xfffffffffffffe86, 0xaa, 0x8, 0x8, &(0x7f0000000b00)}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_ext={0x1c, 0x1c, &(0x7f0000000e80)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @exit, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf}}, @alu={0x1a9333655cd27fea, 0x0, 0x6, 0x1, 0x1, 0x50, 0xfffffffffffffff0}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x4}, @alu={0x7, 0x1, 0x6, 0xb, 0x4, 0x20, 0x10}, @ringbuf_query, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000280)='GPL\x00', 0xffff, 0x90, &(0x7f0000000680)=""/144, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0xd, 0xfffffffc, 0x2}, 0x10, 0x164f0, r0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r6}, 0x10) gettid() r7 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000280)=ANY=[], 0x31) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x2}, 0xe0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) 9m30.326108071s ago: executing program 36 (id=1994): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 1m39.609761295s ago: executing program 5 (id=6634): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="050000010000008000"/18, @ANYRES64, @ANYRES64, @ANYRES32, @ANYRESHEX], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r0, &(0x7f00000000c0)="ec", 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x80000, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1m39.607366625s ago: executing program 5 (id=6636): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000006000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1m38.743331269s ago: executing program 5 (id=6649): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r4, 0xb701, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x6a, 0xa, 0xff00}, [@call={0xc}, @exit, @map_fd, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r6, 0x11, 0x0, 0x0, @void, @value}, 0x20) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe00181100", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r8) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x270000, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000000780)={'pim6reg0\x00', @random="7e0b01cbb324"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x17, 0x7, &(0x7f0000000840)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0xae}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000880)='GPL\x00', 0x128, 0x0, 0x0, 0x41100, 0x88, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0x10, 0x200}, 0x10, 0x0, r2, 0x2, 0x0, &(0x7f0000000d00)=[{0x3, 0x3, 0x2, 0x8}, {0x3, 0x2, 0xe, 0x7}], 0x10, 0x8, @void, @value}, 0x94) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="9feb0100180000000c000000060000000b0000000000000c03000000002e61302e0040d2747b352d7641598308c8da6f063e2db83e3d591e020e34e62f065b4e613dd74d9fbabd6b6fb4bb1245341577027261b4c853c51a952df1ec4b4a0642f49eb263932e63892ce3b73107c66b80e73650c3faf2d9f8fcb998fa3fca49ae32c86dc77096fa78233c6184f77a02e6718850cb0cf82d7f0c71f365b1017779319f23f065dd5217df1119ebc0b8678368fd763242bc11a404510000000000000000"], &(0x7f0000002340)=""/4096, 0x2a, 0x1000, 0x1, 0x3, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000008572800010000000"], &(0x7f0000000300)='GPL\x00', 0x7, 0x1000, &(0x7f0000001340)=""/4096, 0x0, 0x60, '\x00', r7, 0x19, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x4, 0x8, 0xffffff70}, 0x10, 0x25b5d, r3, 0x2, &(0x7f00000004c0)=[r0, r0, r1, r0, r0, r5, r3], &(0x7f0000000500)=[{0x5, 0x4, 0x5, 0x5}, {0x4, 0x4, 0x0, 0xa}], 0x10, 0xfff, @void, @value}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 1m36.949751467s ago: executing program 7 (id=6667): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x180a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000023b1f06bfd3e0000000000000000"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000d80)={0xffffffff, 0x0}, 0x8) r9 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c00000000000000", @ANYRES32, @ANYBLOB="000000000000b5cdb88686f57e80000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r9}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e40)={{r7, 0xffffffffffffffff}, &(0x7f0000000dc0), &(0x7f0000000e00)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x8, 0x43, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000ff030000000000000100000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008520000001000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES64=r5, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="00000000181100"/17, @ANYRES32=r7, @ANYBLOB="000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7020000ce090000000047e4cafa452e68d5a1f8cf5e4ae76d9460", @ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000580)='GPL\x00', 0x9, 0x74, &(0x7f0000000680)=""/116, 0x40f00, 0x9, '\x00', 0x0, @cgroup_skb, r7, 0x8, &(0x7f0000000d00)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000d40)={0x3, 0x8, 0x8ff2, 0xfffffffe}, 0x10, r8, 0xffffffffffffffff, 0x4, &(0x7f0000000e80)=[r9, r10, r7, r6], &(0x7f0000000ec0)=[{0x3, 0x3, 0x4, 0x4}, {0x2, 0x1, 0x2, 0x6}, {0x4, 0x1, 0xc, 0x4}, {0x2, 0x1, 0x4, 0x1}], 0x10, 0x5, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r11}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1m36.947730167s ago: executing program 9 (id=6668): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x4000}, 0x78) 1m36.918826928s ago: executing program 8 (id=6669): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000859000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) 1m36.7967619s ago: executing program 9 (id=6670): r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x7f, 0x10, 0x9, 0x0, 0x2353, 0x201a0, 0xe335f6f9e7a04a71, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1829, 0x4, @perf_config_ext={0x0, 0x100000000}, 0x245, 0xd6bb, 0x7, 0x7, 0x8, 0x5, 0x3, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2388a8"], 0xffdd) 1m36.697469401s ago: executing program 8 (id=6671): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1m36.450367245s ago: executing program 9 (id=6672): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r2, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r3}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000006000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1m35.807917915s ago: executing program 8 (id=6673): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r0, &(0x7f00000000c0)="ec", 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYRES32, @ANYRES16=r1, @ANYRES8=r2, @ANYRES16=r0, @ANYBLOB="712fe6ef50c67642d7839f552eb15f341e85f98e24abf4021f65ab181c4ce2e0858af7feecb4a67eb032005c283901e6f569e846b4c897d3cd5050de7179c67b87b36b5e9845a46c46c1bb5edb7070493ce06915a377ea4d5edd56fd3629df251c924dde5427b91346e378fac28d53ffe0923b581b69aea47d33be0314a889f242297085a0a4ad6f496130993eac92fbfe8c5b9d674bfc9133c188429e00011015f51410c01239010a75aef183d6a64c1632a5545baa", @ANYRES32=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000380)='fib6_table_lookup\x00'}, 0x18) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a, 0x0, @perf_config_ext={0x9}, 0x104002, 0xab23, 0x0, 0x0, 0x6f00000000000, 0xffffffff, 0x0, 0x0, 0xffffbffe, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000100000000000000000040000000004900540da02b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7000000, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) 1m35.757439546s ago: executing program 5 (id=6674): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000006000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1m35.756996706s ago: executing program 7 (id=6675): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071108e00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1m35.744964636s ago: executing program 7 (id=6676): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0xda, 0x0, &(0x7f00000004c0)="b9180bb7600a070c009e40f086dd1fff310005e03300fd010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7473be0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea033c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 1m35.729191126s ago: executing program 7 (id=6677): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000500000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000300)='cpu.pressure\x00', 0x2, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRESHEX=r4, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="18000072356000000000000000000000000000181100", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000400), 0x8) close(r8) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000009c0)={r8, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x2a979d) 1m35.582720759s ago: executing program 8 (id=6678): bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000007000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={r1, r2, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x9, 0xa, 0xa, 0x7, 0x0, 0x5, 0x50001, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_bp={&(0x7f0000000180), 0x4}, 0x10, 0x0, 0xffff691a, 0x3, 0x100, 0x67e, 0x2, 0x0, 0xc0, 0x0, 0x5}, r1, 0xb, r0, 0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x3c56, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000640), 0xffffffff, r4}, 0x38) 1m35.556979619s ago: executing program 9 (id=6679): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) gettid() bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={0xffffffffffffffff}, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x40, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x0, 0x0}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c23003f) write$cgroup_type(r4, &(0x7f0000000080), 0x9) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 1m35.396131322s ago: executing program 9 (id=6680): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000008000000000000004c600200018200000", @ANYRES32, @ANYBLOB="000000000000000295000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0xfdeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r3 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38, 0x4004001}, 0x4) r4 = syz_clone(0x4001100, &(0x7f0000000200)="b5828c828f342d59d7734dcf1c6e2728ac623b544ed52051923fd730fd7a0aa70375edc40d594354f70483e4edbd88ca745a92aa9fe58a55ec7129ccfe794372e75fcdcdadd66d941276ecf77becff90970cf08d0dd9f17ed19aab15847f73d683140751733acb16f06ac358b05255efa85e9336cbfbce238b5435466c47d5992596d377ef688ad99a4fdf8b9e99c1a30ef559c38322a46e94accb49e33025e93a9480b0c0bfe098eb6200665fabb3cbff7c2f095dede8a5f858af7b3c0940032cd4ab84eb154ed0477cb15c44a435f091c5445580ab5ff21a9d7ccf8b", 0xdd, 0x0, &(0x7f0000000340), &(0x7f0000000380)) r5 = gettid() sendmsg$unix(r1, &(0x7f0000000440)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2cde96c1e99637d53519bcee4defa5a6529c93912613068efd06fc42714e030cc1308d74a89a93c9b5b14d8ea6d13d700e0089b84f83fad416fc6d1a78095f46e3a0f9a82e8bd82dc0abe83e3402eb0dc00c9ec7120777cf65a50ddca6d7b4ce704c183788348626336ef5afcc8aec54c8f864327e5c7d657872583744044c10dbdef452e82baa7080a4eb7f78189e140f13b7f61c339ae3a423ec31d1366abd4151be461f96c14b3d77a0cb3af95465c6acfa5e5316771275ec001a2d5d917df7b70fa0ae948a76cbfada2047b82749aa597bab4d", 0xd5}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee00, 0xee00}}}], 0x78, 0x4000}, 0x20000010) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0x41}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11022, 0x0, 0x400}, 0x0, 0x0, r0, 0x0) 1m35.147280056s ago: executing program 7 (id=6682): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000002018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xec) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1m34.937388789s ago: executing program 7 (id=6683): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000800000400000850000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x2) 1m34.760410152s ago: executing program 37 (id=6683): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000800000400000850000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x2) 1m34.734933602s ago: executing program 5 (id=6684): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1m34.662739083s ago: executing program 8 (id=6685): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x6f, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000c50000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501783f73268f41, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x1, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000003c0)='kmem_cache_free\x00', r9}, 0x18) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, 0x0, 0xfdef) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={@cgroup=r6, 0x10, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0aff9500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffe76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x300, @void, @value}, 0x80) 1m34.586752045s ago: executing program 5 (id=6686): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='hrtimer_init\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1m34.586322835s ago: executing program 38 (id=6686): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='hrtimer_init\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1m34.528148436s ago: executing program 8 (id=6687): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0xea, 0x0, &(0x7f00000004c0)="b9180bb7600a070c009e40f086dd1fff310005e03300fd010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7473be0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea033c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 1m34.527816036s ago: executing program 39 (id=6687): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0xea, 0x0, &(0x7f00000004c0)="b9180bb7600a070c009e40f086dd1fff310005e03300fd010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7473be0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea033c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 1m34.482784046s ago: executing program 9 (id=6688): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0xfeffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1m34.482496326s ago: executing program 40 (id=6688): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0xfeffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 5.765767039s ago: executing program 3 (id=7553): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000040000000600", @ANYBLOB="0ba3d03c44aa6156d1e719a4dd12035394998f577ce62528bdcadbd7a291c28b777efdb3a8d0af06810a1f20a1ce60c871858d9acdbe768b3ed97c24985bebd4521c5c96585eafa68dbbe50de785610af83f86f7bec9f783064740f01341354565c6432423ebf2cfa3bf8afeaca242fba589f06a6071"], 0x48) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0aecffff03000000080f0000060000000000000071ef195a1133", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000fe8000007f"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 5.357464115s ago: executing program 3 (id=7557): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfc8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000f8ff840000007d00000095000000000000005eecf985b52b1f2ce279a37496b08e05dde9920597fd8ff893261fa61dbc27a2d49cd589c6e6636f0a99d73e31e41ce4b859e4429d53a4b83573447e7e48bb0175264a228a0def7eebef120f2d0844205e859fe331874ab1416c4ada2d95ae71b3100f22a71c566018d9b7cb8fe85357c210027af87da2c36f9988858fc1778203117aeeac008dca50e8d18ed813c670a866b5b27b6dfeec5d5e729274139c5741227882ba183e914392d34efc5d"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x1c10a1, 0x0, 0x28}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={r2, r4, 0x0, 0x0, 0x0}, 0x30) perf_event_open(0x0, r2, 0xb, r1, 0x3) syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/net\x00') r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x4004743d, 0x110e22fff6) close(r8) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) write$cgroup_type(r9, &(0x7f0000000280), 0x9) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.879261525s ago: executing program 0 (id=7588): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071108e00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x20, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 2.717351787s ago: executing program 0 (id=7590): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb3b140cc7a2a459, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000e961040000003a7f1a006600feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x7000000}, 0x4c) 2.507657511s ago: executing program 3 (id=7592): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 96) 2.049954078s ago: executing program 2 (id=7595): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000008000000000000004c600200018200000", @ANYRES32, @ANYBLOB="00f9ffffff00000095000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0xfdeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r3 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38, 0x4004001}, 0x4) r4 = syz_clone(0x4001100, &(0x7f0000000200)="b5828c828f342d59d7734dcf1c6e2728ac623b544ed52051923fd730fd7a0aa70375edc40d594354f70483e4edbd88ca745a92aa9fe58a55ec7129ccfe794372e75fcdcdadd66d941276ecf77becff90970cf08d0dd9f17ed19aab15847f73d683140751733acb16f06ac358b05255efa85e9336cbfbce238b5435466c47d5992596d377ef688ad99a4fdf8b9e99c1a30ef559c38322a46e94accb49e33025e93a9480b0c0bfe098eb6200665fabb3cbff7c2f095dede8a5f858af7b3c0940032cd4ab84eb154ed0477cb15c44a435f091c5445580ab5ff21a9d7ccf8b", 0xdd, 0x0, &(0x7f0000000340), &(0x7f0000000380)) r5 = gettid() sendmsg$unix(r1, &(0x7f0000000440)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2cde96c1e99637d53519bcee4defa5a6529c93912613068efd06fc42714e030cc1308d74a89a93c9b5b14d8ea6d13d700e0089b84f83fad416fc6d1a78095f46e3a0f9a82e8bd82dc0abe83e3402eb0dc00c9ec7120777cf65a50ddca6d7b4ce704c183788348626336ef5afcc8aec54c8f864327e5c7d657872583744044c10dbdef452e82baa7080a4eb7f78189e140f13b7f61c339ae3a423ec31d1366abd4151be461f96c14b3d77a0cb3af95465c6acfa5e5316771275ec001a2d5d917df7b70fa0ae948a76cbfada2047b82749aa597bab4d", 0xd5}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee00, 0xee00}}}], 0x78, 0x4000}, 0x20000010) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0x41}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11022, 0x0, 0x400}, 0x0, 0x0, r0, 0x0) 2.021214198s ago: executing program 3 (id=7597): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1e, 0x8, 0x8, 0x6, 0x21058, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0x45, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x7ffffffd, 0x8, 0x4, 0x2040, r0, 0xfa7ffffc, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4, 0x6, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xffc0) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="210000000001000069d500000300000040800000", @ANYRES32=r1, @ANYBLOB="09000000000000000000005b458945707a2dd8cdd9120d44000004000000000000d5405ab694d91da3b65abd33612b5d6251aec7bf8e89a8abd30c00000000000000da7eb56b4af6f578c8", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000030000000400"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0xc8, 0x5, 0x0, 0x9, 0x0, 0xa86, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5, 0x0, 0x0, @void, @value}, 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xaac, 0xffffffff, 0x2, 0x1, r7, 0x4, '\x00', r8, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0x9, @void, @value, @void, @value}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000300)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000a300000015000000181100003ff16214b1aa9d9e68cecbe4e648c6f5fc66cbaff4e23726daef9747d3f37177e4a4cd748727d0809363ca0ab24fb251ed", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa32"], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r1}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) 2.013300749s ago: executing program 1 (id=7598): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00000000000000000000000006000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.781491642s ago: executing program 0 (id=7599): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000006000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.762564352s ago: executing program 2 (id=7600): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0xc8, 0x0, 0x2, 0x8000000000000000, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0xa, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000d0ff0000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0}, &(0x7f0000000400), &(0x7f0000000500)=r1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 1.684315204s ago: executing program 6 (id=7601): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xffffff1f}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [], {{0x5, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x1010000}, 0x94) 1.618882264s ago: executing program 2 (id=7602): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000040002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0xc8, 0x2c, 0x0, 0x0, 0x5, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000ffe000000000ac1414aa"], 0xfdef) 1.599076395s ago: executing program 6 (id=7603): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0xe6, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), 0x0, 0x0, 0x43, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x514, 0x266}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="61158800000000006113500000000000bfa000000000000007000000ee0016055e0301c10000000064050000000000006916340000000000bf07000000000000260507000fff07206706000020000000470600000ee60060bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05002000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ace0600006e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc0da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d00c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e2738270001562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000815266b2c9e1bfadc7498e9dda5d000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631822a11dc3c693962895496d4f6e9cc54db6c7205a6b26f92121ef53e553acdf42068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710eec53f1b11cced7bc3c8da0c44d2fbf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f8709d87b27f8a5d9121fdc058447b728f134f72062fc4b1ca0780b1a7af137ff7b4ff139604faf0453b65586f65c7943d56b52f06c870edf0c5d744b5272b44c23480b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca871073f6bd61940aabc86b94f8cbde4d47060400e722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d154672fea96aedf346279ec00000000000000000000d535d41b0067f01e2e54b9154d876020b669640ead4ca44631fadf7c4ac39a1b331dbdcd52b36df021b731ef1f92330d347f88ced5c1aaadbcdd8d2257e3a9a7c7494fadf9be36f7a2334ee6e9446fa1fd486f85d672a77dc5bd21463994d49f12016305a1e394d292b66840fe32b40ad665d241a8b8a32b3100450c32832789aa8a096f41201b585cd76631c88cf958e9e9047f5af1730c5e83db12460a0768fd4b62be6c41eed307048bac8d1f7f164574241e06027654b248dcc38749eee0c1ee7c61b3f6411a559c3d45637b11e440ed5a99109b8e71d28c3d677af5f0499c6d3fc6a129775056958c9df824ebe5fa9fb306b24a8a8334910627d03efe69d4b61c4345f048c5da8aca16cea848fa77d2507c920a6bd654b00e07789382ed902c80deeff2fd5c78f42e4353e5360c3e55962efd1331e6736eaf4ee27736fa54803ee8ec1a15266ffcd8b30368740b584c2559e691e542cab3d49db327db62328f159d1e0900b3e23e84dedcd1377aa15dbeab7db181bd66980c3557c7d9f7377fcb6023accb5c368a121acf70e5f4c3f2a0ea07011c7149ea979cab2ee65cf7ffa29152b7a8fed89575e6e6fd77d4d9463d21775abac886ee6a1f2d7d8523840438a73d6307a87e2f525867fc3af7ab74520a773ae26bae74cdd405a211e8833e1ba523cde51d04a7ca6732"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.537526296s ago: executing program 2 (id=7604): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', r0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.393797058s ago: executing program 6 (id=7605): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x101140, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x94, 0x0, 0x9, 0x1}, {0x3, 0x3, 0x8, 0x8}, {0xd9a, 0xb, 0x9, 0x9}]}) 1.363334689s ago: executing program 2 (id=7606): bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b70500000000e000720a23fe000000008500000012000000b70000000000000095000000000000004e6258941c823b7505608556ba4ababb42684e890d31ae450400373a0a5447a801b8c1c4f0c4bd97c6555e61345400f9bd32abeb9ade0105000000000000a21902ff07000094a2b51c21df74924f5436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca201000000bebbe8282f8b1e26407437a397bf8f50e87ed4d27adfd876bffc402887781979461c4363bc5c9b6202ea471428197ef88bc333fbcec0ea4334f1ddb9d679ae95a90fd41d528f58d305000000435883df6c10ce86188c92292b2d0226082960be682836bdff8b0971f2a5405e453228e7b1005bd73479358a90df3e481947de6453736aa572158af6ea63d6d418fbbd2bba050000001da000ef78df03000000d19913a5fb03c79dac2e489f68127892658115e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517000026637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024dbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6aba0fa978f41eb1d4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb80ee202222c03fa84ccc374e717f694018630366397266090a82343aedfbf7afe892390c2eb775b0d16073da2229958db05de7df6ab7600004000010000006d8081cb3bf251d906c00da0e23b50465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa461fc54401a76406db718d4efd6c1bd10ce1d087cf9bba461162555a95524c84df0952d32093082b7aa71304e0d2d9ec310d1b676b378a5879e47941de1a28c3a8f400000000000000000e032b7d2badd0bc6617a859b7ac273b6304555f664469cec152030f06cc0ca1765838eb5590264736fbccfc3a8f4e3b10daf6a275daf5db2dac7096fe8ac8876acaad043663b3b0fedb05e6d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e8807107f79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249f36329a6526b354b6e674b08f7ef492b804c4b08fb10de807d79fd782027318cd7632e22d2faa16209272b39b5ec8d239832ea02cc88e249a2e77753a58987547571fbc8de747faab724bebb6401412b496e078fcb6c78ab447e871b76a8b0506f49594aa1d610567e14d739a60ff3ce04d0d2e5681e787c7e1ad25467bb81f2f440128207fe07a83759ec30cf9e0a3fd3f2fcee97fe8d273f8e712a8a64eaf2d89a1fa44554357fcd7ab531ff7a41c27164fca430a62d015b477de61853f5ee2e25b00a63642ec32ece2ff3bb5883deb895f52a923b5c744d8dccdd6a09ded8b90f1eeda8e6e884a4f090edb6ab9fc8107846508d51f3735493d5860cf80200ce31b92eb3563d485b5a7d192092d7a9fd2bc67d305d1d4573aad5f6501d1cd27657ce17330402dacb78d72d776330711645eed7d4c292f4448733c0826c4eb950f3d40453f82d7f792d106518f6bde874aff9e2bea7d73f74bebeeacfc700000000000000000000d40d73be47803297db004264c8c70b7761b22a7114a078a87d63d63b0c9dcc263a5b773bfeba212abef4181ad9e4872e328c0f105d51e3d167a2b717051d7681ba04552eeba18a000000b22b50d76d85040c9000ea68a528049a60d5e26b20455194f4be3b8466fd66d0e6cefcff7891c485d61cb66f4076cd60a22733cb00cf7cc1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000d0ff00000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={r1, r2, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x9, 0xa, 0xa, 0x7, 0x0, 0x5, 0x50001, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_bp={&(0x7f0000000180), 0x4}, 0x10, 0x0, 0xffff691a, 0x3, 0x100, 0x67e, 0x2, 0x0, 0xc0, 0x0, 0x5}, r1, 0xb, r0, 0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x3c56, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000640), 0xffffffff, r4}, 0x38) 1.27397123s ago: executing program 6 (id=7607): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000740)=ANY=[@ANYBLOB="050000000000000071117b00000000008510000002000000850000000000000095000000000000049500a505000000008ec6abbd2a76c539aa5f75a45d8ac235d748c748684df374aac9c79fffbc30eec0b5e0e52004876534c533"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x2000, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 1.205487331s ago: executing program 6 (id=7608): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.109132153s ago: executing program 3 (id=7609): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r4}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000000000085000000a500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r5, 0x8982, 0x20000500) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000030d03000000000000000000000110000000800000000000000000000003000000000100000002"], 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="1e00004000120000005000002df0acd92e93529179c14230e8269e17d57a82f7df69650ec6c8111e5d20aef880d5d7f2d1cd6fe47bc02e5b08c98b35ca8c9a7964f45f0b427fa1aebf962f2796454c84b41061a29aadd10286941db10bc21cbaf827e43bffb5c0ab13370eb4651e2a00fbcf22fd9b782c4f60eb0b195e520ec1dc55fcc4efe28ba2989037f0f945842c9d0cd5df95c4664ae9617698b6937b0cae46b03053870cd4aa3b4cbc94512c42676ce8f32df2e6302789e65857eb95fd342af4badef2d75c11a3ef2fa2011285e4ec24c0815cd105e289df7418d4a342fdcc42", @ANYRES64], 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) 1.105489683s ago: executing program 1 (id=7610): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8b", 0x7}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfe3a) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000280)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x9, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=r7, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d80)={&(0x7f0000000d40)='mmap_lock_acquire_returned\x00', r10}, 0x10) 796.640997ms ago: executing program 0 (id=7611): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="050000010000008000"/18, @ANYRES64, @ANYRES64, @ANYRES32, @ANYRESHEX], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r0, &(0x7f00000000c0)="ec", 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x80000, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 597.648491ms ago: executing program 0 (id=7612): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) (async) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNGETVNETLE(r4, 0x4010744d, &(0x7f0000000180)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) 518.878782ms ago: executing program 1 (id=7613): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffeb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 430.945894ms ago: executing program 1 (id=7614): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071108e00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x300, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 354.104325ms ago: executing program 2 (id=7615): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000040000000600", @ANYBLOB="0ba3d03c44aa6156d1e719a4dd12035394998f577ce62528bdcadbd7a291c28b777efdb3a8d0af06810a1f20a1ce60c871858d9acdbe768b3ed97c24985bebd4521c5c96585eafa68dbbe50de785610af83f86f7bec9f783064740f01341354565c6432423ebf2cfa3bf8afeaca242fba589f06a6071"], 0x48) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000002040000000000007f"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 352.062385ms ago: executing program 1 (id=7616): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x2b, &(0x7f00000002c0)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xfe, 0xffffffffffffffc6, &(0x7f0000000100)="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", 0x0, 0x6, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x3}, 0x50) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x6, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4) close(r1) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000180)=r12, 0x4) 334.335635ms ago: executing program 0 (id=7617): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000006000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000700000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 268.166756ms ago: executing program 6 (id=7618): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000006000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 45.9878ms ago: executing program 1 (id=7619): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) gettid() bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001080)={{r4}, &(0x7f0000001000), &(0x7f0000001040)}, 0x20) gettid() openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x40, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c23003f) write$cgroup_type(r6, 0x0, 0x0) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 0s ago: executing program 3 (id=7620): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00000000000000000000000006000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x1, 0x3, 0x3, 0x1, 0x18, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x4b, 0x8f, &(0x7f0000000140)=""/143, 0x41100, 0x26, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x8, 0x4ab, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) kernel console output (not intermixed with test programs): 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 637.029113][T16701] RSP: 002b:00007f0c5d559fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 637.037361][T16701] RAX: ffffffffffffffda RBX: 00007f0c5f108fa0 RCX: 00007f0c5eef0169 [ 637.045173][T16701] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 637.052989][T16701] RBP: 00007f0c5d55a090 R08: 0000000000000000 R09: 0000000000000000 [ 637.060795][T16701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 637.068605][T16701] R13: 0000000000000000 R14: 00007f0c5f108fa0 R15: 00007ffc94a2bd78 [ 637.076420][T16701] [ 638.331593][T16765] syz.5.5523[16765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.331676][T16765] syz.5.5523[16765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.172382][T16798] device syzkaller0 entered promiscuous mode [ 639.623644][T16823] device syzkaller0 entered promiscuous mode [ 640.577772][T16862] syz.6.5560 (16862) used greatest stack depth: 19224 bytes left [ 640.744698][T16885] FAULT_INJECTION: forcing a failure. [ 640.744698][T16885] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 640.825824][T16885] CPU: 1 PID: 16885 Comm: syz.9.5569 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 640.835650][T16885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 640.845546][T16885] Call Trace: [ 640.848668][T16885] [ 640.851449][T16885] dump_stack_lvl+0x151/0x1c0 [ 640.855965][T16885] ? io_uring_drop_tctx_refs+0x190/0x190 [ 640.861434][T16885] dump_stack+0x15/0x20 [ 640.865420][T16885] should_fail+0x3c6/0x510 [ 640.869675][T16885] should_fail_alloc_page+0x5a/0x80 [ 640.874710][T16885] prepare_alloc_pages+0x15c/0x700 [ 640.879656][T16885] ? __alloc_pages+0x8f0/0x8f0 [ 640.884344][T16885] ? __alloc_pages_bulk+0xd80/0xd80 [ 640.889378][T16885] __alloc_pages+0x18c/0x8f0 [ 640.893801][T16885] ? prep_new_page+0x110/0x110 [ 640.898406][T16885] ? 0xffffffffa0028000 [ 640.902391][T16885] ? is_bpf_text_address+0x172/0x190 [ 640.907518][T16885] pte_alloc_one+0x73/0x1b0 [ 640.911852][T16885] ? pfn_modify_allowed+0x2f0/0x2f0 [ 640.916907][T16885] ? arch_stack_walk+0xf3/0x140 [ 640.921577][T16885] __pte_alloc+0x86/0x350 [ 640.925740][T16885] ? free_pgtables+0x280/0x280 [ 640.930342][T16885] ? _raw_spin_lock+0xa4/0x1b0 [ 640.934943][T16885] ? __kasan_check_write+0x14/0x20 [ 640.939889][T16885] copy_page_range+0x2743/0x2e20 [ 640.944675][T16885] ? pfn_valid+0x1e0/0x1e0 [ 640.948914][T16885] ? vma_interval_tree_augment_rotate+0x1a3/0x1d0 [ 640.955172][T16885] copy_mm+0xc7e/0x13e0 [ 640.959159][T16885] ? copy_signal+0x610/0x610 [ 640.963579][T16885] ? __init_rwsem+0xfe/0x1d0 [ 640.968007][T16885] ? copy_signal+0x4e3/0x610 [ 640.972437][T16885] copy_process+0x1149/0x3290 [ 640.976945][T16885] ? __kasan_check_write+0x14/0x20 [ 640.981897][T16885] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 640.986840][T16885] ? vfs_write+0x94d/0x1110 [ 640.991181][T16885] kernel_clone+0x21e/0x9e0 [ 640.995516][T16885] ? __kasan_check_write+0x14/0x20 [ 641.000463][T16885] ? create_io_thread+0x1e0/0x1e0 [ 641.005327][T16885] __x64_sys_clone+0x23f/0x290 [ 641.009925][T16885] ? __do_sys_vfork+0x130/0x130 [ 641.014614][T16885] ? debug_smp_processor_id+0x17/0x20 [ 641.019817][T16885] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 641.025722][T16885] ? exit_to_user_mode_prepare+0x39/0xa0 [ 641.031190][T16885] x64_sys_call+0x1b0/0x9a0 [ 641.035539][T16885] do_syscall_64+0x3b/0xb0 [ 641.039785][T16885] ? clear_bhb_loop+0x35/0x90 [ 641.044299][T16885] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 641.050023][T16885] RIP: 0033:0x7faaa9c0b169 [ 641.054280][T16885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 641.073719][T16885] RSP: 002b:00007faaa8274fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 641.081960][T16885] RAX: ffffffffffffffda RBX: 00007faaa9e23fa0 RCX: 00007faaa9c0b169 [ 641.089772][T16885] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 641.097583][T16885] RBP: 00007faaa8275090 R08: 0000000000000000 R09: 0000000000000000 [ 641.105395][T16885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 641.113210][T16885] R13: 0000000000000000 R14: 00007faaa9e23fa0 R15: 00007ffd8d81a378 [ 641.121030][T16885] [ 641.404338][T16896] device syzkaller0 entered promiscuous mode [ 643.200938][T16992] device syzkaller0 entered promiscuous mode [ 645.262314][T17057] FAULT_INJECTION: forcing a failure. [ 645.262314][T17057] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 645.340231][T17057] CPU: 1 PID: 17057 Comm: syz.8.5629 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 645.350050][T17057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 645.359947][T17057] Call Trace: [ 645.363066][T17057] [ 645.365848][T17057] dump_stack_lvl+0x151/0x1c0 [ 645.370365][T17057] ? io_uring_drop_tctx_refs+0x190/0x190 [ 645.375832][T17057] dump_stack+0x15/0x20 [ 645.379818][T17057] should_fail+0x3c6/0x510 [ 645.384069][T17057] should_fail_alloc_page+0x5a/0x80 [ 645.389105][T17057] prepare_alloc_pages+0x15c/0x700 [ 645.394059][T17057] ? __alloc_pages_bulk+0xd80/0xd80 [ 645.399086][T17057] __alloc_pages+0x18c/0x8f0 [ 645.403524][T17057] ? prep_new_page+0x110/0x110 [ 645.408108][T17057] ? __alloc_pages+0x27e/0x8f0 [ 645.412709][T17057] ? __kasan_check_write+0x14/0x20 [ 645.417655][T17057] ? _raw_spin_lock+0xa4/0x1b0 [ 645.422259][T17057] pte_alloc_one+0x73/0x1b0 [ 645.426595][T17057] ? pfn_modify_allowed+0x2f0/0x2f0 [ 645.431629][T17057] ? __pmd_alloc+0x48d/0x550 [ 645.436056][T17057] __pte_alloc+0x86/0x350 [ 645.440221][T17057] ? __pud_alloc+0x260/0x260 [ 645.444647][T17057] ? __pud_alloc+0x213/0x260 [ 645.449075][T17057] ? free_pgtables+0x280/0x280 [ 645.453682][T17057] ? do_handle_mm_fault+0x2400/0x2400 [ 645.458881][T17057] ? __stack_depot_save+0x34/0x470 [ 645.463831][T17057] ? anon_vma_clone+0x9a/0x500 [ 645.468436][T17057] copy_page_range+0x2743/0x2e20 [ 645.473204][T17057] ? __kasan_slab_alloc+0xb1/0xe0 [ 645.478064][T17057] ? x64_sys_call+0x1b0/0x9a0 [ 645.482574][T17057] ? do_syscall_64+0x3b/0xb0 [ 645.487011][T17057] ? pfn_valid+0x1e0/0x1e0 [ 645.491255][T17057] ? rwsem_write_trylock+0x153/0x340 [ 645.496380][T17057] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0 [ 645.502625][T17057] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 645.508179][T17057] ? __rb_insert_augmented+0x5de/0x610 [ 645.513496][T17057] copy_mm+0xc7e/0x13e0 [ 645.517480][T17057] ? copy_signal+0x610/0x610 [ 645.521896][T17057] ? __init_rwsem+0xfe/0x1d0 [ 645.526322][T17057] ? copy_signal+0x4e3/0x610 [ 645.530747][T17057] copy_process+0x1149/0x3290 [ 645.535262][T17057] ? __kasan_check_write+0x14/0x20 [ 645.540214][T17057] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 645.545152][T17057] ? vfs_write+0x94d/0x1110 [ 645.549498][T17057] kernel_clone+0x21e/0x9e0 [ 645.553834][T17057] ? __kasan_check_write+0x14/0x20 [ 645.558779][T17057] ? create_io_thread+0x1e0/0x1e0 [ 645.563645][T17057] __x64_sys_clone+0x23f/0x290 [ 645.568243][T17057] ? __do_sys_vfork+0x130/0x130 [ 645.572927][T17057] ? debug_smp_processor_id+0x17/0x20 [ 645.578136][T17057] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 645.584036][T17057] ? exit_to_user_mode_prepare+0x39/0xa0 [ 645.589503][T17057] x64_sys_call+0x1b0/0x9a0 [ 645.593842][T17057] do_syscall_64+0x3b/0xb0 [ 645.598109][T17057] ? clear_bhb_loop+0x35/0x90 [ 645.602609][T17057] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 645.608337][T17057] RIP: 0033:0x7f59cec71169 [ 645.612592][T17057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 645.632043][T17057] RSP: 002b:00007f59cd2dafe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 645.640278][T17057] RAX: ffffffffffffffda RBX: 00007f59cee89fa0 RCX: 00007f59cec71169 [ 645.648203][T17057] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 645.656006][T17057] RBP: 00007f59cd2db090 R08: 0000000000000000 R09: 0000000000000000 [ 645.663813][T17057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 645.671628][T17057] R13: 0000000000000000 R14: 00007f59cee89fa0 R15: 00007ffdb0dcdc08 [ 645.679444][T17057] [ 654.484232][T17174] FAULT_INJECTION: forcing a failure. [ 654.484232][T17174] name failslab, interval 1, probability 0, space 0, times 0 [ 654.533416][T17174] CPU: 1 PID: 17174 Comm: syz.7.5671 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 654.543245][T17174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 654.553135][T17174] Call Trace: [ 654.556259][T17174] [ 654.559041][T17174] dump_stack_lvl+0x151/0x1c0 [ 654.563547][T17174] ? io_uring_drop_tctx_refs+0x190/0x190 [ 654.569017][T17174] dump_stack+0x15/0x20 [ 654.573008][T17174] should_fail+0x3c6/0x510 [ 654.577261][T17174] __should_failslab+0xa4/0xe0 [ 654.581862][T17174] ? vm_area_dup+0x26/0x230 [ 654.586199][T17174] should_failslab+0x9/0x20 [ 654.590542][T17174] slab_pre_alloc_hook+0x37/0xd0 [ 654.595313][T17174] ? vm_area_dup+0x26/0x230 [ 654.599651][T17174] kmem_cache_alloc+0x44/0x250 [ 654.604260][T17174] vm_area_dup+0x26/0x230 [ 654.608557][T17174] copy_mm+0x9a1/0x13e0 [ 654.612545][T17174] ? copy_signal+0x610/0x610 [ 654.616969][T17174] ? __init_rwsem+0xfe/0x1d0 [ 654.621396][T17174] ? copy_signal+0x4e3/0x610 [ 654.625820][T17174] copy_process+0x1149/0x3290 [ 654.630334][T17174] ? __kasan_check_write+0x14/0x20 [ 654.635283][T17174] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 654.640225][T17174] ? __kasan_check_write+0x14/0x20 [ 654.645172][T17174] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 654.650467][T17174] kernel_clone+0x21e/0x9e0 [ 654.654809][T17174] ? create_io_thread+0x1e0/0x1e0 [ 654.659671][T17174] __x64_sys_clone+0x23f/0x290 [ 654.664267][T17174] ? __do_sys_vfork+0x130/0x130 [ 654.669043][T17174] ? __bpf_trace_sys_enter+0x62/0x70 [ 654.674178][T17174] x64_sys_call+0x1b0/0x9a0 [ 654.678499][T17174] do_syscall_64+0x3b/0xb0 [ 654.682752][T17174] ? clear_bhb_loop+0x35/0x90 [ 654.687266][T17174] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 654.692994][T17174] RIP: 0033:0x7f0c5eef0169 [ 654.697248][T17174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 654.716699][T17174] RSP: 002b:00007f0c5d559fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 654.724934][T17174] RAX: ffffffffffffffda RBX: 00007f0c5f108fa0 RCX: 00007f0c5eef0169 [ 654.732745][T17174] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 654.740560][T17174] RBP: 00007f0c5d55a090 R08: 0000000000000000 R09: 0000000000000000 [ 654.748367][T17174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 654.756179][T17174] R13: 0000000000000000 R14: 00007f0c5f108fa0 R15: 00007ffc94a2bd78 [ 654.763998][T17174] [ 654.816588][T17178] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.824826][T17178] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.879270][T17179] device bridge_slave_1 left promiscuous mode [ 654.888594][T17179] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.901723][T17179] device bridge_slave_0 left promiscuous mode [ 654.909929][T17179] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.411187][T17346] syz.6.5733[17346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.411264][T17346] syz.6.5733[17346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 662.835808][T17380] device syzkaller0 entered promiscuous mode [ 664.071356][T17431] FAULT_INJECTION: forcing a failure. [ 664.071356][T17431] name failslab, interval 1, probability 0, space 0, times 0 [ 665.471400][T17431] CPU: 1 PID: 17431 Comm: syz.9.5764 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 665.481224][T17431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 665.491119][T17431] Call Trace: [ 665.494324][T17431] [ 665.497102][T17431] dump_stack_lvl+0x151/0x1c0 [ 665.501617][T17431] ? io_uring_drop_tctx_refs+0x190/0x190 [ 665.507085][T17431] dump_stack+0x15/0x20 [ 665.511083][T17431] should_fail+0x3c6/0x510 [ 665.515333][T17431] __should_failslab+0xa4/0xe0 [ 665.519934][T17431] ? vm_area_dup+0x26/0x230 [ 665.524277][T17431] should_failslab+0x9/0x20 [ 665.528615][T17431] slab_pre_alloc_hook+0x37/0xd0 [ 665.533387][T17431] ? vm_area_dup+0x26/0x230 [ 665.537729][T17431] kmem_cache_alloc+0x44/0x250 [ 665.542328][T17431] vm_area_dup+0x26/0x230 [ 665.546490][T17431] copy_mm+0x9a1/0x13e0 [ 665.550492][T17431] ? copy_signal+0x610/0x610 [ 665.554907][T17431] ? __init_rwsem+0xfe/0x1d0 [ 665.559333][T17431] ? copy_signal+0x4e3/0x610 [ 665.563770][T17431] copy_process+0x1149/0x3290 [ 665.568362][T17431] ? __kasan_check_write+0x14/0x20 [ 665.573316][T17431] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 665.578253][T17431] ? vfs_write+0x94d/0x1110 [ 665.582597][T17431] kernel_clone+0x21e/0x9e0 [ 665.586937][T17431] ? __kasan_check_write+0x14/0x20 [ 665.591881][T17431] ? create_io_thread+0x1e0/0x1e0 [ 665.596742][T17431] __x64_sys_clone+0x23f/0x290 [ 665.601344][T17431] ? __do_sys_vfork+0x130/0x130 [ 665.606035][T17431] ? debug_smp_processor_id+0x17/0x20 [ 665.611235][T17431] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 665.617146][T17431] ? exit_to_user_mode_prepare+0x39/0xa0 [ 665.622608][T17431] x64_sys_call+0x1b0/0x9a0 [ 665.626942][T17431] do_syscall_64+0x3b/0xb0 [ 665.631196][T17431] ? clear_bhb_loop+0x35/0x90 [ 665.635707][T17431] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 665.641438][T17431] RIP: 0033:0x7faaa9c0b169 [ 665.645690][T17431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 665.665130][T17431] RSP: 002b:00007faaa8274fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 665.673486][T17431] RAX: ffffffffffffffda RBX: 00007faaa9e23fa0 RCX: 00007faaa9c0b169 [ 665.681295][T17431] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 665.689108][T17431] RBP: 00007faaa8275090 R08: 0000000000000000 R09: 0000000000000000 [ 665.696917][T17431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 665.704739][T17431] R13: 0000000000000000 R14: 00007faaa9e23fa0 R15: 00007ffd8d81a378 [ 665.712546][T17431] [ 667.408296][T17491] syz.5.5783[17491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.408395][T17491] syz.5.5783[17491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.990684][T17504] device syzkaller0 entered promiscuous mode [ 669.442830][T17538] FAULT_INJECTION: forcing a failure. [ 669.442830][T17538] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 669.554773][T17538] CPU: 0 PID: 17538 Comm: syz.5.5798 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 669.564601][T17538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 669.574494][T17538] Call Trace: [ 669.577621][T17538] [ 669.580395][T17538] dump_stack_lvl+0x151/0x1c0 [ 669.584907][T17538] ? io_uring_drop_tctx_refs+0x190/0x190 [ 669.590375][T17538] ? queue_stack_map_push_elem+0x570/0x570 [ 669.596018][T17538] dump_stack+0x15/0x20 [ 669.600007][T17538] should_fail+0x3c6/0x510 [ 669.604264][T17538] should_fail_alloc_page+0x5a/0x80 [ 669.609296][T17538] prepare_alloc_pages+0x15c/0x700 [ 669.614258][T17538] ? __alloc_pages_bulk+0xd80/0xd80 [ 669.619282][T17538] __alloc_pages+0x18c/0x8f0 [ 669.623701][T17538] ? prep_new_page+0x110/0x110 [ 669.628306][T17538] ? 0xffffffffa0028000 [ 669.632297][T17538] ? is_bpf_text_address+0x172/0x190 [ 669.637416][T17538] pte_alloc_one+0x73/0x1b0 [ 669.641758][T17538] ? pfn_modify_allowed+0x2f0/0x2f0 [ 669.646789][T17538] ? arch_stack_walk+0xf3/0x140 [ 669.651488][T17538] __pte_alloc+0x86/0x350 [ 669.655643][T17538] ? free_pgtables+0x280/0x280 [ 669.660241][T17538] ? _raw_spin_lock+0xa4/0x1b0 [ 669.664844][T17538] ? __kasan_check_write+0x14/0x20 [ 669.669794][T17538] copy_page_range+0x2743/0x2e20 [ 669.674579][T17538] ? pfn_valid+0x1e0/0x1e0 [ 669.678816][T17538] ? vma_gap_callbacks_rotate+0x1b7/0x210 [ 669.684374][T17538] ? __rb_insert_augmented+0x5de/0x610 [ 669.689670][T17538] copy_mm+0xc7e/0x13e0 [ 669.693667][T17538] ? copy_signal+0x610/0x610 [ 669.698088][T17538] ? __init_rwsem+0xfe/0x1d0 [ 669.702525][T17538] ? copy_signal+0x4e3/0x610 [ 669.706940][T17538] copy_process+0x1149/0x3290 [ 669.711457][T17538] ? __kasan_check_write+0x14/0x20 [ 669.716407][T17538] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 669.721345][T17538] ? vfs_write+0x94d/0x1110 [ 669.725689][T17538] kernel_clone+0x21e/0x9e0 [ 669.730027][T17538] ? __kasan_check_write+0x14/0x20 [ 669.734972][T17538] ? create_io_thread+0x1e0/0x1e0 [ 669.739838][T17538] __x64_sys_clone+0x23f/0x290 [ 669.744445][T17538] ? __do_sys_vfork+0x130/0x130 [ 669.749121][T17538] ? debug_smp_processor_id+0x17/0x20 [ 669.754326][T17538] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 669.760228][T17538] ? exit_to_user_mode_prepare+0x39/0xa0 [ 669.765699][T17538] x64_sys_call+0x1b0/0x9a0 [ 669.770039][T17538] do_syscall_64+0x3b/0xb0 [ 669.774291][T17538] ? clear_bhb_loop+0x35/0x90 [ 669.778804][T17538] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 669.784533][T17538] RIP: 0033:0x7fa0d87ee169 [ 669.788786][T17538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 669.808231][T17538] RSP: 002b:00007fa0d6e57fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 669.816472][T17538] RAX: ffffffffffffffda RBX: 00007fa0d8a06fa0 RCX: 00007fa0d87ee169 [ 669.824284][T17538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 669.832094][T17538] RBP: 00007fa0d6e58090 R08: 0000000000000000 R09: 0000000000000000 [ 669.839905][T17538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 669.847713][T17538] R13: 0000000000000000 R14: 00007fa0d8a06fa0 R15: 00007ffc2255c688 [ 669.855534][T17538] [ 673.087314][T17638] device syzkaller0 entered promiscuous mode [ 673.111260][T17642] FAULT_INJECTION: forcing a failure. [ 673.111260][T17642] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 673.159289][T17642] CPU: 1 PID: 17642 Comm: syz.6.5838 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 673.169113][T17642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 673.179128][T17642] Call Trace: [ 673.182249][T17642] [ 673.185026][T17642] dump_stack_lvl+0x151/0x1c0 [ 673.189539][T17642] ? io_uring_drop_tctx_refs+0x190/0x190 [ 673.195011][T17642] dump_stack+0x15/0x20 [ 673.199001][T17642] should_fail+0x3c6/0x510 [ 673.203250][T17642] should_fail_alloc_page+0x5a/0x80 [ 673.208285][T17642] prepare_alloc_pages+0x15c/0x700 [ 673.213233][T17642] ? __alloc_pages+0x8f0/0x8f0 [ 673.217840][T17642] ? __alloc_pages_bulk+0xd80/0xd80 [ 673.222878][T17642] __alloc_pages+0x18c/0x8f0 [ 673.227293][T17642] ? prep_new_page+0x110/0x110 [ 673.231905][T17642] ? __mod_node_page_state+0xac/0xf0 [ 673.237024][T17642] pte_alloc_one+0x73/0x1b0 [ 673.241362][T17642] ? pfn_modify_allowed+0x2f0/0x2f0 [ 673.246385][T17642] ? arch_stack_walk+0xf3/0x140 [ 673.251075][T17642] __pte_alloc+0x86/0x350 [ 673.255238][T17642] ? free_pgtables+0x280/0x280 [ 673.259838][T17642] ? _raw_spin_lock+0xa4/0x1b0 [ 673.264437][T17642] ? __kasan_check_write+0x14/0x20 [ 673.269385][T17642] copy_page_range+0x2743/0x2e20 [ 673.274257][T17642] ? pfn_valid+0x1e0/0x1e0 [ 673.278496][T17642] ? vma_gap_callbacks_rotate+0x1b7/0x210 [ 673.284053][T17642] ? __rb_insert_augmented+0x5de/0x610 [ 673.289352][T17642] copy_mm+0xc7e/0x13e0 [ 673.293342][T17642] ? copy_signal+0x610/0x610 [ 673.297770][T17642] ? __init_rwsem+0xfe/0x1d0 [ 673.302192][T17642] ? copy_signal+0x4e3/0x610 [ 673.306620][T17642] copy_process+0x1149/0x3290 [ 673.311374][T17642] ? __kasan_check_write+0x14/0x20 [ 673.316315][T17642] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 673.321257][T17642] ? vfs_write+0x94d/0x1110 [ 673.325601][T17642] kernel_clone+0x21e/0x9e0 [ 673.329940][T17642] ? __kasan_check_write+0x14/0x20 [ 673.334886][T17642] ? create_io_thread+0x1e0/0x1e0 [ 673.339749][T17642] __x64_sys_clone+0x23f/0x290 [ 673.344342][T17642] ? __do_sys_vfork+0x130/0x130 [ 673.349035][T17642] ? debug_smp_processor_id+0x17/0x20 [ 673.354244][T17642] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 673.360149][T17642] ? exit_to_user_mode_prepare+0x39/0xa0 [ 673.365611][T17642] x64_sys_call+0x1b0/0x9a0 [ 673.369951][T17642] do_syscall_64+0x3b/0xb0 [ 673.374201][T17642] ? clear_bhb_loop+0x35/0x90 [ 673.378716][T17642] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 673.384447][T17642] RIP: 0033:0x7f54bc96c169 [ 673.388698][T17642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 673.408139][T17642] RSP: 002b:00007f54bafd5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 673.416379][T17642] RAX: ffffffffffffffda RBX: 00007f54bcb84fa0 RCX: 00007f54bc96c169 [ 673.424193][T17642] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 673.432002][T17642] RBP: 00007f54bafd6090 R08: 0000000000000000 R09: 0000000000000000 [ 673.439816][T17642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 673.447629][T17642] R13: 0000000000000000 R14: 00007f54bcb84fa0 R15: 00007fff88cc0ff8 [ 673.455618][T17642] [ 673.690940][T17676] syz.7.5849[17676] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.692927][T17676] syz.7.5849[17676] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.125055][T17739] device syzkaller0 entered promiscuous mode [ 676.312312][T17776] syz.8.5885[17776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.312398][T17776] syz.8.5885[17776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.378447][T17771] device syzkaller0 entered promiscuous mode [ 676.584554][T17790] bond_slave_1: mtu less than device minimum [ 676.632338][T17794] syz.5.5891[17794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.632392][T17794] syz.5.5891[17794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.654199][T17794] syz.5.5891[17794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.657995][T17796] device syzkaller0 entered promiscuous mode [ 676.762837][T17794] syz.5.5891[17794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.408751][T17816] Â: renamed from pim6reg1 [ 681.641200][T17946] device syzkaller0 entered promiscuous mode [ 683.723166][T18006] Â: renamed from pim6reg1 [ 685.239751][T18039] device syzkaller0 entered promiscuous mode [ 685.701684][T18062] Â: renamed from pim6reg1 [ 687.324708][T18101] syz.7.5994[18101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.324814][T18101] syz.7.5994[18101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.245548][T18132] syz.6.6005[18132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.321369][T18132] syz.6.6005[18132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.894427][T18163] device veth0_vlan left promiscuous mode [ 689.064458][T18163] device veth0_vlan entered promiscuous mode [ 689.112754][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 689.130043][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 689.208039][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 689.823738][T18195] FAULT_INJECTION: forcing a failure. [ 689.823738][T18195] name failslab, interval 1, probability 0, space 0, times 0 [ 689.888494][T18195] CPU: 0 PID: 18195 Comm: syz.8.6028 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 689.898322][T18195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 689.908217][T18195] Call Trace: [ 689.911338][T18195] [ 689.914115][T18195] dump_stack_lvl+0x151/0x1c0 [ 689.918627][T18195] ? io_uring_drop_tctx_refs+0x190/0x190 [ 689.924098][T18195] dump_stack+0x15/0x20 [ 689.928088][T18195] should_fail+0x3c6/0x510 [ 689.932343][T18195] __should_failslab+0xa4/0xe0 [ 689.936946][T18195] ? vm_area_dup+0x26/0x230 [ 689.941289][T18195] should_failslab+0x9/0x20 [ 689.945620][T18195] slab_pre_alloc_hook+0x37/0xd0 [ 689.950394][T18195] ? vm_area_dup+0x26/0x230 [ 689.954732][T18195] kmem_cache_alloc+0x44/0x250 [ 689.959344][T18195] vm_area_dup+0x26/0x230 [ 689.963499][T18195] copy_mm+0x9a1/0x13e0 [ 689.967496][T18195] ? copy_signal+0x610/0x610 [ 689.971919][T18195] ? __init_rwsem+0xfe/0x1d0 [ 689.976344][T18195] ? copy_signal+0x4e3/0x610 [ 689.980773][T18195] copy_process+0x1149/0x3290 [ 689.985285][T18195] ? __kasan_check_write+0x14/0x20 [ 689.990352][T18195] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 689.995291][T18195] ? vfs_write+0x94d/0x1110 [ 689.999636][T18195] kernel_clone+0x21e/0x9e0 [ 690.003970][T18195] ? __kasan_check_write+0x14/0x20 [ 690.008918][T18195] ? create_io_thread+0x1e0/0x1e0 [ 690.013780][T18195] __x64_sys_clone+0x23f/0x290 [ 690.018378][T18195] ? __do_sys_vfork+0x130/0x130 [ 690.023066][T18195] ? debug_smp_processor_id+0x17/0x20 [ 690.028275][T18195] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 690.034179][T18195] ? exit_to_user_mode_prepare+0x39/0xa0 [ 690.039647][T18195] x64_sys_call+0x1b0/0x9a0 [ 690.043984][T18195] do_syscall_64+0x3b/0xb0 [ 690.048236][T18195] ? clear_bhb_loop+0x35/0x90 [ 690.052747][T18195] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 690.058477][T18195] RIP: 0033:0x7f59cec71169 [ 690.062850][T18195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 690.082289][T18195] RSP: 002b:00007f59cd2dafe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 690.090533][T18195] RAX: ffffffffffffffda RBX: 00007f59cee89fa0 RCX: 00007f59cec71169 [ 690.098343][T18195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 690.106155][T18195] RBP: 00007f59cd2db090 R08: 0000000000000000 R09: 0000000000000000 [ 690.113968][T18195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 690.121782][T18195] R13: 0000000000000000 R14: 00007f59cee89fa0 R15: 00007ffdb0dcdc08 [ 690.129599][T18195] [ 692.628329][T18284] device veth1_macvtap left promiscuous mode [ 693.559604][T18325] syz.9.6073[18325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.559679][T18325] syz.9.6073[18325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.630996][T18372] FAULT_INJECTION: forcing a failure. [ 694.630996][T18372] name failslab, interval 1, probability 0, space 0, times 0 [ 694.789391][T18372] CPU: 1 PID: 18372 Comm: syz.6.6094 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 694.799220][T18372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 694.809108][T18372] Call Trace: [ 694.812233][T18372] [ 694.815010][T18372] dump_stack_lvl+0x151/0x1c0 [ 694.819528][T18372] ? io_uring_drop_tctx_refs+0x190/0x190 [ 694.824994][T18372] dump_stack+0x15/0x20 [ 694.828982][T18372] should_fail+0x3c6/0x510 [ 694.833242][T18372] __should_failslab+0xa4/0xe0 [ 694.837836][T18372] ? vm_area_dup+0x26/0x230 [ 694.842176][T18372] should_failslab+0x9/0x20 [ 694.846515][T18372] slab_pre_alloc_hook+0x37/0xd0 [ 694.851290][T18372] ? vm_area_dup+0x26/0x230 [ 694.855630][T18372] kmem_cache_alloc+0x44/0x250 [ 694.860231][T18372] vm_area_dup+0x26/0x230 [ 694.864398][T18372] copy_mm+0x9a1/0x13e0 [ 694.868395][T18372] ? copy_signal+0x610/0x610 [ 694.872817][T18372] ? __init_rwsem+0xfe/0x1d0 [ 694.877241][T18372] ? copy_signal+0x4e3/0x610 [ 694.881668][T18372] copy_process+0x1149/0x3290 [ 694.886184][T18372] ? __kasan_check_write+0x14/0x20 [ 694.891134][T18372] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 694.896074][T18372] ? vfs_write+0x94d/0x1110 [ 694.900423][T18372] kernel_clone+0x21e/0x9e0 [ 694.904756][T18372] ? __kasan_check_write+0x14/0x20 [ 694.909720][T18372] ? create_io_thread+0x1e0/0x1e0 [ 694.914568][T18372] __x64_sys_clone+0x23f/0x290 [ 694.919170][T18372] ? __do_sys_vfork+0x130/0x130 [ 694.923850][T18372] ? debug_smp_processor_id+0x17/0x20 [ 694.929052][T18372] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 694.934977][T18372] ? exit_to_user_mode_prepare+0x39/0xa0 [ 694.940427][T18372] x64_sys_call+0x1b0/0x9a0 [ 694.944764][T18372] do_syscall_64+0x3b/0xb0 [ 694.949021][T18372] ? clear_bhb_loop+0x35/0x90 [ 694.953530][T18372] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 694.959259][T18372] RIP: 0033:0x7f54bc96c169 [ 694.963516][T18372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 694.982953][T18372] RSP: 002b:00007f54bafd5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 694.991199][T18372] RAX: ffffffffffffffda RBX: 00007f54bcb84fa0 RCX: 00007f54bc96c169 [ 694.999012][T18372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 695.006822][T18372] RBP: 00007f54bafd6090 R08: 0000000000000000 R09: 0000000000000000 [ 695.014630][T18372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 695.022444][T18372] R13: 0000000000000000 R14: 00007f54bcb84fa0 R15: 00007fff88cc0ff8 [ 695.030262][T18372] [ 695.509199][T18411] bridge0: port 1(veth1) entered blocking state [ 695.549581][T18411] bridge0: port 1(veth1) entered disabled state [ 695.556164][T18411] device veth1 entered promiscuous mode [ 696.474517][T18454] device syzkaller0 entered promiscuous mode [ 697.374947][T18491] syz.8.6138[18491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 697.375028][T18491] syz.8.6138[18491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 698.119844][T18538] FAULT_INJECTION: forcing a failure. [ 698.119844][T18538] name failslab, interval 1, probability 0, space 0, times 0 [ 698.269242][T18538] CPU: 0 PID: 18538 Comm: syz.5.6156 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 698.279062][T18538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 698.288957][T18538] Call Trace: [ 698.292083][T18538] [ 698.294859][T18538] dump_stack_lvl+0x151/0x1c0 [ 698.299373][T18538] ? io_uring_drop_tctx_refs+0x190/0x190 [ 698.304843][T18538] dump_stack+0x15/0x20 [ 698.308833][T18538] should_fail+0x3c6/0x510 [ 698.313086][T18538] __should_failslab+0xa4/0xe0 [ 698.317687][T18538] ? vm_area_dup+0x26/0x230 [ 698.322024][T18538] should_failslab+0x9/0x20 [ 698.326362][T18538] slab_pre_alloc_hook+0x37/0xd0 [ 698.331137][T18538] ? vm_area_dup+0x26/0x230 [ 698.335475][T18538] kmem_cache_alloc+0x44/0x250 [ 698.340077][T18538] vm_area_dup+0x26/0x230 [ 698.344241][T18538] copy_mm+0x9a1/0x13e0 [ 698.348237][T18538] ? copy_signal+0x610/0x610 [ 698.352658][T18538] ? __init_rwsem+0xfe/0x1d0 [ 698.357085][T18538] ? copy_signal+0x4e3/0x610 [ 698.361510][T18538] copy_process+0x1149/0x3290 [ 698.366024][T18538] ? __kasan_check_write+0x14/0x20 [ 698.370973][T18538] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 698.375916][T18538] ? vfs_write+0x94d/0x1110 [ 698.380259][T18538] kernel_clone+0x21e/0x9e0 [ 698.384597][T18538] ? __kasan_check_write+0x14/0x20 [ 698.389542][T18538] ? create_io_thread+0x1e0/0x1e0 [ 698.394409][T18538] __x64_sys_clone+0x23f/0x290 [ 698.399015][T18538] ? __do_sys_vfork+0x130/0x130 [ 698.403694][T18538] ? debug_smp_processor_id+0x17/0x20 [ 698.408897][T18538] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 698.414807][T18538] ? exit_to_user_mode_prepare+0x39/0xa0 [ 698.420267][T18538] x64_sys_call+0x1b0/0x9a0 [ 698.424613][T18538] do_syscall_64+0x3b/0xb0 [ 698.428861][T18538] ? clear_bhb_loop+0x35/0x90 [ 698.433371][T18538] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 698.439106][T18538] RIP: 0033:0x7fa0d87ee169 [ 698.443356][T18538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 698.462800][T18538] RSP: 002b:00007fa0d6e57fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 698.471039][T18538] RAX: ffffffffffffffda RBX: 00007fa0d8a06fa0 RCX: 00007fa0d87ee169 [ 698.478854][T18538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 698.486662][T18538] RBP: 00007fa0d6e58090 R08: 0000000000000000 R09: 0000000000000000 [ 698.494478][T18538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 698.502292][T18538] R13: 0000000000000000 R14: 00007fa0d8a06fa0 R15: 00007ffc2255c688 [ 698.510109][T18538] [ 699.026506][T18560] device syzkaller0 entered promiscuous mode [ 700.607104][T18645] syz.6.6200[18645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.607198][T18645] syz.6.6200[18645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 701.158356][T18681] device pim6reg1 entered promiscuous mode [ 701.365171][T18687] FAULT_INJECTION: forcing a failure. [ 701.365171][T18687] name failslab, interval 1, probability 0, space 0, times 0 [ 701.429340][T18687] CPU: 1 PID: 18687 Comm: syz.5.6217 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 701.439166][T18687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 701.449063][T18687] Call Trace: [ 701.452185][T18687] [ 701.454962][T18687] dump_stack_lvl+0x151/0x1c0 [ 701.459474][T18687] ? io_uring_drop_tctx_refs+0x190/0x190 [ 701.464948][T18687] dump_stack+0x15/0x20 [ 701.468934][T18687] should_fail+0x3c6/0x510 [ 701.473188][T18687] __should_failslab+0xa4/0xe0 [ 701.477784][T18687] ? vm_area_dup+0x26/0x230 [ 701.482140][T18687] should_failslab+0x9/0x20 [ 701.486466][T18687] slab_pre_alloc_hook+0x37/0xd0 [ 701.491246][T18687] ? vm_area_dup+0x26/0x230 [ 701.495583][T18687] kmem_cache_alloc+0x44/0x250 [ 701.500267][T18687] vm_area_dup+0x26/0x230 [ 701.504431][T18687] copy_mm+0x9a1/0x13e0 [ 701.508431][T18687] ? copy_signal+0x610/0x610 [ 701.512866][T18687] ? __init_rwsem+0xfe/0x1d0 [ 701.517277][T18687] ? copy_signal+0x4e3/0x610 [ 701.521706][T18687] copy_process+0x1149/0x3290 [ 701.526221][T18687] ? __kasan_check_write+0x14/0x20 [ 701.531172][T18687] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 701.536125][T18687] ? vfs_write+0x94d/0x1110 [ 701.540454][T18687] kernel_clone+0x21e/0x9e0 [ 701.544794][T18687] ? __kasan_check_write+0x14/0x20 [ 701.549739][T18687] ? create_io_thread+0x1e0/0x1e0 [ 701.554611][T18687] __x64_sys_clone+0x23f/0x290 [ 701.559205][T18687] ? __do_sys_vfork+0x130/0x130 [ 701.563889][T18687] ? debug_smp_processor_id+0x17/0x20 [ 701.569089][T18687] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 701.574996][T18687] ? exit_to_user_mode_prepare+0x39/0xa0 [ 701.580463][T18687] x64_sys_call+0x1b0/0x9a0 [ 701.584800][T18687] do_syscall_64+0x3b/0xb0 [ 701.589104][T18687] ? clear_bhb_loop+0x35/0x90 [ 701.593567][T18687] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 701.599294][T18687] RIP: 0033:0x7fa0d87ee169 [ 701.603635][T18687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 701.623075][T18687] RSP: 002b:00007fa0d6e57fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 701.631321][T18687] RAX: ffffffffffffffda RBX: 00007fa0d8a06fa0 RCX: 00007fa0d87ee169 [ 701.639134][T18687] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 701.646942][T18687] RBP: 00007fa0d6e58090 R08: 0000000000000000 R09: 0000000000000000 [ 701.654756][T18687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.662566][T18687] R13: 0000000000000000 R14: 00007fa0d8a06fa0 R15: 00007ffc2255c688 [ 701.670414][T18687] [ 703.520508][T18771] tun0: tun_chr_ioctl cmd 2147767517 [ 703.601034][T18771] device wg2 entered promiscuous mode [ 705.586884][T18824] device syzkaller0 entered promiscuous mode [ 705.978420][T18857] syz.8.6278[18857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.978505][T18857] syz.8.6278[18857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 706.885581][T18890] device syzkaller0 entered promiscuous mode [ 707.554428][T18919] FAULT_INJECTION: forcing a failure. [ 707.554428][T18919] name failslab, interval 1, probability 0, space 0, times 0 [ 707.566999][T18919] CPU: 0 PID: 18919 Comm: syz.9.6301 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 707.576808][T18919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 707.586710][T18919] Call Trace: [ 707.589825][T18919] [ 707.592607][T18919] dump_stack_lvl+0x151/0x1c0 [ 707.597116][T18919] ? io_uring_drop_tctx_refs+0x190/0x190 [ 707.602583][T18919] dump_stack+0x15/0x20 [ 707.606574][T18919] should_fail+0x3c6/0x510 [ 707.610828][T18919] __should_failslab+0xa4/0xe0 [ 707.615427][T18919] ? anon_vma_clone+0x9a/0x500 [ 707.620024][T18919] should_failslab+0x9/0x20 [ 707.624362][T18919] slab_pre_alloc_hook+0x37/0xd0 [ 707.629138][T18919] ? anon_vma_clone+0x9a/0x500 [ 707.633735][T18919] kmem_cache_alloc+0x44/0x250 [ 707.638339][T18919] anon_vma_clone+0x9a/0x500 [ 707.642765][T18919] anon_vma_fork+0x91/0x4e0 [ 707.647104][T18919] ? anon_vma_name+0x43/0x70 [ 707.651531][T18919] ? vm_area_dup+0x17a/0x230 [ 707.655967][T18919] copy_mm+0xa3a/0x13e0 [ 707.659957][T18919] ? copy_signal+0x610/0x610 [ 707.664377][T18919] ? __init_rwsem+0xfe/0x1d0 [ 707.668799][T18919] ? copy_signal+0x4e3/0x610 [ 707.673227][T18919] copy_process+0x1149/0x3290 [ 707.677741][T18919] ? __kasan_check_write+0x14/0x20 [ 707.682696][T18919] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 707.687635][T18919] ? vfs_write+0x94d/0x1110 [ 707.691979][T18919] kernel_clone+0x21e/0x9e0 [ 707.696316][T18919] ? __kasan_check_write+0x14/0x20 [ 707.701265][T18919] ? create_io_thread+0x1e0/0x1e0 [ 707.706125][T18919] __x64_sys_clone+0x23f/0x290 [ 707.710723][T18919] ? __do_sys_vfork+0x130/0x130 [ 707.715411][T18919] ? debug_smp_processor_id+0x17/0x20 [ 707.720614][T18919] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 707.726515][T18919] ? exit_to_user_mode_prepare+0x39/0xa0 [ 707.731984][T18919] x64_sys_call+0x1b0/0x9a0 [ 707.736323][T18919] do_syscall_64+0x3b/0xb0 [ 707.740576][T18919] ? clear_bhb_loop+0x35/0x90 [ 707.745092][T18919] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 707.750822][T18919] RIP: 0033:0x7faaa9c0b169 [ 707.755072][T18919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 707.774525][T18919] RSP: 002b:00007faaa8274fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 707.782758][T18919] RAX: ffffffffffffffda RBX: 00007faaa9e23fa0 RCX: 00007faaa9c0b169 [ 707.790568][T18919] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 707.798380][T18919] RBP: 00007faaa8275090 R08: 0000000000000000 R09: 0000000000000000 [ 707.806192][T18919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 707.814003][T18919] R13: 0000000000000000 R14: 00007faaa9e23fa0 R15: 00007ffd8d81a378 [ 707.821827][T18919] [ 711.852312][T19061] device bridge_slave_0 entered promiscuous mode [ 711.868542][T19061] device bridge_slave_0 left promiscuous mode [ 712.366224][T19091] syz.9.6361[19091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 712.366309][T19091] syz.9.6361[19091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 714.936086][T19173] FAULT_INJECTION: forcing a failure. [ 714.936086][T19173] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 715.119303][T19173] CPU: 1 PID: 19173 Comm: syz.7.6391 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 715.129131][T19173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 715.139131][T19173] Call Trace: [ 715.142245][T19173] [ 715.145027][T19173] dump_stack_lvl+0x151/0x1c0 [ 715.149536][T19173] ? io_uring_drop_tctx_refs+0x190/0x190 [ 715.155009][T19173] dump_stack+0x15/0x20 [ 715.158997][T19173] should_fail+0x3c6/0x510 [ 715.163252][T19173] should_fail_alloc_page+0x5a/0x80 [ 715.168282][T19173] prepare_alloc_pages+0x15c/0x700 [ 715.173231][T19173] ? __alloc_pages+0x8f0/0x8f0 [ 715.177828][T19173] ? __alloc_pages_bulk+0xd80/0xd80 [ 715.182862][T19173] __alloc_pages+0x18c/0x8f0 [ 715.187285][T19173] ? prep_new_page+0x110/0x110 [ 715.191888][T19173] ? 0xffffffffa0028000 [ 715.195879][T19173] ? is_bpf_text_address+0x172/0x190 [ 715.201003][T19173] pte_alloc_one+0x73/0x1b0 [ 715.205336][T19173] ? pfn_modify_allowed+0x2f0/0x2f0 [ 715.210382][T19173] ? arch_stack_walk+0xf3/0x140 [ 715.215059][T19173] __pte_alloc+0x86/0x350 [ 715.219228][T19173] ? free_pgtables+0x280/0x280 [ 715.223824][T19173] ? _raw_spin_lock+0xa4/0x1b0 [ 715.228427][T19173] ? __kasan_check_write+0x14/0x20 [ 715.233377][T19173] copy_page_range+0x2743/0x2e20 [ 715.238157][T19173] ? pfn_valid+0x1e0/0x1e0 [ 715.242399][T19173] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 715.247953][T19173] ? __rb_insert_augmented+0x5de/0x610 [ 715.253250][T19173] copy_mm+0xc7e/0x13e0 [ 715.257243][T19173] ? copy_signal+0x610/0x610 [ 715.261668][T19173] ? __init_rwsem+0xfe/0x1d0 [ 715.266093][T19173] ? copy_signal+0x4e3/0x610 [ 715.270521][T19173] copy_process+0x1149/0x3290 [ 715.275037][T19173] ? __kasan_check_write+0x14/0x20 [ 715.279982][T19173] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 715.284925][T19173] ? vfs_write+0x94d/0x1110 [ 715.289268][T19173] kernel_clone+0x21e/0x9e0 [ 715.293607][T19173] ? __kasan_check_write+0x14/0x20 [ 715.298552][T19173] ? create_io_thread+0x1e0/0x1e0 [ 715.303419][T19173] __x64_sys_clone+0x23f/0x290 [ 715.308013][T19173] ? __do_sys_vfork+0x130/0x130 [ 715.312708][T19173] ? debug_smp_processor_id+0x17/0x20 [ 715.317907][T19173] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 715.323808][T19173] ? exit_to_user_mode_prepare+0x39/0xa0 [ 715.329276][T19173] x64_sys_call+0x1b0/0x9a0 [ 715.333617][T19173] do_syscall_64+0x3b/0xb0 [ 715.337869][T19173] ? clear_bhb_loop+0x35/0x90 [ 715.342382][T19173] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 715.348111][T19173] RIP: 0033:0x7f0c5eef0169 [ 715.352364][T19173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 715.371803][T19173] RSP: 002b:00007f0c5d559fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 715.380049][T19173] RAX: ffffffffffffffda RBX: 00007f0c5f108fa0 RCX: 00007f0c5eef0169 [ 715.387860][T19173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 715.395761][T19173] RBP: 00007f0c5d55a090 R08: 0000000000000000 R09: 0000000000000000 [ 715.403570][T19173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 715.411380][T19173] R13: 0000000000000000 R14: 00007f0c5f108fa0 R15: 00007ffc94a2bd78 [ 715.419198][T19173] [ 718.733631][T19315] syz.9.6443[19315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 718.733710][T19315] syz.9.6443[19315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.246788][T19396] FAULT_INJECTION: forcing a failure. [ 721.246788][T19396] name failslab, interval 1, probability 0, space 0, times 0 [ 721.322167][T19396] CPU: 1 PID: 19396 Comm: syz.7.6472 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 721.332012][T19396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 721.341901][T19396] Call Trace: [ 721.345022][T19396] [ 721.347807][T19396] dump_stack_lvl+0x151/0x1c0 [ 721.352330][T19396] ? io_uring_drop_tctx_refs+0x190/0x190 [ 721.357794][T19396] dump_stack+0x15/0x20 [ 721.361774][T19396] should_fail+0x3c6/0x510 [ 721.366029][T19396] __should_failslab+0xa4/0xe0 [ 721.370631][T19396] ? anon_vma_clone+0x9a/0x500 [ 721.375236][T19396] should_failslab+0x9/0x20 [ 721.379571][T19396] slab_pre_alloc_hook+0x37/0xd0 [ 721.384344][T19396] ? anon_vma_clone+0x9a/0x500 [ 721.388936][T19396] kmem_cache_alloc+0x44/0x250 [ 721.393541][T19396] anon_vma_clone+0x9a/0x500 [ 721.397965][T19396] anon_vma_fork+0x91/0x4e0 [ 721.402304][T19396] ? anon_vma_name+0x43/0x70 [ 721.406728][T19396] ? vm_area_dup+0x17a/0x230 [ 721.411156][T19396] copy_mm+0xa3a/0x13e0 [ 721.415152][T19396] ? copy_signal+0x610/0x610 [ 721.419577][T19396] ? __init_rwsem+0xfe/0x1d0 [ 721.424001][T19396] ? copy_signal+0x4e3/0x610 [ 721.428427][T19396] copy_process+0x1149/0x3290 [ 721.432940][T19396] ? __kasan_check_write+0x14/0x20 [ 721.437890][T19396] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 721.442834][T19396] ? vfs_write+0x94d/0x1110 [ 721.447175][T19396] kernel_clone+0x21e/0x9e0 [ 721.451517][T19396] ? __kasan_check_write+0x14/0x20 [ 721.456466][T19396] ? create_io_thread+0x1e0/0x1e0 [ 721.461326][T19396] __x64_sys_clone+0x23f/0x290 [ 721.465922][T19396] ? __do_sys_vfork+0x130/0x130 [ 721.470610][T19396] ? debug_smp_processor_id+0x17/0x20 [ 721.475815][T19396] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 721.481716][T19396] ? exit_to_user_mode_prepare+0x39/0xa0 [ 721.487184][T19396] x64_sys_call+0x1b0/0x9a0 [ 721.491524][T19396] do_syscall_64+0x3b/0xb0 [ 721.495776][T19396] ? clear_bhb_loop+0x35/0x90 [ 721.500290][T19396] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 721.506019][T19396] RIP: 0033:0x7f0c5eef0169 [ 721.510274][T19396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 721.529713][T19396] RSP: 002b:00007f0c5d559fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 721.537957][T19396] RAX: ffffffffffffffda RBX: 00007f0c5f108fa0 RCX: 00007f0c5eef0169 [ 721.545769][T19396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 721.553580][T19396] RBP: 00007f0c5d55a090 R08: 0000000000000000 R09: 0000000000000000 [ 721.561391][T19396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 721.569224][T19396] R13: 0000000000000000 R14: 00007f0c5f108fa0 R15: 00007ffc94a2bd78 [ 721.577029][T19396] [ 723.586748][T19478] device syzkaller0 entered promiscuous mode [ 725.328679][ T30] audit: type=1400 audit(1744343841.626:182): avc: denied { create } for pid=19539 comm="syz.9.6522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 725.412392][T19547] syz.8.6525[19547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.412470][T19547] syz.8.6525[19547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.680271][T19567] ------------[ cut here ]------------ [ 725.759528][T19567] trace type BPF program uses run-time allocation [ 725.810054][T19567] WARNING: CPU: 1 PID: 19567 at kernel/bpf/verifier.c:11701 check_map_prog_compatibility+0x6f1/0x890 [ 725.881543][T19567] Modules linked in: [ 725.899860][T19567] CPU: 1 PID: 19567 Comm: syz.9.6531 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 725.953863][T19567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 726.013535][T19567] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 726.049012][T19567] Code: db e9 f9 fc ff ff e8 ae 29 ed ff 31 db e9 ed fc ff ff e8 a2 29 ed ff c6 05 30 55 a3 05 01 48 c7 c7 60 f5 87 85 e8 2f 6f be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 726.115540][T19576] tun0: tun_chr_ioctl cmd 2147767517 [ 726.139222][T19567] RSP: 0018:ffffc90000cbf328 EFLAGS: 00010246 [ 726.145215][T19567] RAX: 4fcd597148cf7c00 RBX: 0000000000000001 RCX: 0000000000080000 [ 726.153060][T19567] RDX: ffffc90001ed3000 RSI: 0000000000000b8c RDI: 0000000000000b8d [ 726.160966][T19567] RBP: ffffc90000cbf370 R08: ffffffff8157a555 R09: ffffed103ee265e8 [ 726.168830][T19567] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 726.178279][T19567] R13: ffff888113a33000 R14: ffffc900001f1000 R15: dffffc0000000000 [ 726.198255][T19567] FS: 00007faaa82756c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 726.213439][T19567] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 726.229230][T19567] CR2: 000055556be9f488 CR3: 0000000134896000 CR4: 00000000003506b0 [ 726.245540][T19567] DR0: 0000200000000300 DR1: 00000000000000fd DR2: 00000000000000fd [ 726.254112][T19567] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 726.284256][T19567] Call Trace: [ 726.289758][T19567] [ 726.313938][T19567] ? show_regs+0x58/0x60 [ 726.318134][T19567] ? __warn+0x160/0x2f0 [ 726.380867][T19567] ? check_map_prog_compatibility+0x6f1/0x890 [ 726.386821][T19567] ? report_bug+0x3d9/0x5b0 [ 726.511749][T19606] device sit0 entered promiscuous mode [ 726.519195][T19567] ? check_map_prog_compatibility+0x6f1/0x890 [ 726.569241][T19567] ? handle_bug+0x41/0x70 [ 726.573425][T19567] ? exc_invalid_op+0x1b/0x50 [ 726.577935][T19567] ? asm_exc_invalid_op+0x1b/0x20 [ 726.742897][T19567] ? __wake_up_klogd+0xd5/0x110 [ 726.747609][T19567] ? check_map_prog_compatibility+0x6f1/0x890 [ 726.828446][T19567] ? check_map_prog_compatibility+0x6f1/0x890 [ 726.865145][T19567] resolve_pseudo_ldimm64+0x682/0x1240 [ 726.908188][T19567] ? check_attach_btf_id+0xef0/0xef0 [ 726.926075][T19567] ? __mark_reg_known+0x1b0/0x1b0 [ 726.935412][T19615] FAULT_INJECTION: forcing a failure. [ 726.935412][T19615] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 726.982630][T19567] ? security_capable+0x87/0xb0 [ 727.012271][T19567] bpf_check+0x3190/0x12c60 [ 727.041115][T19567] ? 0xffffffffa0028000 [ 727.056022][T19615] CPU: 0 PID: 19615 Comm: syz.6.6550 Not tainted 5.15.178-syzkaller-00260-g760764029c6d #0 [ 727.065845][T19615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 727.075737][T19615] Call Trace: [ 727.078859][T19615] [ 727.081641][T19615] dump_stack_lvl+0x151/0x1c0 [ 727.086152][T19615] ? io_uring_drop_tctx_refs+0x190/0x190 [ 727.091620][T19615] ? __update_load_avg_cfs_rq+0xb1/0x2f0 [ 727.097088][T19615] dump_stack+0x15/0x20 [ 727.101078][T19615] should_fail+0x3c6/0x510 [ 727.105333][T19615] should_fail_alloc_page+0x5a/0x80 [ 727.110366][T19615] prepare_alloc_pages+0x15c/0x700 [ 727.115316][T19615] ? __alloc_pages_bulk+0xd80/0xd80 [ 727.120347][T19615] ? sched_clock+0x9/0x10 [ 727.124513][T19615] ? native_set_ldt+0x360/0x360 [ 727.129202][T19615] __alloc_pages+0x18c/0x8f0 [ 727.133629][T19615] ? _raw_spin_unlock+0x4d/0x70 [ 727.138312][T19615] ? prep_new_page+0x110/0x110 [ 727.142917][T19615] pte_alloc_one+0x73/0x1b0 [ 727.147249][T19615] ? pfn_modify_allowed+0x2f0/0x2f0 [ 727.152287][T19615] ? preempt_schedule+0xd9/0xe0 [ 727.156973][T19615] ? preempt_schedule_common+0xbe/0xf0 [ 727.162266][T19615] __pte_alloc+0x86/0x350 [ 727.166433][T19615] ? free_pgtables+0x280/0x280 [ 727.171032][T19615] ? _raw_spin_lock+0xa4/0x1b0 [ 727.175637][T19615] ? __kasan_check_write+0x14/0x20 [ 727.179237][T19567] ? is_bpf_text_address+0x172/0x190 [ 727.180578][T19615] copy_page_range+0x2743/0x2e20 [ 727.190490][T19615] ? pfn_valid+0x1e0/0x1e0 [ 727.192836][T19567] ? stack_trace_save+0x1c0/0x1c0 [ 727.194725][T19615] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 727.199611][T19567] ? __kernel_text_address+0x9b/0x110 [ 727.205139][T19615] ? __rb_insert_augmented+0x5de/0x610 [ 727.205169][T19615] copy_mm+0xc7e/0x13e0 [ 727.210449][T19567] ? unwind_get_return_address+0x4d/0x90 [ 727.215648][T19615] ? copy_signal+0x610/0x610 [ 727.219687][T19567] ? bpf_get_btf_vmlinux+0x60/0x60 [ 727.225101][T19615] ? __init_rwsem+0xfe/0x1d0 [ 727.225127][T19615] ? copy_signal+0x4e3/0x610 [ 727.229611][T19567] ? arch_stack_walk+0xf3/0x140 [ 727.234476][T19615] copy_process+0x1149/0x3290 [ 727.238906][T19567] ? stack_trace_save+0x113/0x1c0 [ 727.243327][T19615] ? __kasan_check_write+0x14/0x20 [ 727.243356][T19615] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 727.243380][T19615] ? vfs_write+0x94d/0x1110 [ 727.248080][T19567] ? stack_trace_snprint+0xf0/0xf0 [ 727.252531][T19615] kernel_clone+0x21e/0x9e0 [ 727.252556][T19615] ? __kasan_check_write+0x14/0x20 [ 727.257389][T19567] ? stack_trace_snprint+0xf0/0xf0 [ 727.262333][T19615] ? create_io_thread+0x1e0/0x1e0 [ 727.262359][T19615] __x64_sys_clone+0x23f/0x290 [ 727.262383][T19615] ? __do_sys_vfork+0x130/0x130 [ 727.267345][T19567] ? __stack_depot_save+0x34/0x470 [ 727.271622][T19615] ? debug_smp_processor_id+0x17/0x20 [ 727.271647][T19615] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 727.271670][T19615] ? exit_to_user_mode_prepare+0x39/0xa0 [ 727.271695][T19615] x64_sys_call+0x1b0/0x9a0 [ 727.330818][T19615] do_syscall_64+0x3b/0xb0 [ 727.335065][T19615] ? clear_bhb_loop+0x35/0x90 [ 727.339578][T19615] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 727.345306][T19615] RIP: 0033:0x7f54bc96c169 [ 727.349561][T19615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 727.369001][T19615] RSP: 002b:00007f54bafd5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 727.377248][T19615] RAX: ffffffffffffffda RBX: 00007f54bcb84fa0 RCX: 00007f54bc96c169 [ 727.385058][T19615] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 727.392874][T19615] RBP: 00007f54bafd6090 R08: 0000000000000000 R09: 0000000000000000 [ 727.400682][T19615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 727.408490][T19615] R13: 0000000000000000 R14: 00007f54bcb84fa0 R15: 00007fff88cc0ff8 [ 727.416308][T19615] [ 727.421927][T19567] ? ____kasan_kmalloc+0xed/0x110 [ 727.426812][T19567] ? ____kasan_kmalloc+0xdb/0x110 [ 727.439244][T19567] ? __kasan_kmalloc+0x9/0x10 [ 727.443821][T19567] ? kmem_cache_alloc_trace+0x11a/0x270 [ 727.449668][T19567] ? selinux_bpf_prog_alloc+0x51/0x140 [ 727.455012][T19567] ? security_bpf_prog_alloc+0x62/0x90 [ 727.460701][T19567] ? bpf_prog_load+0x9ee/0x1b50 [ 727.465467][T19567] ? __sys_bpf+0x4bc/0x760 [ 727.469710][T19567] ? __x64_sys_bpf+0x7c/0x90 [ 727.474219][T19567] ? x64_sys_call+0x87f/0x9a0 [ 727.478785][T19567] ? do_syscall_64+0x3b/0xb0 [ 727.483410][T19567] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 727.489403][T19567] ? __kasan_kmalloc+0x9/0x10 [ 727.504485][T19567] ? memset+0x35/0x40 [ 727.508334][T19567] ? bpf_obj_name_cpy+0x196/0x1e0 [ 727.534706][T19567] bpf_prog_load+0x12ac/0x1b50 [ 727.540023][T19567] ? map_freeze+0x370/0x370 [ 727.546537][T19567] ? selinux_bpf+0xcb/0x100 [ 727.562462][T19567] ? security_bpf+0x82/0xb0 [ 727.566812][T19567] __sys_bpf+0x4bc/0x760 [ 727.574667][T19567] ? bpf_link_show_fdinfo+0x300/0x300 [ 727.580117][T19567] ? __kasan_check_write+0x14/0x20 [ 727.591869][T19567] ? switch_fpu_return+0x15f/0x2e0 [ 727.620832][T19567] __x64_sys_bpf+0x7c/0x90 [ 727.655730][T19567] x64_sys_call+0x87f/0x9a0 [ 727.698757][T19567] do_syscall_64+0x3b/0xb0 [ 727.729166][T19567] ? clear_bhb_loop+0x35/0x90 [ 727.733697][T19567] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 727.747719][T19567] RIP: 0033:0x7faaa9c0b169 [ 727.752479][T19567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 727.920322][T19567] RSP: 002b:00007faaa8275038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 727.928587][T19567] RAX: ffffffffffffffda RBX: 00007faaa9e23fa0 RCX: 00007faaa9c0b169 [ 728.008277][T19567] RDX: 0000000000000080 RSI: 0000200000000580 RDI: 0000000000000005 [ 728.027532][T19567] RBP: 00007faaa9c8c730 R08: 0000000000000000 R09: 0000000000000000 [ 728.129348][T19567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 728.137173][T19567] R13: 0000000000000000 R14: 00007faaa9e23fa0 R15: 00007ffd8d81a378 [ 728.269303][T19567] [ 728.272253][T19567] ---[ end trace 3113e05ad3d2ea6d ]--- [ 728.918172][T19700] device pim6reg1 entered promiscuous mode [ 730.404967][T19757] syz.8.6601[19757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.405051][T19757] syz.8.6601[19757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.745115][T19776] syz.5.6608 uses obsolete (PF_INET,SOCK_PACKET) [ 731.170209][T19794] device veth1_macvtap left promiscuous mode [ 731.578899][T19812] device wg2 left promiscuous mode [ 731.931230][T19832] FAULT_INJECTION: forcing a failure. [ 731.931230][T19832] name failslab, interval 1, probability 0, space 0, times 0 [ 732.132012][T19832] CPU: 0 PID: 19832 Comm: syz.6.6629 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 732.143240][T19832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 732.153129][T19832] Call Trace: [ 732.156251][T19832] [ 732.159028][T19832] dump_stack_lvl+0x151/0x1c0 [ 732.163541][T19832] ? io_uring_drop_tctx_refs+0x190/0x190 [ 732.169016][T19832] dump_stack+0x15/0x20 [ 732.173003][T19832] should_fail+0x3c6/0x510 [ 732.177255][T19832] __should_failslab+0xa4/0xe0 [ 732.181856][T19832] ? anon_vma_fork+0x1df/0x4e0 [ 732.186458][T19832] should_failslab+0x9/0x20 [ 732.190793][T19832] slab_pre_alloc_hook+0x37/0xd0 [ 732.195586][T19832] ? anon_vma_fork+0x1df/0x4e0 [ 732.200167][T19832] kmem_cache_alloc+0x44/0x250 [ 732.204771][T19832] anon_vma_fork+0x1df/0x4e0 [ 732.209199][T19832] copy_mm+0xa3a/0x13e0 [ 732.213195][T19832] ? copy_signal+0x610/0x610 [ 732.217613][T19832] ? __init_rwsem+0xfe/0x1d0 [ 732.222044][T19832] ? copy_signal+0x4e3/0x610 [ 732.226467][T19832] copy_process+0x1149/0x3290 [ 732.230985][T19832] ? __kasan_check_write+0x14/0x20 [ 732.235933][T19832] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 732.240871][T19832] ? vfs_write+0x94d/0x1110 [ 732.245243][T19832] kernel_clone+0x21e/0x9e0 [ 732.249555][T19832] ? __kasan_check_write+0x14/0x20 [ 732.254499][T19832] ? create_io_thread+0x1e0/0x1e0 [ 732.259364][T19832] __x64_sys_clone+0x23f/0x290 [ 732.263961][T19832] ? __do_sys_vfork+0x130/0x130 [ 732.268650][T19832] ? debug_smp_processor_id+0x17/0x20 [ 732.273855][T19832] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 732.279762][T19832] ? exit_to_user_mode_prepare+0x39/0xa0 [ 732.285230][T19832] x64_sys_call+0x1b0/0x9a0 [ 732.289567][T19832] do_syscall_64+0x3b/0xb0 [ 732.293815][T19832] ? clear_bhb_loop+0x35/0x90 [ 732.298327][T19832] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 732.304058][T19832] RIP: 0033:0x7f54bc96c169 [ 732.308311][T19832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 732.327751][T19832] RSP: 002b:00007f54bafd5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 732.335995][T19832] RAX: ffffffffffffffda RBX: 00007f54bcb84fa0 RCX: 00007f54bc96c169 [ 732.343806][T19832] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 732.351619][T19832] RBP: 00007f54bafd6090 R08: 0000000000000000 R09: 0000000000000000 [ 732.359431][T19832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 732.367240][T19832] R13: 0000000000000000 R14: 00007f54bcb84fa0 R15: 00007fff88cc0ff8 [ 732.375061][T19832] [ 732.684789][ T30] audit: type=1400 audit(1744343848.986:183): avc: denied { create } for pid=19851 comm="syz.9.6637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 735.425520][T19938] device syzkaller0 entered promiscuous mode [ 738.248348][T20003] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.255509][T20003] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.262940][T20003] device bridge_slave_0 entered promiscuous mode [ 738.271707][T20003] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.278551][T20003] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.286101][T20003] device bridge_slave_1 entered promiscuous mode [ 738.352144][ T435] device veth1 left promiscuous mode [ 738.357319][ T435] bridge0: port 1(veth1) entered disabled state [ 738.365211][ T435] device bridge_slave_1 left promiscuous mode [ 738.371150][ T435] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.378394][ T435] device bridge_slave_0 left promiscuous mode [ 738.384424][ T435] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.392880][ T435] device veth1_macvtap left promiscuous mode [ 738.398885][ T435] device veth1_macvtap left promiscuous mode [ 738.404868][ T435] device veth1_macvtap left promiscuous mode [ 738.653631][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 738.660902][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 738.669753][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 738.677892][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 738.685927][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.692782][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.700450][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 738.709040][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 738.717248][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 738.725416][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.732265][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.745868][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 738.754901][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 738.768397][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 738.781491][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 738.789598][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 738.796787][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 738.805600][T20003] device veth0_vlan entered promiscuous mode [ 738.815604][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 738.825525][T20003] device veth1_macvtap entered promiscuous mode [ 738.835029][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 738.845246][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 739.211970][T20024] device pim6reg1 entered promiscuous mode [ 739.659921][T20023] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.666799][T20023] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.723106][T20023] device bridge_slave_0 entered promiscuous mode [ 739.762153][T20027] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.769014][T20027] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.811341][T20027] device bridge_slave_0 entered promiscuous mode [ 739.845365][T20023] bridge0: port 2(bridge_slave_1) entered blocking state [ 739.859344][T20023] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.866706][T20023] device bridge_slave_1 entered promiscuous mode [ 739.941543][T20026] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.948552][T20026] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.979669][T20026] device bridge_slave_0 entered promiscuous mode [ 739.986315][T20027] bridge0: port 2(bridge_slave_1) entered blocking state [ 739.993795][T20027] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.001708][T20027] device bridge_slave_1 entered promiscuous mode [ 740.021838][T20026] bridge0: port 2(bridge_slave_1) entered blocking state [ 740.029496][T20026] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.037066][T20026] device bridge_slave_1 entered promiscuous mode [ 740.421348][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 740.429759][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 740.468861][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 740.482368][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 740.503212][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 740.518681][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 740.527153][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 740.534119][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 740.556910][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 740.572673][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 740.580814][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 740.587684][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 740.595538][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 740.603644][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 740.616308][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 740.628428][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 740.639692][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 740.654494][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 740.668050][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 740.674944][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 740.692887][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 740.705551][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 740.719483][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 740.726342][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 740.779713][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 740.839610][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 740.854433][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 740.861322][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 740.882837][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 740.899950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 740.916765][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 740.923658][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 740.949273][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 740.970544][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 740.985000][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 741.002093][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 741.019546][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 741.036438][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 741.049578][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 741.089412][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 741.097667][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 741.120580][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 741.128554][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 741.171040][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 741.182054][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 741.190939][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 741.198865][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 741.210063][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 741.218740][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 741.320434][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 741.339729][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 741.369938][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 741.399719][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 741.439513][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 741.467808][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 741.496337][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 741.523819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 741.541434][T20023] device veth0_vlan entered promiscuous mode [ 741.550094][T20027] device veth0_vlan entered promiscuous mode [ 741.563327][T20026] device veth0_vlan entered promiscuous mode [ 741.576061][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 741.585046][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 741.595616][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 741.604350][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 741.618596][T20027] device veth1_macvtap entered promiscuous mode [ 741.637223][T20026] device veth1_macvtap entered promiscuous mode [ 741.644379][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 741.689663][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 741.717989][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 741.755703][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 741.795168][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 741.831436][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 741.874195][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 741.915277][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 741.958595][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 742.001211][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 742.042410][T20023] device veth1_macvtap entered promiscuous mode [ 742.069883][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 742.092827][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 742.103156][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 742.114762][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 742.123923][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 742.132527][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 742.141178][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 742.149839][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 742.157989][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 742.213032][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 742.297612][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 742.371237][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 742.394072][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 742.863256][T20104] FAULT_INJECTION: forcing a failure. [ 742.863256][T20104] name failslab, interval 1, probability 0, space 0, times 0 [ 743.021879][T20104] CPU: 0 PID: 20104 Comm: syz.3.6717 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 743.033095][T20104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 743.042992][T20104] Call Trace: [ 743.046114][T20104] [ 743.048890][T20104] dump_stack_lvl+0x151/0x1c0 [ 743.053403][T20104] ? io_uring_drop_tctx_refs+0x190/0x190 [ 743.058876][T20104] dump_stack+0x15/0x20 [ 743.062862][T20104] should_fail+0x3c6/0x510 [ 743.067119][T20104] __should_failslab+0xa4/0xe0 [ 743.071717][T20104] ? vm_area_dup+0x26/0x230 [ 743.076056][T20104] should_failslab+0x9/0x20 [ 743.080393][T20104] slab_pre_alloc_hook+0x37/0xd0 [ 743.085171][T20104] ? vm_area_dup+0x26/0x230 [ 743.089509][T20104] kmem_cache_alloc+0x44/0x250 [ 743.094110][T20104] vm_area_dup+0x26/0x230 [ 743.098276][T20104] copy_mm+0x9a1/0x13e0 [ 743.102271][T20104] ? copy_signal+0x610/0x610 [ 743.106695][T20104] ? __init_rwsem+0xfe/0x1d0 [ 743.111122][T20104] ? copy_signal+0x4e3/0x610 [ 743.115547][T20104] copy_process+0x1149/0x3290 [ 743.120060][T20104] ? __kasan_check_write+0x14/0x20 [ 743.125012][T20104] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 743.129951][T20104] ? vfs_write+0x94d/0x1110 [ 743.134296][T20104] kernel_clone+0x21e/0x9e0 [ 743.138651][T20104] ? __kasan_check_write+0x14/0x20 [ 743.143581][T20104] ? create_io_thread+0x1e0/0x1e0 [ 743.148444][T20104] __x64_sys_clone+0x23f/0x290 [ 743.153038][T20104] ? __do_sys_vfork+0x130/0x130 [ 743.157729][T20104] ? debug_smp_processor_id+0x17/0x20 [ 743.162936][T20104] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 743.168845][T20104] ? exit_to_user_mode_prepare+0x39/0xa0 [ 743.174305][T20104] x64_sys_call+0x1b0/0x9a0 [ 743.178645][T20104] do_syscall_64+0x3b/0xb0 [ 743.182895][T20104] ? clear_bhb_loop+0x35/0x90 [ 743.187433][T20104] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 743.193137][T20104] RIP: 0033:0x7f3b7a586169 [ 743.197390][T20104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 743.216832][T20104] RSP: 002b:00007f3b78beffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 743.225078][T20104] RAX: ffffffffffffffda RBX: 00007f3b7a79efa0 RCX: 00007f3b7a586169 [ 743.232891][T20104] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 743.240699][T20104] RBP: 00007f3b78bf0090 R08: 0000000000000000 R09: 0000000000000000 [ 743.248511][T20104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 743.256323][T20104] R13: 0000000000000000 R14: 00007f3b7a79efa0 R15: 00007ffd32fb2f48 [ 743.264140][T20104] [ 744.028679][T20147] device veth0_vlan left promiscuous mode [ 744.111985][T20147] device veth0_vlan entered promiscuous mode [ 745.825119][T20210] syz.3.6752[20210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 745.825213][T20210] syz.3.6752[20210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 748.832832][T20273] device sit0 entered promiscuous mode [ 749.364513][T20307] ªªªªªª: renamed from vlan0 [ 749.931448][T20325] FAULT_INJECTION: forcing a failure. [ 749.931448][T20325] name failslab, interval 1, probability 0, space 0, times 0 [ 749.955103][T20325] CPU: 1 PID: 20325 Comm: syz.0.6791 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 749.966311][T20325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 749.976205][T20325] Call Trace: [ 749.979330][T20325] [ 749.982106][T20325] dump_stack_lvl+0x151/0x1c0 [ 749.986628][T20325] ? io_uring_drop_tctx_refs+0x190/0x190 [ 749.992094][T20325] dump_stack+0x15/0x20 [ 749.996077][T20325] should_fail+0x3c6/0x510 [ 750.000333][T20325] __should_failslab+0xa4/0xe0 [ 750.004935][T20325] ? anon_vma_fork+0x1df/0x4e0 [ 750.009536][T20325] should_failslab+0x9/0x20 [ 750.013869][T20325] slab_pre_alloc_hook+0x37/0xd0 [ 750.018648][T20325] ? anon_vma_fork+0x1df/0x4e0 [ 750.023243][T20325] kmem_cache_alloc+0x44/0x250 [ 750.027846][T20325] anon_vma_fork+0x1df/0x4e0 [ 750.032275][T20325] copy_mm+0xa3a/0x13e0 [ 750.036268][T20325] ? copy_signal+0x610/0x610 [ 750.040689][T20325] ? __init_rwsem+0xfe/0x1d0 [ 750.045116][T20325] ? copy_signal+0x4e3/0x610 [ 750.049548][T20325] copy_process+0x1149/0x3290 [ 750.054057][T20325] ? __kasan_check_write+0x14/0x20 [ 750.059010][T20325] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 750.063950][T20325] ? vfs_write+0x94d/0x1110 [ 750.068295][T20325] kernel_clone+0x21e/0x9e0 [ 750.072628][T20325] ? __kasan_check_write+0x14/0x20 [ 750.077576][T20325] ? create_io_thread+0x1e0/0x1e0 [ 750.082440][T20325] __x64_sys_clone+0x23f/0x290 [ 750.087036][T20325] ? __do_sys_vfork+0x130/0x130 [ 750.091727][T20325] ? debug_smp_processor_id+0x17/0x20 [ 750.096935][T20325] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 750.102832][T20325] ? exit_to_user_mode_prepare+0x39/0xa0 [ 750.108301][T20325] x64_sys_call+0x1b0/0x9a0 [ 750.112646][T20325] do_syscall_64+0x3b/0xb0 [ 750.116891][T20325] ? clear_bhb_loop+0x35/0x90 [ 750.121407][T20325] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 750.127257][T20325] RIP: 0033:0x7f0e0f9b8169 [ 750.131512][T20325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 750.150979][T20325] RSP: 002b:00007f0e0e021fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 750.159197][T20325] RAX: ffffffffffffffda RBX: 00007f0e0fbd0fa0 RCX: 00007f0e0f9b8169 [ 750.167016][T20325] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 750.174827][T20325] RBP: 00007f0e0e022090 R08: 0000000000000000 R09: 0000000000000000 [ 750.182632][T20325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 750.190443][T20325] R13: 0000000000000000 R14: 00007f0e0fbd0fa0 R15: 00007ffee3d1ced8 [ 750.198264][T20325] [ 751.622092][T20391] syz.0.6817[20391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 751.622182][T20391] syz.0.6817[20391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 751.815563][T20394] device syzkaller0 entered promiscuous mode [ 754.813871][T20480] ªªªªªª: renamed from vlan0 [ 755.178524][T20492] device veth1_macvtap left promiscuous mode [ 755.229846][T20492] device macsec0 entered promiscuous mode [ 756.794550][T20555] FAULT_INJECTION: forcing a failure. [ 756.794550][T20555] name failslab, interval 1, probability 0, space 0, times 0 [ 756.899682][T20555] CPU: 1 PID: 20555 Comm: syz.0.6872 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 756.910897][T20555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 756.920792][T20555] Call Trace: [ 756.923913][T20555] [ 756.926699][T20555] dump_stack_lvl+0x151/0x1c0 [ 756.931210][T20555] ? io_uring_drop_tctx_refs+0x190/0x190 [ 756.936673][T20555] ? avc_denied+0x1b0/0x1b0 [ 756.941016][T20555] dump_stack+0x15/0x20 [ 756.945004][T20555] should_fail+0x3c6/0x510 [ 756.949260][T20555] __should_failslab+0xa4/0xe0 [ 756.953857][T20555] ? vm_area_dup+0x26/0x230 [ 756.958199][T20555] should_failslab+0x9/0x20 [ 756.962540][T20555] slab_pre_alloc_hook+0x37/0xd0 [ 756.967311][T20555] ? vm_area_dup+0x26/0x230 [ 756.971649][T20555] kmem_cache_alloc+0x44/0x250 [ 756.976251][T20555] vm_area_dup+0x26/0x230 [ 756.980419][T20555] copy_mm+0x9a1/0x13e0 [ 756.984413][T20555] ? copy_signal+0x610/0x610 [ 756.988833][T20555] ? __init_rwsem+0xfe/0x1d0 [ 756.993263][T20555] ? copy_signal+0x4e3/0x610 [ 756.997690][T20555] copy_process+0x1149/0x3290 [ 757.002205][T20555] ? __kasan_check_write+0x14/0x20 [ 757.007151][T20555] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 757.012098][T20555] ? vfs_write+0x94d/0x1110 [ 757.016437][T20555] kernel_clone+0x21e/0x9e0 [ 757.020778][T20555] ? __kasan_check_write+0x14/0x20 [ 757.025732][T20555] ? create_io_thread+0x1e0/0x1e0 [ 757.030586][T20555] __x64_sys_clone+0x23f/0x290 [ 757.035185][T20555] ? __do_sys_vfork+0x130/0x130 [ 757.039874][T20555] ? debug_smp_processor_id+0x17/0x20 [ 757.045074][T20555] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 757.050979][T20555] ? exit_to_user_mode_prepare+0x39/0xa0 [ 757.056446][T20555] x64_sys_call+0x1b0/0x9a0 [ 757.060787][T20555] do_syscall_64+0x3b/0xb0 [ 757.065036][T20555] ? clear_bhb_loop+0x35/0x90 [ 757.069550][T20555] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 757.075278][T20555] RIP: 0033:0x7f0e0f9b8169 [ 757.079534][T20555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 757.098973][T20555] RSP: 002b:00007f0e0e021fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 757.107217][T20555] RAX: ffffffffffffffda RBX: 00007f0e0fbd0fa0 RCX: 00007f0e0f9b8169 [ 757.115035][T20555] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 757.122842][T20555] RBP: 00007f0e0e022090 R08: 0000000000000000 R09: 0000000000000000 [ 757.130651][T20555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 757.138462][T20555] R13: 0000000000000000 R14: 00007f0e0fbd0fa0 R15: 00007ffee3d1ced8 [ 757.146281][T20555] [ 758.049592][T20580] syz.1.6882[20580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.049678][T20580] syz.1.6882[20580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.983032][T20612] device sit0 left promiscuous mode [ 759.267515][T20616] device sit0 entered promiscuous mode [ 763.839795][T20719] ªªªªªª: renamed from vlan0 [ 765.204793][T20750] tun0: tun_chr_ioctl cmd 2147767517 [ 765.323227][T20744] device wg2 entered promiscuous mode [ 767.659919][T20791] tun0: tun_chr_ioctl cmd 2147767517 [ 767.738552][T20791] device wg2 entered promiscuous mode [ 767.945699][T20803] device veth0_vlan left promiscuous mode [ 768.030949][T20803] device veth0_vlan entered promiscuous mode [ 768.189671][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 768.210118][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 768.257873][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 768.740305][T20820] device sit0 entered promiscuous mode [ 771.240591][T20869] device sit0 entered promiscuous mode [ 773.697804][T20934] syz.3.6986[20934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 773.697894][T20934] syz.3.6986[20934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 773.996037][T20940] device syzkaller0 entered promiscuous mode [ 775.495779][T21002] FAULT_INJECTION: forcing a failure. [ 775.495779][T21002] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 775.539235][T21002] CPU: 0 PID: 21002 Comm: syz.6.7011 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 775.550549][T21002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 775.560443][T21002] Call Trace: [ 775.563577][T21002] [ 775.566341][T21002] dump_stack_lvl+0x151/0x1c0 [ 775.570858][T21002] ? io_uring_drop_tctx_refs+0x190/0x190 [ 775.576327][T21002] dump_stack+0x15/0x20 [ 775.580314][T21002] should_fail+0x3c6/0x510 [ 775.584572][T21002] should_fail_alloc_page+0x5a/0x80 [ 775.589605][T21002] prepare_alloc_pages+0x15c/0x700 [ 775.594566][T21002] ? __alloc_pages+0x8f0/0x8f0 [ 775.599155][T21002] ? __alloc_pages_bulk+0xd80/0xd80 [ 775.604183][T21002] __alloc_pages+0x18c/0x8f0 [ 775.608613][T21002] ? prep_new_page+0x110/0x110 [ 775.613320][T21002] ? __mod_node_page_state+0xac/0xf0 [ 775.618449][T21002] pte_alloc_one+0x73/0x1b0 [ 775.622786][T21002] ? pfn_modify_allowed+0x2f0/0x2f0 [ 775.627816][T21002] ? arch_stack_walk+0xf3/0x140 [ 775.632511][T21002] __pte_alloc+0x86/0x350 [ 775.636669][T21002] ? free_pgtables+0x280/0x280 [ 775.641270][T21002] ? _raw_spin_lock+0xa4/0x1b0 [ 775.645869][T21002] ? __kasan_check_write+0x14/0x20 [ 775.650819][T21002] copy_page_range+0x2743/0x2e20 [ 775.655604][T21002] ? pfn_valid+0x1e0/0x1e0 [ 775.659847][T21002] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 775.665398][T21002] ? __rb_insert_augmented+0x5de/0x610 [ 775.670695][T21002] copy_mm+0xc7e/0x13e0 [ 775.674687][T21002] ? copy_signal+0x610/0x610 [ 775.679123][T21002] ? __init_rwsem+0xfe/0x1d0 [ 775.683542][T21002] ? copy_signal+0x4e3/0x610 [ 775.687966][T21002] copy_process+0x1149/0x3290 [ 775.692478][T21002] ? __kasan_check_write+0x14/0x20 [ 775.697432][T21002] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 775.702370][T21002] ? vfs_write+0x94d/0x1110 [ 775.706716][T21002] kernel_clone+0x21e/0x9e0 [ 775.711050][T21002] ? __kasan_check_write+0x14/0x20 [ 775.715996][T21002] ? create_io_thread+0x1e0/0x1e0 [ 775.720860][T21002] __x64_sys_clone+0x23f/0x290 [ 775.725460][T21002] ? __do_sys_vfork+0x130/0x130 [ 775.730147][T21002] ? debug_smp_processor_id+0x17/0x20 [ 775.735355][T21002] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 775.741260][T21002] ? exit_to_user_mode_prepare+0x39/0xa0 [ 775.746722][T21002] x64_sys_call+0x1b0/0x9a0 [ 775.751062][T21002] do_syscall_64+0x3b/0xb0 [ 775.755315][T21002] ? clear_bhb_loop+0x35/0x90 [ 775.759829][T21002] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 775.765557][T21002] RIP: 0033:0x7f54bc96c169 [ 775.769810][T21002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 775.789249][T21002] RSP: 002b:00007f54bafd5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 775.797497][T21002] RAX: ffffffffffffffda RBX: 00007f54bcb84fa0 RCX: 00007f54bc96c169 [ 775.805326][T21002] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 775.813120][T21002] RBP: 00007f54bafd6090 R08: 0000000000000000 R09: 0000000000000000 [ 775.820928][T21002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 775.828739][T21002] R13: 0000000000000000 R14: 00007f54bcb84fa0 R15: 00007fff88cc0ff8 [ 775.836559][T21002] [ 776.524237][T21040] device syzkaller0 entered promiscuous mode [ 777.882766][T21090] device syzkaller0 entered promiscuous mode [ 778.644054][T21109] FAULT_INJECTION: forcing a failure. [ 778.644054][T21109] name failslab, interval 1, probability 0, space 0, times 0 [ 778.739219][T21109] CPU: 1 PID: 21109 Comm: syz.3.7046 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 778.750431][T21109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 778.760324][T21109] Call Trace: [ 778.763444][T21109] [ 778.766222][T21109] dump_stack_lvl+0x151/0x1c0 [ 778.770738][T21109] ? io_uring_drop_tctx_refs+0x190/0x190 [ 778.776207][T21109] dump_stack+0x15/0x20 [ 778.780195][T21109] should_fail+0x3c6/0x510 [ 778.784450][T21109] __should_failslab+0xa4/0xe0 [ 778.789067][T21109] ? anon_vma_clone+0x9a/0x500 [ 778.793650][T21109] should_failslab+0x9/0x20 [ 778.797990][T21109] slab_pre_alloc_hook+0x37/0xd0 [ 778.802764][T21109] ? anon_vma_clone+0x9a/0x500 [ 778.807364][T21109] kmem_cache_alloc+0x44/0x250 [ 778.811970][T21109] anon_vma_clone+0x9a/0x500 [ 778.816395][T21109] anon_vma_fork+0x91/0x4e0 [ 778.820730][T21109] ? anon_vma_name+0x43/0x70 [ 778.825157][T21109] ? vm_area_dup+0x17a/0x230 [ 778.829580][T21109] copy_mm+0xa3a/0x13e0 [ 778.833576][T21109] ? copy_signal+0x610/0x610 [ 778.837997][T21109] ? __init_rwsem+0xfe/0x1d0 [ 778.842429][T21109] ? copy_signal+0x4e3/0x610 [ 778.846860][T21109] copy_process+0x1149/0x3290 [ 778.851370][T21109] ? __kasan_check_write+0x14/0x20 [ 778.856319][T21109] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 778.861259][T21109] ? vfs_write+0x94d/0x1110 [ 778.865604][T21109] kernel_clone+0x21e/0x9e0 [ 778.869943][T21109] ? __kasan_check_write+0x14/0x20 [ 778.874889][T21109] ? create_io_thread+0x1e0/0x1e0 [ 778.879754][T21109] __x64_sys_clone+0x23f/0x290 [ 778.884350][T21109] ? __do_sys_vfork+0x130/0x130 [ 778.889038][T21109] ? debug_smp_processor_id+0x17/0x20 [ 778.894244][T21109] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 778.900146][T21109] ? exit_to_user_mode_prepare+0x39/0xa0 [ 778.905614][T21109] x64_sys_call+0x1b0/0x9a0 [ 778.909951][T21109] do_syscall_64+0x3b/0xb0 [ 778.914204][T21109] ? clear_bhb_loop+0x35/0x90 [ 778.918716][T21109] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 778.924448][T21109] RIP: 0033:0x7f3b7a586169 [ 778.928698][T21109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 778.948141][T21109] RSP: 002b:00007f3b78beffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 778.956387][T21109] RAX: ffffffffffffffda RBX: 00007f3b7a79efa0 RCX: 00007f3b7a586169 [ 778.964197][T21109] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 778.972011][T21109] RBP: 00007f3b78bf0090 R08: 0000000000000000 R09: 0000000000000000 [ 778.979816][T21109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 778.987625][T21109] R13: 0000000000000000 R14: 00007f3b7a79efa0 R15: 00007ffd32fb2f48 [ 778.995444][T21109] [ 781.303043][T21200] device pim6reg1 entered promiscuous mode [ 782.116034][T21244] FAULT_INJECTION: forcing a failure. [ 782.116034][T21244] name failslab, interval 1, probability 0, space 0, times 0 [ 782.227879][T21244] CPU: 1 PID: 21244 Comm: syz.1.7089 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 782.239096][T21244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 782.248994][T21244] Call Trace: [ 782.252115][T21244] [ 782.254890][T21244] dump_stack_lvl+0x151/0x1c0 [ 782.259405][T21244] ? io_uring_drop_tctx_refs+0x190/0x190 [ 782.264874][T21244] dump_stack+0x15/0x20 [ 782.268867][T21244] should_fail+0x3c6/0x510 [ 782.273121][T21244] __should_failslab+0xa4/0xe0 [ 782.277715][T21244] ? anon_vma_fork+0xf7/0x4e0 [ 782.282229][T21244] should_failslab+0x9/0x20 [ 782.286567][T21244] slab_pre_alloc_hook+0x37/0xd0 [ 782.291342][T21244] ? anon_vma_fork+0xf7/0x4e0 [ 782.295855][T21244] kmem_cache_alloc+0x44/0x250 [ 782.300461][T21244] anon_vma_fork+0xf7/0x4e0 [ 782.304870][T21244] ? anon_vma_name+0x4c/0x70 [ 782.309226][T21244] ? vm_area_dup+0x17a/0x230 [ 782.313649][T21244] copy_mm+0xa3a/0x13e0 [ 782.317645][T21244] ? copy_signal+0x610/0x610 [ 782.322066][T21244] ? __init_rwsem+0xfe/0x1d0 [ 782.326492][T21244] ? copy_signal+0x4e3/0x610 [ 782.330922][T21244] copy_process+0x1149/0x3290 [ 782.335433][T21244] ? __kasan_check_write+0x14/0x20 [ 782.340389][T21244] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 782.345328][T21244] ? vfs_write+0x94d/0x1110 [ 782.349672][T21244] kernel_clone+0x21e/0x9e0 [ 782.354006][T21244] ? __kasan_check_write+0x14/0x20 [ 782.358951][T21244] ? create_io_thread+0x1e0/0x1e0 [ 782.363817][T21244] __x64_sys_clone+0x23f/0x290 [ 782.368429][T21244] ? __do_sys_vfork+0x130/0x130 [ 782.373105][T21244] ? debug_smp_processor_id+0x17/0x20 [ 782.378310][T21244] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 782.384210][T21244] ? exit_to_user_mode_prepare+0x39/0xa0 [ 782.389679][T21244] x64_sys_call+0x1b0/0x9a0 [ 782.394020][T21244] do_syscall_64+0x3b/0xb0 [ 782.398271][T21244] ? clear_bhb_loop+0x35/0x90 [ 782.402783][T21244] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 782.408512][T21244] RIP: 0033:0x7f5d183f8169 [ 782.412765][T21244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 782.432210][T21244] RSP: 002b:00007f5d16a61fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 782.440449][T21244] RAX: ffffffffffffffda RBX: 00007f5d18610fa0 RCX: 00007f5d183f8169 [ 782.448263][T21244] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 782.456073][T21244] RBP: 00007f5d16a62090 R08: 0000000000000000 R09: 0000000000000000 [ 782.464001][T21244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 782.471806][T21244] R13: 0000000000000000 R14: 00007f5d18610fa0 R15: 00007ffdc10ebae8 [ 782.479630][T21244] [ 782.814358][T21281] tun0: tun_chr_ioctl cmd 1074812117 [ 783.981582][T21335] syz.0.7122[21335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 783.981671][T21335] syz.0.7122[21335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 784.559529][T21368] FAULT_INJECTION: forcing a failure. [ 784.559529][T21368] name failslab, interval 1, probability 0, space 0, times 0 [ 784.689498][T21368] CPU: 0 PID: 21368 Comm: syz.6.7136 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 784.700736][T21368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 784.710620][T21368] Call Trace: [ 784.713739][T21368] [ 784.716519][T21368] dump_stack_lvl+0x151/0x1c0 [ 784.721030][T21368] ? io_uring_drop_tctx_refs+0x190/0x190 [ 784.726519][T21368] dump_stack+0x15/0x20 [ 784.730489][T21368] should_fail+0x3c6/0x510 [ 784.734748][T21368] __should_failslab+0xa4/0xe0 [ 784.739347][T21368] ? anon_vma_fork+0xf7/0x4e0 [ 784.743858][T21368] should_failslab+0x9/0x20 [ 784.748198][T21368] slab_pre_alloc_hook+0x37/0xd0 [ 784.752969][T21368] ? anon_vma_fork+0xf7/0x4e0 [ 784.757480][T21368] kmem_cache_alloc+0x44/0x250 [ 784.762083][T21368] anon_vma_fork+0xf7/0x4e0 [ 784.766422][T21368] ? anon_vma_name+0x43/0x70 [ 784.770847][T21368] ? vm_area_dup+0x17a/0x230 [ 784.775274][T21368] copy_mm+0xa3a/0x13e0 [ 784.779273][T21368] ? copy_signal+0x610/0x610 [ 784.783704][T21368] ? __init_rwsem+0xfe/0x1d0 [ 784.788121][T21368] ? copy_signal+0x4e3/0x610 [ 784.792551][T21368] copy_process+0x1149/0x3290 [ 784.797066][T21368] ? __kasan_check_write+0x14/0x20 [ 784.802012][T21368] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 784.806951][T21368] ? vfs_write+0x94d/0x1110 [ 784.811417][T21368] kernel_clone+0x21e/0x9e0 [ 784.815748][T21368] ? __kasan_check_write+0x14/0x20 [ 784.820698][T21368] ? create_io_thread+0x1e0/0x1e0 [ 784.825563][T21368] __x64_sys_clone+0x23f/0x290 [ 784.830161][T21368] ? __do_sys_vfork+0x130/0x130 [ 784.834847][T21368] ? debug_smp_processor_id+0x17/0x20 [ 784.840053][T21368] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 784.845953][T21368] ? exit_to_user_mode_prepare+0x39/0xa0 [ 784.851428][T21368] x64_sys_call+0x1b0/0x9a0 [ 784.855759][T21368] do_syscall_64+0x3b/0xb0 [ 784.860012][T21368] ? clear_bhb_loop+0x35/0x90 [ 784.864527][T21368] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 784.870255][T21368] RIP: 0033:0x7f54bc96c169 [ 784.874505][T21368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 784.893954][T21368] RSP: 002b:00007f54bafd5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 784.902197][T21368] RAX: ffffffffffffffda RBX: 00007f54bcb84fa0 RCX: 00007f54bc96c169 [ 784.910002][T21368] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 784.917815][T21368] RBP: 00007f54bafd6090 R08: 0000000000000000 R09: 0000000000000000 [ 784.925625][T21368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 784.933439][T21368] R13: 0000000000000000 R14: 00007f54bcb84fa0 R15: 00007fff88cc0ff8 [ 784.941258][T21368] [ 785.719714][T21408] FAULT_INJECTION: forcing a failure. [ 785.719714][T21408] name failslab, interval 1, probability 0, space 0, times 0 [ 785.747569][T21408] CPU: 0 PID: 21408 Comm: syz.3.7149 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 785.758784][T21408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 785.768678][T21408] Call Trace: [ 785.771798][T21408] [ 785.774576][T21408] dump_stack_lvl+0x151/0x1c0 [ 785.779090][T21408] ? io_uring_drop_tctx_refs+0x190/0x190 [ 785.784564][T21408] dump_stack+0x15/0x20 [ 785.788552][T21408] should_fail+0x3c6/0x510 [ 785.792804][T21408] __should_failslab+0xa4/0xe0 [ 785.797404][T21408] should_failslab+0x9/0x20 [ 785.801742][T21408] slab_pre_alloc_hook+0x37/0xd0 [ 785.806521][T21408] ? __request_module+0x2ad/0x8e0 [ 785.811376][T21408] __kmalloc_track_caller+0x6c/0x2c0 [ 785.816498][T21408] ? __request_module+0x2ad/0x8e0 [ 785.821358][T21408] ? __kasan_kmalloc+0x9/0x10 [ 785.825876][T21408] kstrdup+0x34/0x70 [ 785.829602][T21408] __request_module+0x2ad/0x8e0 [ 785.834294][T21408] ? capable+0x78/0xe0 [ 785.838201][T21408] ? _trace_android_vh_delayacct_thrashing_end+0x120/0x120 [ 785.845232][T21408] ? security_capable+0x87/0xb0 [ 785.849913][T21408] dev_load+0x5b/0xb0 [ 785.853734][T21408] dev_ioctl+0x30f/0xe70 [ 785.857815][T21408] sock_do_ioctl+0x34f/0x5a0 [ 785.862242][T21408] ? sock_show_fdinfo+0xa0/0xa0 [ 785.866929][T21408] ? selinux_file_ioctl+0x3cc/0x540 [ 785.871957][T21408] sock_ioctl+0x455/0x740 [ 785.876125][T21408] ? sock_poll+0x400/0x400 [ 785.880376][T21408] ? __fget_files+0x31e/0x380 [ 785.884891][T21408] ? security_file_ioctl+0x84/0xb0 [ 785.889837][T21408] ? sock_poll+0x400/0x400 [ 785.894093][T21408] __se_sys_ioctl+0x114/0x190 [ 785.898608][T21408] __x64_sys_ioctl+0x7b/0x90 [ 785.903033][T21408] x64_sys_call+0x98/0x9a0 [ 785.907280][T21408] do_syscall_64+0x3b/0xb0 [ 785.911533][T21408] ? clear_bhb_loop+0x35/0x90 [ 785.916049][T21408] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 785.921775][T21408] RIP: 0033:0x7f3b7a586169 [ 785.926028][T21408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 785.945476][T21408] RSP: 002b:00007f3b78bf0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 785.953719][T21408] RAX: ffffffffffffffda RBX: 00007f3b7a79efa0 RCX: 00007f3b7a586169 [ 785.961526][T21408] RDX: 0000200000000000 RSI: 0000000000008923 RDI: 000000000000000b [ 785.969341][T21408] RBP: 00007f3b78bf0090 R08: 0000000000000000 R09: 0000000000000000 [ 785.977150][T21408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 785.984963][T21408] R13: 0000000000000000 R14: 00007f3b7a79efa0 R15: 00007ffd32fb2f48 [ 785.992773][T21408] [ 785.999425][ T30] audit: type=1400 audit(1744343902.306:184): avc: denied { sys_module } for pid=21407 comm="syz.3.7149" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 786.060800][T21412] device veth0_vlan left promiscuous mode [ 786.078420][T21412] device veth0_vlan entered promiscuous mode [ 786.116426][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 786.124533][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 786.133471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 786.192235][T21430] syz.0.7156[21430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 786.192322][T21430] syz.0.7156[21430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 787.199977][T21462] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 788.093440][T21477] FAULT_INJECTION: forcing a failure. [ 788.093440][T21477] name failslab, interval 1, probability 0, space 0, times 0 [ 788.235965][T21477] CPU: 0 PID: 21477 Comm: syz.6.7173 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 788.247185][T21477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 788.257072][T21477] Call Trace: [ 788.260193][T21477] [ 788.262971][T21477] dump_stack_lvl+0x151/0x1c0 [ 788.267482][T21477] ? io_uring_drop_tctx_refs+0x190/0x190 [ 788.272956][T21477] dump_stack+0x15/0x20 [ 788.276943][T21477] should_fail+0x3c6/0x510 [ 788.281198][T21477] __should_failslab+0xa4/0xe0 [ 788.285801][T21477] ? anon_vma_clone+0x9a/0x500 [ 788.290396][T21477] should_failslab+0x9/0x20 [ 788.294736][T21477] slab_pre_alloc_hook+0x37/0xd0 [ 788.299509][T21477] ? anon_vma_clone+0x9a/0x500 [ 788.304119][T21477] kmem_cache_alloc+0x44/0x250 [ 788.308712][T21477] anon_vma_clone+0x9a/0x500 [ 788.313144][T21477] anon_vma_fork+0x91/0x4e0 [ 788.317475][T21477] ? anon_vma_name+0x4c/0x70 [ 788.321905][T21477] ? vm_area_dup+0x17a/0x230 [ 788.326328][T21477] copy_mm+0xa3a/0x13e0 [ 788.330323][T21477] ? copy_signal+0x610/0x610 [ 788.334746][T21477] ? __init_rwsem+0xfe/0x1d0 [ 788.339171][T21477] ? copy_signal+0x4e3/0x610 [ 788.343605][T21477] copy_process+0x1149/0x3290 [ 788.348133][T21477] ? __kasan_check_write+0x14/0x20 [ 788.353065][T21477] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 788.358005][T21477] ? vfs_write+0x94d/0x1110 [ 788.362616][T21477] kernel_clone+0x21e/0x9e0 [ 788.366959][T21477] ? __kasan_check_write+0x14/0x20 [ 788.371898][T21477] ? create_io_thread+0x1e0/0x1e0 [ 788.376763][T21477] __x64_sys_clone+0x23f/0x290 [ 788.381362][T21477] ? __do_sys_vfork+0x130/0x130 [ 788.386052][T21477] ? debug_smp_processor_id+0x17/0x20 [ 788.391259][T21477] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 788.397153][T21477] ? exit_to_user_mode_prepare+0x39/0xa0 [ 788.402621][T21477] x64_sys_call+0x1b0/0x9a0 [ 788.407055][T21477] do_syscall_64+0x3b/0xb0 [ 788.411308][T21477] ? clear_bhb_loop+0x35/0x90 [ 788.415821][T21477] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 788.421554][T21477] RIP: 0033:0x7f54bc96c169 [ 788.425804][T21477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 788.445248][T21477] RSP: 002b:00007f54bafd5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 788.453496][T21477] RAX: ffffffffffffffda RBX: 00007f54bcb84fa0 RCX: 00007f54bc96c169 [ 788.461303][T21477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 788.469114][T21477] RBP: 00007f54bafd6090 R08: 0000000000000000 R09: 0000000000000000 [ 788.476943][T21477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 788.484735][T21477] R13: 0000000000000000 R14: 00007f54bcb84fa0 R15: 00007fff88cc0ff8 [ 788.492556][T21477] [ 790.453024][T21531] device syzkaller0 entered promiscuous mode [ 790.866486][T21552] syz.6.7200[21552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 790.866567][T21552] syz.6.7200[21552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 791.322267][T21573] device wg2 left promiscuous mode [ 791.451445][T21576] device wg2 entered promiscuous mode [ 791.705837][T21593] device veth0_vlan left promiscuous mode [ 791.720520][T21593] device veth0_vlan entered promiscuous mode [ 791.758664][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 791.770893][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 791.791970][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 791.840863][T21599] device veth1_macvtap entered promiscuous mode [ 791.885580][T21599] device macsec0 entered promiscuous mode [ 791.972264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 793.611120][T21634] device sit0 left promiscuous mode [ 795.176681][T21667] syz.6.7234[21667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 795.176767][T21667] syz.6.7234[21667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 795.381576][T21675] device veth1_macvtap left promiscuous mode [ 795.654469][T21675] device macsec0 left promiscuous mode [ 795.839304][T21681] device veth1_macvtap entered promiscuous mode [ 795.920641][T21681] device macsec0 entered promiscuous mode [ 796.181418][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 796.547429][T21708] FAULT_INJECTION: forcing a failure. [ 796.547429][T21708] name failslab, interval 1, probability 0, space 0, times 0 [ 796.619206][T21708] CPU: 1 PID: 21708 Comm: syz.1.7248 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 796.630426][T21708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 796.640482][T21708] Call Trace: [ 796.643608][T21708] [ 796.646386][T21708] dump_stack_lvl+0x151/0x1c0 [ 796.650903][T21708] ? io_uring_drop_tctx_refs+0x190/0x190 [ 796.656369][T21708] ? avc_denied+0x1b0/0x1b0 [ 796.660709][T21708] dump_stack+0x15/0x20 [ 796.664700][T21708] should_fail+0x3c6/0x510 [ 796.668954][T21708] __should_failslab+0xa4/0xe0 [ 796.673554][T21708] ? vm_area_dup+0x26/0x230 [ 796.677890][T21708] should_failslab+0x9/0x20 [ 796.682228][T21708] slab_pre_alloc_hook+0x37/0xd0 [ 796.687007][T21708] ? vm_area_dup+0x26/0x230 [ 796.691352][T21708] kmem_cache_alloc+0x44/0x250 [ 796.695942][T21708] vm_area_dup+0x26/0x230 [ 796.700109][T21708] copy_mm+0x9a1/0x13e0 [ 796.704103][T21708] ? copy_signal+0x610/0x610 [ 796.708527][T21708] ? __init_rwsem+0xfe/0x1d0 [ 796.712955][T21708] ? copy_signal+0x4e3/0x610 [ 796.717382][T21708] copy_process+0x1149/0x3290 [ 796.721898][T21708] ? __kasan_check_write+0x14/0x20 [ 796.726846][T21708] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 796.731789][T21708] ? vfs_write+0x94d/0x1110 [ 796.736133][T21708] kernel_clone+0x21e/0x9e0 [ 796.740469][T21708] ? __kasan_check_write+0x14/0x20 [ 796.745417][T21708] ? create_io_thread+0x1e0/0x1e0 [ 796.750279][T21708] __x64_sys_clone+0x23f/0x290 [ 796.754875][T21708] ? __do_sys_vfork+0x130/0x130 [ 796.759563][T21708] ? debug_smp_processor_id+0x17/0x20 [ 796.764769][T21708] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 796.770670][T21708] ? exit_to_user_mode_prepare+0x39/0xa0 [ 796.776139][T21708] x64_sys_call+0x1b0/0x9a0 [ 796.780479][T21708] do_syscall_64+0x3b/0xb0 [ 796.784732][T21708] ? clear_bhb_loop+0x35/0x90 [ 796.789242][T21708] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 796.795057][T21708] RIP: 0033:0x7f5d183f8169 [ 796.799309][T21708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 796.818756][T21708] RSP: 002b:00007f5d16a61fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 796.826999][T21708] RAX: ffffffffffffffda RBX: 00007f5d18610fa0 RCX: 00007f5d183f8169 [ 796.834807][T21708] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 796.842621][T21708] RBP: 00007f5d16a62090 R08: 0000000000000000 R09: 0000000000000000 [ 796.850432][T21708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 796.858241][T21708] R13: 0000000000000000 R14: 00007f5d18610fa0 R15: 00007ffdc10ebae8 [ 796.866061][T21708] [ 797.430658][T21727] device syzkaller0 entered promiscuous mode [ 799.402590][T21774] device veth1_macvtap left promiscuous mode [ 799.587121][T21774] device veth1_macvtap entered promiscuous mode [ 799.596801][T21774] device macsec0 entered promiscuous mode [ 799.716339][ T435] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 800.963194][T21816] device veth1_macvtap left promiscuous mode [ 801.325258][T21817] device veth1_macvtap entered promiscuous mode [ 801.455945][T21817] device macsec0 entered promiscuous mode [ 803.073727][T21875] FAULT_INJECTION: forcing a failure. [ 803.073727][T21875] name failslab, interval 1, probability 0, space 0, times 0 [ 803.096726][T21875] CPU: 0 PID: 21875 Comm: syz.6.7302 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 803.107935][T21875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 803.117844][T21875] Call Trace: [ 803.120946][T21875] [ 803.123729][T21875] dump_stack_lvl+0x151/0x1c0 [ 803.128239][T21875] ? io_uring_drop_tctx_refs+0x190/0x190 [ 803.133714][T21875] dump_stack+0x15/0x20 [ 803.137699][T21875] should_fail+0x3c6/0x510 [ 803.141957][T21875] __should_failslab+0xa4/0xe0 [ 803.146552][T21875] ? anon_vma_fork+0x1df/0x4e0 [ 803.151153][T21875] should_failslab+0x9/0x20 [ 803.155490][T21875] slab_pre_alloc_hook+0x37/0xd0 [ 803.160267][T21875] ? anon_vma_fork+0x1df/0x4e0 [ 803.164866][T21875] kmem_cache_alloc+0x44/0x250 [ 803.169465][T21875] anon_vma_fork+0x1df/0x4e0 [ 803.173895][T21875] copy_mm+0xa3a/0x13e0 [ 803.177892][T21875] ? copy_signal+0x610/0x610 [ 803.182310][T21875] ? __init_rwsem+0xfe/0x1d0 [ 803.186736][T21875] ? copy_signal+0x4e3/0x610 [ 803.191169][T21875] copy_process+0x1149/0x3290 [ 803.195678][T21875] ? __kasan_check_write+0x14/0x20 [ 803.200629][T21875] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 803.205567][T21875] ? vfs_write+0x94d/0x1110 [ 803.209915][T21875] kernel_clone+0x21e/0x9e0 [ 803.214249][T21875] ? __kasan_check_write+0x14/0x20 [ 803.219200][T21875] ? create_io_thread+0x1e0/0x1e0 [ 803.224060][T21875] __x64_sys_clone+0x23f/0x290 [ 803.228659][T21875] ? __do_sys_vfork+0x130/0x130 [ 803.233349][T21875] ? debug_smp_processor_id+0x17/0x20 [ 803.238554][T21875] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 803.244734][T21875] ? exit_to_user_mode_prepare+0x39/0xa0 [ 803.250187][T21875] x64_sys_call+0x1b0/0x9a0 [ 803.254520][T21875] do_syscall_64+0x3b/0xb0 [ 803.258774][T21875] ? clear_bhb_loop+0x35/0x90 [ 803.263290][T21875] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 803.269017][T21875] RIP: 0033:0x7f54bc96c169 [ 803.273266][T21875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 803.292715][T21875] RSP: 002b:00007f54bafd5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 803.300955][T21875] RAX: ffffffffffffffda RBX: 00007f54bcb84fa0 RCX: 00007f54bc96c169 [ 803.308767][T21875] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 803.316577][T21875] RBP: 00007f54bafd6090 R08: 0000000000000000 R09: 0000000000000000 [ 803.324388][T21875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 803.332203][T21875] R13: 0000000000000000 R14: 00007f54bcb84fa0 R15: 00007fff88cc0ff8 [ 803.340023][T21875] [ 804.282978][T21903] syz.1.7311[21903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 804.283069][T21903] syz.1.7311[21903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 805.676256][T21976] FAULT_INJECTION: forcing a failure. [ 805.676256][T21976] name failslab, interval 1, probability 0, space 0, times 0 [ 805.794358][T21976] CPU: 1 PID: 21976 Comm: syz.3.7337 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 805.805576][T21976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 805.815466][T21976] Call Trace: [ 805.818592][T21976] [ 805.821366][T21976] dump_stack_lvl+0x151/0x1c0 [ 805.825881][T21976] ? io_uring_drop_tctx_refs+0x190/0x190 [ 805.831351][T21976] dump_stack+0x15/0x20 [ 805.835341][T21976] should_fail+0x3c6/0x510 [ 805.839714][T21976] __should_failslab+0xa4/0xe0 [ 805.844307][T21976] ? anon_vma_fork+0xf7/0x4e0 [ 805.848820][T21976] should_failslab+0x9/0x20 [ 805.853160][T21976] slab_pre_alloc_hook+0x37/0xd0 [ 805.857935][T21976] ? anon_vma_fork+0xf7/0x4e0 [ 805.862448][T21976] kmem_cache_alloc+0x44/0x250 [ 805.867050][T21976] anon_vma_fork+0xf7/0x4e0 [ 805.871385][T21976] ? anon_vma_name+0x4c/0x70 [ 805.875814][T21976] ? vm_area_dup+0x17a/0x230 [ 805.880241][T21976] copy_mm+0xa3a/0x13e0 [ 805.884237][T21976] ? copy_signal+0x610/0x610 [ 805.888657][T21976] ? __init_rwsem+0xfe/0x1d0 [ 805.893086][T21976] ? copy_signal+0x4e3/0x610 [ 805.897509][T21976] copy_process+0x1149/0x3290 [ 805.902024][T21976] ? __kasan_check_write+0x14/0x20 [ 805.906976][T21976] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 805.911920][T21976] ? vfs_write+0x94d/0x1110 [ 805.916262][T21976] kernel_clone+0x21e/0x9e0 [ 805.920601][T21976] ? __kasan_check_write+0x14/0x20 [ 805.925544][T21976] ? create_io_thread+0x1e0/0x1e0 [ 805.930407][T21976] __x64_sys_clone+0x23f/0x290 [ 805.935007][T21976] ? __do_sys_vfork+0x130/0x130 [ 805.939694][T21976] ? debug_smp_processor_id+0x17/0x20 [ 805.944896][T21976] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 805.950802][T21976] ? exit_to_user_mode_prepare+0x39/0xa0 [ 805.956267][T21976] x64_sys_call+0x1b0/0x9a0 [ 805.960623][T21976] do_syscall_64+0x3b/0xb0 [ 805.964861][T21976] ? clear_bhb_loop+0x35/0x90 [ 805.969372][T21976] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 805.975101][T21976] RIP: 0033:0x7f3b7a586169 [ 805.979355][T21976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 805.998796][T21976] RSP: 002b:00007f3b78beffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 806.007043][T21976] RAX: ffffffffffffffda RBX: 00007f3b7a79efa0 RCX: 00007f3b7a586169 [ 806.014853][T21976] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 806.022666][T21976] RBP: 00007f3b78bf0090 R08: 0000000000000000 R09: 0000000000000000 [ 806.030472][T21976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 806.038295][T21976] R13: 0000000000000000 R14: 00007f3b7a79efa0 R15: 00007ffd32fb2f48 [ 806.046109][T21976] [ 809.226123][T22092] device sit0 entered promiscuous mode [ 811.924445][T22167] device sit0 left promiscuous mode [ 812.127301][T22168] device sit0 entered promiscuous mode [ 814.277981][T22246] pimreg0: mtu greater than device maximum [ 814.698791][T22246] device syzkaller0 entered promiscuous mode [ 814.894681][T22267] device macsec0 left promiscuous mode [ 814.902277][T22267] device veth1_macvtap entered promiscuous mode [ 814.908442][T22267] device macsec0 entered promiscuous mode [ 814.915052][ T435] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 815.639877][ T30] audit: type=1400 audit(1744343931.946:185): avc: denied { create } for pid=22282 comm="syz.0.7447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 815.958518][T22294] device sit0 left promiscuous mode [ 816.015799][T22299] device pim6reg1 entered promiscuous mode [ 816.043048][T22301] device sit0 entered promiscuous mode [ 817.386025][T22336] ref_ctr_offset mismatch. inode: 0x2f7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 819.932567][T22413] FAULT_INJECTION: forcing a failure. [ 819.932567][T22413] name failslab, interval 1, probability 0, space 0, times 0 [ 819.992118][ T30] audit: type=1400 audit(1744343936.296:186): avc: denied { create } for pid=22411 comm="syz.6.7490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 820.036424][T22413] CPU: 1 PID: 22413 Comm: syz.2.7491 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 820.047641][T22413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 820.057531][T22413] Call Trace: [ 820.060654][T22413] [ 820.063430][T22413] dump_stack_lvl+0x151/0x1c0 [ 820.067944][T22413] ? io_uring_drop_tctx_refs+0x190/0x190 [ 820.073417][T22413] dump_stack+0x15/0x20 [ 820.077401][T22413] should_fail+0x3c6/0x510 [ 820.081661][T22413] __should_failslab+0xa4/0xe0 [ 820.086265][T22413] ? anon_vma_clone+0x9a/0x500 [ 820.090861][T22413] should_failslab+0x9/0x20 [ 820.095196][T22413] slab_pre_alloc_hook+0x37/0xd0 [ 820.099977][T22413] ? anon_vma_clone+0x9a/0x500 [ 820.104572][T22413] kmem_cache_alloc+0x44/0x250 [ 820.109168][T22413] anon_vma_clone+0x9a/0x500 [ 820.113596][T22413] anon_vma_fork+0x91/0x4e0 [ 820.117934][T22413] ? anon_vma_name+0x43/0x70 [ 820.122358][T22413] ? vm_area_dup+0x17a/0x230 [ 820.126784][T22413] copy_mm+0xa3a/0x13e0 [ 820.130784][T22413] ? copy_signal+0x610/0x610 [ 820.135204][T22413] ? __init_rwsem+0xfe/0x1d0 [ 820.139633][T22413] ? copy_signal+0x4e3/0x610 [ 820.144059][T22413] copy_process+0x1149/0x3290 [ 820.148569][T22413] ? __kasan_check_write+0x14/0x20 [ 820.153522][T22413] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 820.158461][T22413] ? vfs_write+0x94d/0x1110 [ 820.162808][T22413] kernel_clone+0x21e/0x9e0 [ 820.167142][T22413] ? __kasan_check_write+0x14/0x20 [ 820.172105][T22413] ? create_io_thread+0x1e0/0x1e0 [ 820.176967][T22413] __x64_sys_clone+0x23f/0x290 [ 820.181553][T22413] ? __do_sys_vfork+0x130/0x130 [ 820.186238][T22413] ? debug_smp_processor_id+0x17/0x20 [ 820.191446][T22413] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 820.197347][T22413] ? exit_to_user_mode_prepare+0x39/0xa0 [ 820.202816][T22413] x64_sys_call+0x1b0/0x9a0 [ 820.207154][T22413] do_syscall_64+0x3b/0xb0 [ 820.211413][T22413] ? clear_bhb_loop+0x35/0x90 [ 820.215919][T22413] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 820.221651][T22413] RIP: 0033:0x7ffbadacb169 [ 820.225902][T22413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 820.245341][T22413] RSP: 002b:00007ffbac134fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 820.253586][T22413] RAX: ffffffffffffffda RBX: 00007ffbadce3fa0 RCX: 00007ffbadacb169 [ 820.261401][T22413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 820.269209][T22413] RBP: 00007ffbac135090 R08: 0000000000000000 R09: 0000000000000000 [ 820.277021][T22413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 820.284833][T22413] R13: 0000000000000000 R14: 00007ffbadce3fa0 R15: 00007ffef12c3e58 [ 820.292657][T22413] [ 823.389847][T22502] FAULT_INJECTION: forcing a failure. [ 823.389847][T22502] name failslab, interval 1, probability 0, space 0, times 0 [ 823.403458][T22502] CPU: 0 PID: 22502 Comm: syz.6.7523 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 823.414657][T22502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 823.424549][T22502] Call Trace: [ 823.427674][T22502] [ 823.430450][T22502] dump_stack_lvl+0x151/0x1c0 [ 823.434962][T22502] ? io_uring_drop_tctx_refs+0x190/0x190 [ 823.440431][T22502] dump_stack+0x15/0x20 [ 823.444422][T22502] should_fail+0x3c6/0x510 [ 823.448763][T22502] __should_failslab+0xa4/0xe0 [ 823.453364][T22502] ? anon_vma_fork+0xf7/0x4e0 [ 823.457875][T22502] should_failslab+0x9/0x20 [ 823.462212][T22502] slab_pre_alloc_hook+0x37/0xd0 [ 823.467003][T22502] ? anon_vma_fork+0xf7/0x4e0 [ 823.471501][T22502] kmem_cache_alloc+0x44/0x250 [ 823.476104][T22502] anon_vma_fork+0xf7/0x4e0 [ 823.480442][T22502] ? anon_vma_name+0x43/0x70 [ 823.484883][T22502] ? vm_area_dup+0x17a/0x230 [ 823.489293][T22502] copy_mm+0xa3a/0x13e0 [ 823.493295][T22502] ? copy_signal+0x610/0x610 [ 823.497712][T22502] ? __init_rwsem+0xfe/0x1d0 [ 823.502140][T22502] ? copy_signal+0x4e3/0x610 [ 823.506568][T22502] copy_process+0x1149/0x3290 [ 823.511339][T22502] ? __kasan_check_write+0x14/0x20 [ 823.516288][T22502] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 823.521231][T22502] ? vfs_write+0x94d/0x1110 [ 823.525576][T22502] kernel_clone+0x21e/0x9e0 [ 823.529912][T22502] ? __kasan_check_write+0x14/0x20 [ 823.534860][T22502] ? create_io_thread+0x1e0/0x1e0 [ 823.539723][T22502] __x64_sys_clone+0x23f/0x290 [ 823.544320][T22502] ? __do_sys_vfork+0x130/0x130 [ 823.549010][T22502] ? debug_smp_processor_id+0x17/0x20 [ 823.554216][T22502] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 823.560114][T22502] ? exit_to_user_mode_prepare+0x39/0xa0 [ 823.565587][T22502] x64_sys_call+0x1b0/0x9a0 [ 823.569922][T22502] do_syscall_64+0x3b/0xb0 [ 823.574177][T22502] ? clear_bhb_loop+0x35/0x90 [ 823.578690][T22502] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 823.584416][T22502] RIP: 0033:0x7f54bc96c169 [ 823.588676][T22502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 823.608114][T22502] RSP: 002b:00007f54bafd5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 823.616449][T22502] RAX: ffffffffffffffda RBX: 00007f54bcb84fa0 RCX: 00007f54bc96c169 [ 823.624261][T22502] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 823.632067][T22502] RBP: 00007f54bafd6090 R08: 0000000000000000 R09: 0000000000000000 [ 823.639874][T22502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 823.647688][T22502] R13: 0000000000000000 R14: 00007f54bcb84fa0 R15: 00007fff88cc0ff8 [ 823.655597][T22502] [ 824.878632][T22542] ªªªªªª: renamed from vlan0 [ 826.847183][T22594] FAULT_INJECTION: forcing a failure. [ 826.847183][T22594] name failslab, interval 1, probability 0, space 0, times 0 [ 826.877703][T22594] CPU: 1 PID: 22594 Comm: syz.1.7556 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 826.888920][T22594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 826.898811][T22594] Call Trace: [ 826.901937][T22594] [ 826.904713][T22594] dump_stack_lvl+0x151/0x1c0 [ 826.909232][T22594] ? io_uring_drop_tctx_refs+0x190/0x190 [ 826.914698][T22594] dump_stack+0x15/0x20 [ 826.918684][T22594] should_fail+0x3c6/0x510 [ 826.922942][T22594] __should_failslab+0xa4/0xe0 [ 826.927534][T22594] ? anon_vma_fork+0xf7/0x4e0 [ 826.932055][T22594] should_failslab+0x9/0x20 [ 826.936390][T22594] slab_pre_alloc_hook+0x37/0xd0 [ 826.941166][T22594] ? anon_vma_fork+0xf7/0x4e0 [ 826.945679][T22594] kmem_cache_alloc+0x44/0x250 [ 826.950284][T22594] anon_vma_fork+0xf7/0x4e0 [ 826.954617][T22594] ? anon_vma_name+0x4c/0x70 [ 826.959043][T22594] ? vm_area_dup+0x17a/0x230 [ 826.963471][T22594] copy_mm+0xa3a/0x13e0 [ 826.967465][T22594] ? copy_signal+0x610/0x610 [ 826.971893][T22594] ? __init_rwsem+0xfe/0x1d0 [ 826.976315][T22594] ? copy_signal+0x4e3/0x610 [ 826.980744][T22594] copy_process+0x1149/0x3290 [ 826.985256][T22594] ? __kasan_check_write+0x14/0x20 [ 826.990211][T22594] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 826.995147][T22594] ? vfs_write+0x94d/0x1110 [ 826.999494][T22594] kernel_clone+0x21e/0x9e0 [ 827.003834][T22594] ? __kasan_check_write+0x14/0x20 [ 827.008778][T22594] ? create_io_thread+0x1e0/0x1e0 [ 827.013639][T22594] __x64_sys_clone+0x23f/0x290 [ 827.018237][T22594] ? __do_sys_vfork+0x130/0x130 [ 827.022930][T22594] ? debug_smp_processor_id+0x17/0x20 [ 827.028132][T22594] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 827.034032][T22594] ? exit_to_user_mode_prepare+0x39/0xa0 [ 827.039521][T22594] x64_sys_call+0x1b0/0x9a0 [ 827.043841][T22594] do_syscall_64+0x3b/0xb0 [ 827.048089][T22594] ? clear_bhb_loop+0x35/0x90 [ 827.052608][T22594] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 827.058336][T22594] RIP: 0033:0x7f5d183f8169 [ 827.062590][T22594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 827.082031][T22594] RSP: 002b:00007f5d16a61fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 827.090269][T22594] RAX: ffffffffffffffda RBX: 00007f5d18610fa0 RCX: 00007f5d183f8169 [ 827.098080][T22594] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 827.105895][T22594] RBP: 00007f5d16a62090 R08: 0000000000000000 R09: 0000000000000000 [ 827.113706][T22594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 827.121519][T22594] R13: 0000000000000000 R14: 00007f5d18610fa0 R15: 00007ffdc10ebae8 [ 827.129334][T22594] [ 827.251298][T22604] device sit0 left promiscuous mode [ 829.720692][T22697] FAULT_INJECTION: forcing a failure. [ 829.720692][T22697] name failslab, interval 1, probability 0, space 0, times 0 [ 829.878030][T22697] CPU: 1 PID: 22697 Comm: syz.3.7592 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 829.889330][T22697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 829.899233][T22697] Call Trace: [ 829.902344][T22697] [ 829.905122][T22697] dump_stack_lvl+0x151/0x1c0 [ 829.909634][T22697] ? io_uring_drop_tctx_refs+0x190/0x190 [ 829.915100][T22697] dump_stack+0x15/0x20 [ 829.919092][T22697] should_fail+0x3c6/0x510 [ 829.923352][T22697] __should_failslab+0xa4/0xe0 [ 829.927946][T22697] ? anon_vma_fork+0x1df/0x4e0 [ 829.932548][T22697] should_failslab+0x9/0x20 [ 829.936885][T22697] slab_pre_alloc_hook+0x37/0xd0 [ 829.941659][T22697] ? anon_vma_fork+0x1df/0x4e0 [ 829.946258][T22697] kmem_cache_alloc+0x44/0x250 [ 829.950862][T22697] anon_vma_fork+0x1df/0x4e0 [ 829.955289][T22697] copy_mm+0xa3a/0x13e0 [ 829.959294][T22697] ? copy_signal+0x610/0x610 [ 829.963704][T22697] ? __init_rwsem+0xfe/0x1d0 [ 829.968132][T22697] ? copy_signal+0x4e3/0x610 [ 829.972561][T22697] copy_process+0x1149/0x3290 [ 829.977075][T22697] ? __kasan_check_write+0x14/0x20 [ 829.982023][T22697] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 829.986960][T22697] ? vfs_write+0x94d/0x1110 [ 829.991308][T22697] kernel_clone+0x21e/0x9e0 [ 829.995646][T22697] ? __kasan_check_write+0x14/0x20 [ 830.000591][T22697] ? create_io_thread+0x1e0/0x1e0 [ 830.005458][T22697] __x64_sys_clone+0x23f/0x290 [ 830.010055][T22697] ? __do_sys_vfork+0x130/0x130 [ 830.014746][T22697] ? debug_smp_processor_id+0x17/0x20 [ 830.019945][T22697] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 830.025852][T22697] ? exit_to_user_mode_prepare+0x39/0xa0 [ 830.031318][T22697] x64_sys_call+0x1b0/0x9a0 [ 830.035654][T22697] do_syscall_64+0x3b/0xb0 [ 830.039905][T22697] ? clear_bhb_loop+0x35/0x90 [ 830.044417][T22697] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 830.050145][T22697] RIP: 0033:0x7f3b7a586169 [ 830.054401][T22697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 830.073843][T22697] RSP: 002b:00007f3b78beffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 830.082084][T22697] RAX: ffffffffffffffda RBX: 00007f3b7a79efa0 RCX: 00007f3b7a586169 [ 830.089898][T22697] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 830.097707][T22697] RBP: 00007f3b78bf0090 R08: 0000000000000000 R09: 0000000000000000 [ 830.105521][T22697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 830.113328][T22697] R13: 0000000000000000 R14: 00007f3b7a79efa0 R15: 00007ffd32fb2f48 [ 830.121148][T22697] [ 831.670454][T22753] device pim6reg1 entered promiscuous mode [ 832.267726][T22772] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 832.279285][T22772] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 832.287527][T22772] CPU: 0 PID: 22772 Comm: syz.3.7609 Tainted: G W 5.15.178-syzkaller-00260-g760764029c6d #0 [ 832.298727][T22772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 832.308618][T22772] RIP: 0010:__rb_erase_color+0x10e/0xa60 [ 832.314223][T22772] Code: 89 ff e8 75 74 2a ff 4c 8b 6d d0 4d 89 2f 4c 89 eb 48 83 cb 01 4c 8b 7d c0 4c 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ff e8 44 74 2a ff 49 89 1f 4c 89 eb 48 c1 [ 832.333663][T22772] RSP: 0018:ffffc90000b97a20 EFLAGS: 00010246 [ 832.339565][T22772] RAX: 0000000000000000 RBX: ffff88812eb5cbe9 RCX: dffffc0000000000 [ 832.347374][T22772] RDX: ffffffff81a59790 RSI: ffff888111de8ef8 RDI: ffff88812eb5cbe8 [ 832.355186][T22772] RBP: ffffc90000b97a80 R08: ffffffff81a57850 R09: ffffed10223bd1e3 [ 832.363000][T22772] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff110257e5133 [ 832.370812][T22772] R13: ffff88812eb5cbe8 R14: ffff88812bf28998 R15: 0000000000000000 [ 832.378621][T22772] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 832.387382][T22772] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 832.393808][T22772] CR2: 0000000000000000 CR3: 000000014c9a5000 CR4: 00000000003506b0 [ 832.401620][T22772] DR0: 0000200000000300 DR1: 00000000000000fd DR2: 00000000000000fd [ 832.409430][T22772] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 832.417242][T22772] Call Trace: [ 832.420363][T22772] [ 832.423143][T22772] ? __die_body+0x62/0xb0 [ 832.427307][T22772] ? die_addr+0x9f/0xd0 [ 832.431303][T22772] ? exc_general_protection+0x311/0x4b0 [ 832.436687][T22772] ? asm_exc_general_protection+0x27/0x30 [ 832.442249][T22772] ? vma_interval_tree_remove+0xae0/0xba0 [ 832.447798][T22772] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 832.454052][T22772] ? __rb_erase_color+0x10e/0xa60 [ 832.458903][T22772] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 832.465153][T22772] vma_interval_tree_remove+0xb82/0xba0 [ 832.470535][T22772] unlink_file_vma+0xd9/0xf0 [ 832.474958][T22772] free_pgtables+0x13f/0x280 [ 832.479385][T22772] exit_mmap+0x47c/0x990 [ 832.483466][T22772] ? exit_aio+0x25e/0x3c0 [ 832.487632][T22772] ? vm_brk+0x30/0x30 [ 832.491449][T22772] ? mutex_unlock+0xb2/0x260 [ 832.495878][T22772] ? uprobe_clear_state+0x2cd/0x320 [ 832.500907][T22772] __mmput+0x95/0x310 [ 832.504726][T22772] mmput+0x5b/0x170 [ 832.508373][T22772] do_exit+0xb9c/0x2ca0 [ 832.512366][T22772] ? put_task_struct+0x80/0x80 [ 832.516967][T22772] ? __kasan_check_write+0x14/0x20 [ 832.521917][T22772] __x64_sys_exit+0x40/0x40 [ 832.526251][T22772] x64_sys_call+0x1cc/0x9a0 [ 832.530588][T22772] do_syscall_64+0x3b/0xb0 [ 832.534843][T22772] ? clear_bhb_loop+0x35/0x90 [ 832.539356][T22772] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 832.545084][T22772] RIP: 0033:0x7f3b7a586169 [ 832.549339][T22772] Code: Unable to access opcode bytes at RIP 0x7f3b7a58613f. [ 832.556542][T22772] RSP: 002b:00007f3b78beffe8 EFLAGS: 00000246 ORIG_RAX: 000000000000003c [ 832.564788][T22772] RAX: ffffffffffffffda RBX: 00007f3b7a79efa0 RCX: 00007f3b7a586169 [ 832.572600][T22772] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 832.580410][T22772] RBP: 00007f3b7a607730 R08: 0000000000000000 R09: 0000000000000000 [ 832.588218][T22772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 832.596034][T22772] R13: 0000000000000000 R14: 00007f3b7a79efa0 R15: 00007ffd32fb2f48 [ 832.603849][T22772] [ 832.606705][T22772] Modules linked in: [ 832.759165][T22772] ---[ end trace 3113e05ad3d2ea6e ]--- [ 832.764553][T22772] RIP: 0010:__rb_erase_color+0x10e/0xa60 [ 832.770082][T22772] Code: 89 ff e8 75 74 2a ff 4c 8b 6d d0 4d 89 2f 4c 89 eb 48 83 cb 01 4c 8b 7d c0 4c 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ff e8 44 74 2a ff 49 89 1f 4c 89 eb 48 c1 [ 832.789800][T22772] RSP: 0018:ffffc90000b97a20 EFLAGS: 00010246 [ 832.795751][T22772] RAX: 0000000000000000 RBX: ffff88812eb5cbe9 RCX: dffffc0000000000 [ 832.803837][T22772] RDX: ffffffff81a59790 RSI: ffff888111de8ef8 RDI: ffff88812eb5cbe8 [ 832.811911][T22772] RBP: ffffc90000b97a80 R08: ffffffff81a57850 R09: ffffed10223bd1e3 [ 832.820395][T22772] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff110257e5133 [ 832.828387][T22772] R13: ffff88812eb5cbe8 R14: ffff88812bf28998 R15: 0000000000000000 [ 832.836564][T22772] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 832.845555][T22772] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 832.859193][T22772] CR2: 000000110c2b00a2 CR3: 0000000127ba1000 CR4: 00000000003506a0 [ 832.867067][T22772] DR0: 0000200000000300 DR1: 00000000000000fd DR2: 00000000000000fd [ 832.874913][T22772] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 832.882805][T22772] Kernel panic - not syncing: Fatal exception [ 832.888889][T22772] Kernel Offset: disabled [ 832.893019][T22772] Rebooting in 86400 seconds..