last executing test programs: 11m18.890317372s ago: executing program 1 (id=193): r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x7, 0x6f, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x9, 0x4, 0x0, 0x0, 0x8, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.time\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='\x00') openat$cgroup_procs(r1, 0xfffffffffffffffe, 0x2, 0x0) close(r0) (async) close(r0) 11m18.826734563s ago: executing program 1 (id=196): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 11m18.712842805s ago: executing program 1 (id=198): recvmsg(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)=@ethernet, 0x80, &(0x7f0000000540)=[{&(0x7f0000000080)=""/174, 0xae}, {&(0x7f0000000140)=""/230, 0xe6}, {&(0x7f0000000240)=""/230, 0xe6}, {&(0x7f0000000340)=""/194, 0xc2}, {&(0x7f0000000440)=""/152, 0x98}, {&(0x7f0000000500)=""/37, 0x25}], 0x6, &(0x7f00000005c0)=""/144, 0x90}, 0x40002000) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)=@ethernet, 0x80, &(0x7f0000000540)=[{&(0x7f0000000080)=""/174, 0xae}, {&(0x7f0000000140)=""/230, 0xe6}, {&(0x7f0000000240)=""/230, 0xe6}, {&(0x7f0000000340)=""/194, 0xc2}, {&(0x7f0000000440)=""/152, 0x98}, {&(0x7f0000000500)=""/37, 0x25}], 0x6, &(0x7f00000005c0)=""/144, 0x90}, 0x40002000) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0xa, [@datasec={0x9, 0x1, 0x0, 0xf, 0x1, [{0x2, 0x5, 0xfffffffb}], "16"}, @struct={0x8, 0x1, 0x0, 0x4, 0x1, 0x7, [{0xa, 0x2, 0x5}]}, @var={0x10, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0x61, 0x61, 0x2e, 0x61, 0x30, 0x61, 0x5f, 0x30]}}, &(0x7f0000000740)=""/78, 0x66, 0x4e, 0x1, 0x55}, 0x28) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, r0, 0x5, 0x3, 0x3}, 0x50) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000900)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000900)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x0, 0x80, 0x9, 0x10, 0x5, 0x7, 0x0, 0x0, 0x10007, 0x12, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0xd2e, 0xbad}, 0x9a0, 0x6, 0xa, 0x6, 0x7, 0x4, 0xfffc, 0x0, 0xa, 0x0, 0x40}, r2, 0xf, r3, 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000009c0)={r3, 0x58, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000a00)=r4) openat$cgroup_ro(r3, &(0x7f0000000a40)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) r5 = openat$cgroup_ro(r3, &(0x7f0000000a40)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@base={0x9, 0x0, 0x4, 0x6, 0x4921, 0xffffffffffffffff, 0x3, '\x00', r4, r5, 0x1, 0x3, 0x2}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0xc86696196a96c63e, 0x2b, &(0x7f0000000d80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @jmp={0x5, 0x0, 0x2, 0x0, 0xa, 0xffffffffffffffff, 0xfffffffffffffff0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x2, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x7fffffff}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @exit, @jmp={0x5, 0x1, 0x4, 0x0, 0x7, 0x30, 0xffffffffffffffff}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000f00)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x1, '\x00', r4, @fallback=0x1, r0, 0x8, &(0x7f0000000f40)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000f80)={0x5, 0xd}, 0x10, 0x0, r3, 0x1, &(0x7f0000000fc0)=[r5, r3, r5], &(0x7f0000001000)=[{0x2, 0x2, 0x7, 0x6}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001140)=@bpf_tracing={0x1a, 0x23, &(0x7f0000000b00)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_fd={0x18, 0x6, 0x1, 0x0, r6}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe3bb}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000c40)='GPL\x00', 0xffff4214, 0xc9, &(0x7f0000000c80)=""/201, 0x41000, 0xa, '\x00', r4, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1ab80, r7, 0x0, &(0x7f0000001100)=[r3, r1, r5, r5, r1], 0x0, 0x10, 0xd}, 0x94) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001140)=@bpf_tracing={0x1a, 0x23, &(0x7f0000000b00)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_fd={0x18, 0x6, 0x1, 0x0, r6}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe3bb}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000c40)='GPL\x00', 0xffff4214, 0xc9, &(0x7f0000000c80)=""/201, 0x41000, 0xa, '\x00', r4, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1ab80, r7, 0x0, &(0x7f0000001100)=[r3, r1, r5, r5, r1], 0x0, 0x10, 0xd}, 0x94) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001200)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x8, '\x00', r4, r5, 0x4, 0x3}, 0x50) unlink(&(0x7f0000001280)='./file0\x00') r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000012c0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x80, '\x00', r4, r5, 0x0, 0x5, 0x2}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001780)={0xffffffffffffffff, 0xe0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000014c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001540)=[0x0, 0x0], 0x0, 0x56, &(0x7f0000001580)=[{}, {}], 0x10, 0x10, &(0x7f00000015c0), &(0x7f0000001600), 0x8, 0xc8, 0x8, 0x8, &(0x7f0000001640)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001780)={0xffffffffffffffff, 0xe0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000014c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001540)=[0x0, 0x0], 0x0, 0x56, &(0x7f0000001580)=[{}, {}], 0x10, 0x10, &(0x7f00000015c0), &(0x7f0000001600), 0x8, 0xc8, 0x8, 0x8, &(0x7f0000001640)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001800)=@bpf_lsm={0x1d, 0x1b, &(0x7f0000001340)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_val={0x18, 0x3, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0xb}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0xb2}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}], &(0x7f0000001440)='GPL\x00', 0x0, 0x3b, &(0x7f0000001480)=""/59, 0x41100, 0x9, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r10, 0x0, 0x2, 0x0, &(0x7f00000017c0)=[{0x1, 0x4, 0x10, 0xb}, {0x3, 0x5, 0x7, 0xc}], 0x10, 0x74}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001900)={&(0x7f00000018c0)='ext4_prefetch_bitmaps\x00', r3, 0x0, 0x65c}, 0x18) mkdir(&(0x7f0000001940)='./file0\x00', 0x22) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001980)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001980)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r11, &(0x7f00000019c0), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000001a40)={0x5, 0x80, 0x3, 0xfc, 0xc, 0x0, 0x0, 0x200, 0x20804, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000001a00), 0x12}, 0x440, 0x6, 0xf97, 0x6, 0xdc8, 0x5, 0x401, 0x0, 0x3}, r5, 0xc, 0xffffffffffffffff, 0xc) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001bc0)={&(0x7f0000001ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x4, [@decl_tag={0x6, 0x0, 0x0, 0x11, 0x1, 0x1}, @func={0x9, 0x0, 0x0, 0xc, 0x2}, @struct={0xd, 0x4, 0x0, 0x4, 0x1, 0x5, [{0x1, 0x2, 0x4}, {0xf, 0x2, 0x2}, {0xa, 0x4, 0x3}, {0xb, 0x2, 0x2ffd}]}, @func={0x2, 0x0, 0x0, 0xc, 0x3}, @restrict={0xd, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000001b80)=""/63, 0x8c, 0x3f, 0x1, 0xb, 0x10000, @value=r5}, 0x28) r13 = syz_clone(0x200, &(0x7f0000001c00)="9018e27e004398a3e23b8b90edef3d72a604c3e63fa641455a3172912d8ccc222b5edd6e161d9bcb8a53f5", 0x2b, &(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0)="9965295510ecec091ef0331b9f522195c837bce80cc237ae08b9a101cc178db57c6bc69a78c225c112116ffe8fb7c65fc8cc82784f0a8ab3ee") bpf$PROG_LOAD(0x5, &(0x7f0000002f00)={0xf, 0xa, &(0x7f0000001d00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf3, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @ringbuf_query, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}]}, &(0x7f0000001d80)='GPL\x00', 0xb, 0x1000, &(0x7f0000001dc0)=""/4096, 0x41100, 0x44, '\x00', 0x0, @cgroup_device=0x6, r12, 0x8, &(0x7f0000002dc0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000002e00)={0x3, 0x9, 0x3, 0x80000001}, 0x10, r10, r5, 0x7, &(0x7f0000002e40)=[r8, r8, r5, r3, r3, r8, r3, r3], &(0x7f0000002e80)=[{0x1, 0x0, 0x0, 0x5}, {0x1, 0x4, 0x4, 0xa}, {0x2, 0x4, 0x6, 0xb}, {0x5, 0x5, 0x8, 0x7}, {0x1, 0x2, 0xc, 0x1}, {0x3, 0x4, 0x4, 0xa}, {0x4, 0x1, 0xf, 0x1}], 0x10, 0x2}, 0x94) (async) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000002f00)={0xf, 0xa, &(0x7f0000001d00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf3, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @ringbuf_query, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}]}, &(0x7f0000001d80)='GPL\x00', 0xb, 0x1000, &(0x7f0000001dc0)=""/4096, 0x41100, 0x44, '\x00', 0x0, @cgroup_device=0x6, r12, 0x8, &(0x7f0000002dc0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000002e00)={0x3, 0x9, 0x3, 0x80000001}, 0x10, r10, r5, 0x7, &(0x7f0000002e40)=[r8, r8, r5, r3, r3, r8, r3, r3], &(0x7f0000002e80)=[{0x1, 0x0, 0x0, 0x5}, {0x1, 0x4, 0x4, 0xa}, {0x2, 0x4, 0x6, 0xb}, {0x5, 0x5, 0x8, 0x7}, {0x1, 0x2, 0xc, 0x1}, {0x3, 0x4, 0x4, 0xa}, {0x4, 0x1, 0xf, 0x1}], 0x10, 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000002fc0)='ext4_prefetch_bitmaps\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000002fc0)='ext4_prefetch_bitmaps\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000031c0)={0xffffffffffffffff, 0x0, 0x70, 0x5c, &(0x7f0000003000)="1769cd7f16b55c78feec06a4e927540ce329412c09adb6da6c158f5a2c7df1c8fb39ea8a04a468fa143859eb30c33116980f3b179739c865078145871ec1855ff27bdac99e23a4c55c1e05bd04e40a63f3e64b993390a58fae0d2d1873e4ef4004e93a523c4591d0ee09af94973a217b", &(0x7f0000003080)=""/92, 0x8, 0x0, 0xd, 0x50, &(0x7f0000003100)="3d2e691521594d1069b92515dc", &(0x7f0000003140)="6b83af1d548cd746ac87408f4e294f7f9c4e87df8cec60e0e915bd7ecf51707443a7b63dc5fd1e98c585ceb547183c45049ca5fc5cadec7da34dd3d3df378923fb168fc624bd3362b338e3881d4c0df2", 0x2}, 0x50) openat$cgroup_int(r5, &(0x7f0000003240)='blkio.throttle.read_bps_device\x00', 0x2, 0x0) (async) openat$cgroup_int(r5, &(0x7f0000003240)='blkio.throttle.read_bps_device\x00', 0x2, 0x0) r15 = gettid() sendmsg$unix(r5, &(0x7f0000003600)={&(0x7f0000003280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003380)=[{&(0x7f0000003300)="9ac438c46045add031b2f5a8a5db3dc197fc52c10d919e7a2125397200696c4c66cf3e7c46c858", 0x27}, {&(0x7f0000003340)="b8efaf104dab5aeee9daeeade98b91a2dcc394860d4de1f4ffdea99d1e9b6c8d913b177fab5e71110df3", 0x2a}], 0x2, &(0x7f0000003500)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r15, 0xffffffffffffffff, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, r14, r9, r14]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r13, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}], 0xe0, 0x3c43525e7bd9ac17}, 0x20044095) (async) sendmsg$unix(r5, &(0x7f0000003600)={&(0x7f0000003280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003380)=[{&(0x7f0000003300)="9ac438c46045add031b2f5a8a5db3dc197fc52c10d919e7a2125397200696c4c66cf3e7c46c858", 0x27}, {&(0x7f0000003340)="b8efaf104dab5aeee9daeeade98b91a2dcc394860d4de1f4ffdea99d1e9b6c8d913b177fab5e71110df3", 0x2a}], 0x2, &(0x7f0000003500)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r15, 0xffffffffffffffff, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, r14, r9, r14]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r13, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xee01}}}], 0xe0, 0x3c43525e7bd9ac17}, 0x20044095) 11m18.50671312s ago: executing program 1 (id=200): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1}, {}, {}, {}, {0x6}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x0, 0x5, 0xfffffffd, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = gettid() syz_open_procfs$namespace(r6, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r6, r5, 0x0, 0x0, 0x0}, 0x30) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48) syz_open_procfs$namespace(r6, &(0x7f00000002c0)='ns/time\x00') openat$cgroup_procs(r4, 0x0, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000007112050000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 11m17.941212831s ago: executing program 1 (id=205): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x15, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x10000}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x2, 0x4, 0x0, 0x2}, @ldst={0x1, 0x2, 0x0, 0x0, 0x7, 0x1, 0xfffffffffffffffc}, @generic={0x5, 0xa, 0x2, 0x6, 0x2}, @map_fd={0x18, 0x1, 0x1, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={0x1, 0xffffffffffffffff}, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0xe0000000, 0x0, r2, 0x7, '\x00', 0x0, r3, 0x1, 0x3}, 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='tlb_flush\x00', r1}, 0x18) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x7fffffff}, 0x50) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r5, 0x0, 0x0}, 0x10) (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x10}, 0xc) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x104) (async) close(r6) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_clone(0x128821000, 0x0, 0x0, 0x0, 0x0, 0x0) 11m17.93972439s ago: executing program 1 (id=207): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x80200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x13, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018420000fbffffff000000000000000018270000", @ANYRES32=r0, @ANYBLOB="0000000001000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0x4c, &(0x7f0000000400)=""/76, 0x41100, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000680)=[r0], &(0x7f0000000780)=[{0x0, 0x1, 0x7, 0xa}, {0x2, 0x5, 0xd, 0x5}, {0x5, 0x2, 0x1, 0x5}, {0x4, 0x2, 0x5, 0x2}, {0x3, 0x3, 0x1, 0x1}, {0x1, 0x1, 0xb, 0x7}], 0x10, 0x80}, 0x94) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000081000000500000100000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r3, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000080000000900000001000000", @ANYRES32, @ANYBLOB="000000000000000000123bce2063101271fe23f6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r8, 0xf, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000700)=@o_path={&(0x7f0000000040)='./file0\x00', r2, 0x4000, r1}, 0x18) r9 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000080), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3e, &(0x7f0000000640)=[{}], 0x8, 0x0, 0x0, &(0x7f0000000700), 0x8, 0x68, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x5, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7a2}, [@generic={0x8, 0x3, 0x5, 0xa63}]}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x47, &(0x7f0000000580)=""/71, 0x41100, 0x10, '\x00', r10, @fallback=0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x6, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000dc0)=[{0x5, 0x5, 0xb, 0xc}], 0x10, 0x7ff}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 11m2.874547264s ago: executing program 32 (id=207): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x80200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x13, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018420000fbffffff000000000000000018270000", @ANYRES32=r0, @ANYBLOB="0000000001000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0x4c, &(0x7f0000000400)=""/76, 0x41100, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000680)=[r0], &(0x7f0000000780)=[{0x0, 0x1, 0x7, 0xa}, {0x2, 0x5, 0xd, 0x5}, {0x5, 0x2, 0x1, 0x5}, {0x4, 0x2, 0x5, 0x2}, {0x3, 0x3, 0x1, 0x1}, {0x1, 0x1, 0xb, 0x7}], 0x10, 0x80}, 0x94) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000081000000500000100000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r3, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000080000000900000001000000", @ANYRES32, @ANYBLOB="000000000000000000123bce2063101271fe23f6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r8, 0xf, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000700)=@o_path={&(0x7f0000000040)='./file0\x00', r2, 0x4000, r1}, 0x18) r9 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000080), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3e, &(0x7f0000000640)=[{}], 0x8, 0x0, 0x0, &(0x7f0000000700), 0x8, 0x68, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x5, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7a2}, [@generic={0x8, 0x3, 0x5, 0xa63}]}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x47, &(0x7f0000000580)=""/71, 0x41100, 0x10, '\x00', r10, @fallback=0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x6, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000dc0)=[{0x5, 0x5, 0xb, 0xc}], 0x10, 0x7ff}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 11m1.670018728s ago: executing program 2 (id=343): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6d}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xf6}, 0xa100, 0xc8, 0x3, 0x6, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0xf76c}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r5 = openat$cgroup_devices(r4, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x267e}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1a008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000061181c000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB='a *:'], 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000380)='mm_vmscan_lru_isolate\x00', r3, 0x0, 0x7f}, 0x18) recvmsg$unix(r1, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) 11m1.06495965s ago: executing program 4 (id=350): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000080000076000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) close(r7) (async) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000f00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 11m0.993203391s ago: executing program 4 (id=351): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x108001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11m0.992793291s ago: executing program 4 (id=352): perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff4d}, 0x94) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r0}, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x8, 0xc, 0xffffbffb, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x52, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000500), &(0x7f0000000580), 0x8, 0x1b, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2b626c6b696f202d667265657a6572202d626c6b696f202d667265657a6572202b7264826161086e65745f636c73202b72646d61202b6465766963657320"], 0x3e) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r7, &(0x7f00000005c0), 0x2, 0x0) r8 = openat$cgroup_freezer_state(r7, &(0x7f0000000340), 0x2, 0x0) close(r8) mkdir(0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 11m0.54498092s ago: executing program 2 (id=354): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 11m0.302652314s ago: executing program 4 (id=356): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xcd62b1ab) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000007750000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x9, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/user\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/cgroup\x00') r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000100000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x10, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r7, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0xfffffffffffffe9d, 0x10, &(0x7f0000002e00), &(0x7f0000000200), 0x8, 0xa0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r7, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000400)='signal_generate\x00', r9}, 0x18) r10 = syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000007c0)=ANY=[@ANYRES16=r10, @ANYBLOB="0000000000000000b7080100000000007b8af8ff0000ff982f04c6204185c27e06420e9e9cd82796f9565ae84d880c4e0bc0e1cb1d1a56e58eb0775860ae3a7ec25bd9e788926a0dc19a805e430f1fc52ad8bf518e87b4e3addc4d67cced9e866891bae72b5c948f3f0b0781d7d1a03f2785a7fe19acda5f3f6aca9ad48ca76ae23b3b44473456bcafa4b014fb7050af35baed43f1d388a19cd30babe79f87362fdd4a6160fede0e91a53b3721b7ada42e23f78870c387011c4f74cdaf57d77d76bd6cd0171f5dd694ba032ee9f857af4dd92ac2c97365aa799f66fc22257e0a69212c6f7ece5053cdeb42f484dae1d51bac17db10b31409007009ffc3a7a0f8be45c4a3e3b878b2ab941831fb7f89"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 11m0.294619835s ago: executing program 0 (id=365): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 11m0.294197145s ago: executing program 2 (id=357): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000001280)=""/187, 0x2a, 0xbb, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000001700003240000004000000000000000000000095000000000000009500000000000000950000000000000018400100feffffff48000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0xd6, &(0x7f0000000100)=""/214, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x9, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x6, 0x40, 0x40, 0x41}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000a40)="69032231ae7b520378cba245", &(0x7f00000008c0), 0x1003, r3}, 0x38) r4 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)={[{0x2d, 'net'}]}, 0x5) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000b80)={r3, &(0x7f00000014c0), &(0x7f0000000b40)=""/31}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@map=r3, 0x1d, 0x0, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0]}, 0x40) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0a00000007000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x81ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x38) 11m0.230728246s ago: executing program 0 (id=358): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @multicast}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000700000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 11m0.093464638s ago: executing program 0 (id=359): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x3, &(0x7f0000001680)=ANY=[], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x6}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x5, 0x400, 0x9, 0x1}, 0x50) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) (async, rerun: 32) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'geneve1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) (rerun: 32) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800}, 0x40800) close(r2) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r4, 0x0, 0x0}, 0x20) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r5) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 11m0.0297594s ago: executing program 0 (id=360): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000340), 0x9) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000880)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000900)=""/158, 0x9e}], 0x1, &(0x7f00000009c0)=""/214, 0xd6}, 0x80012141) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="00000000000057b6b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x4, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000cc0)={r3, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d00)={0x1b, 0x0, 0x0, 0x9, 0x0, r3, 0x0, '\x00', 0x0, r3, 0x4, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e40)={{r3, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000f00)={0x6, 0x1e, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@alu={0x4, 0x1, 0xe, 0x4, 0x2, 0x100}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='syzkaller\x00', 0x0, 0xff, &(0x7f0000000bc0)=""/255, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x4, 0x9, 0x3, 0x10001}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000e80)=[r3, r3, r3, 0xffffffffffffffff, r7, r8, r3, r9, r3], &(0x7f0000000ec0)=[{0x0, 0x1, 0xd, 0xd}, {0x1, 0x5, 0x8, 0x2}, {0x1, 0x3, 0x5, 0x9}], 0x10, 0xfff}, 0x94) 10m59.741677006s ago: executing program 2 (id=362): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b40000000000000079104800000000006104000b0000000095100000113652dcfada5b34c7bd2f90aa50c3cb61853138010000009f538e0a5d30756004aee8b8b8815f1ef3984d65fec94e8dfe9bf6288717d1"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x21) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@func={0x4, 0x0, 0x0, 0xc, 0x1}, @union={0x3, 0x3, 0x0, 0x5, 0x1, 0x4, [{0x6, 0x1, 0x10}, {0xa, 0x3, 0xd}, {0x8, 0x0, 0x6}]}]}, {0x0, [0x3e, 0x30, 0x30]}}, &(0x7f0000000800)=""/233, 0x59, 0xe9, 0x0, 0x6, 0x10000}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_pressure(r1, &(0x7f0000000080)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r4, &(0x7f0000000200)={'full', 0x20, 0x0, 0x20, 0x3}, 0x2f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r3}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40001) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)=ANY=[@ANYRES32=r6, @ANYRES32, @ANYBLOB=' \x00\x00\x00\x00\x00'], 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) 10m59.369018383s ago: executing program 4 (id=364): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x108001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 6) 10m59.267136605s ago: executing program 5 (id=332): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x1, 0xb, 0xff, 0x91, 0x0, 0x1ff, 0x59100, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0x6, 0xacd}, 0x1215, 0x2, 0x544d28fc, 0x8, 0xfff, 0x7, 0x7, 0x0, 0xa, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0x6, 0xa}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='workqueue_queue_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x84000, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1ff8d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002706870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a83984e68a6d80a5f5222ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0007000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1f6428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e1700000000000000000a034000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1ebbb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa5210b16eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d6"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x7000002}, 0x2c) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) close(r5) 10m59.257092705s ago: executing program 4 (id=375): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4800, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)={'caif0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfa, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x7a, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r2, 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3768, '\x00', r1, 0xffffffffffffffff, 0x2, 0x5}, 0x50) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000480), 0x9) r5 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x80, 0x5, 0x4, 0x3, 0x0, 0x735b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xd6, 0x1, @perf_bp={&(0x7f00000004c0), 0x8}, 0x10, 0x9834, 0x3, 0x0, 0x7, 0x8, 0x0, 0x0, 0x84, 0x0, 0x401}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x9, &(0x7f00000005c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000640)='GPL\x00', 0x1, 0xac, &(0x7f0000000680)=""/172, 0x41000, 0x0, '\x00', r1, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x3, 0x10, 0x6, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000780)=[r4, r4, r4, r4, r4], &(0x7f00000007c0)=[{0x2, 0x1, 0x6, 0x9}, {0x1, 0x2, 0x9, 0x9}, {0x4, 0x4, 0x7, 0x9}, {0x5, 0x4, 0x7, 0x5}], 0x10, 0x100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000580)='afs_server\x00', r6, 0x0, 0x1}, 0x18) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000900)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000940)={'team_slave_1\x00', @local}) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000980), 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a40)={r4, 0xffffffffffffffff}, 0x4) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a00)='./file0\x00', 0x0, 0x4010, r8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='ext4_es_lookup_extent_exit\x00', r6}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r6, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x49, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0x1d, 0x1, 0x40, 0x7, 0x8000, r4, 0x80000000, '\x00', r10, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000ec0)={0xffffffffffffffff}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000f00)={'pimreg1\x00', 0x1000}) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f80)={&(0x7f0000000f40)='afs_receive_data\x00', r7, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f0000000fc0)={0x3, 0x80, 0x3, 0x9, 0x7, 0xa, 0x0, 0x8, 0x20, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x1, 0x8}, 0x802, 0x100, 0x2, 0x1, 0xee, 0x142b, 0x1, 0x0, 0xd, 0x0, 0x9e3}, 0x0, 0x4, r7, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000001040), 0x4eb708e3d3a53aa7, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x1b, 0x1c, &(0x7f0000001080)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @call={0x85, 0x0, 0x0, 0x93}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc0000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1000}, @map_fd={0x18, 0x0, 0x1, 0x0, r9}], &(0x7f0000001180)='syzkaller\x00', 0x400, 0xfa, &(0x7f00000011c0)=""/250, 0x41100, 0x20, '\x00', r1, @fallback=0xb, r3, 0x8, &(0x7f00000012c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000001300)={0x0, 0xc, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001340)=[r8, r7, r11, r8, r11], &(0x7f0000001380)=[{0x0, 0x1, 0x6}, {0x3, 0x3, 0x6, 0x2}, {0x2, 0x4, 0x8, 0x6}, {0x0, 0x5, 0x8, 0x6}, {0x3, 0x1, 0x6, 0x5}, {0x5, 0x4, 0x6, 0x5}, {0x1, 0x5, 0xd, 0x7}, {0x1, 0x5, 0x6, 0x3}], 0x10, 0x7}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001780)={r13, 0xe0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000001500)=[0x0, 0x0], &(0x7f0000001540)=[0x0, 0x0], 0x0, 0x65, &(0x7f0000001580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000015c0), &(0x7f0000001600), 0x8, 0xf9, 0x8, 0x8, &(0x7f0000001640)}}, 0x10) close(r12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001980)={&(0x7f00000017c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x108, 0x108, 0x9, [@enum={0xb, 0x7, 0x0, 0x6, 0x4, [{0x7, 0x3}, {0xd, 0x257}, {0x5, 0xe1}, {0x10, 0x9}, {0x3, 0x200}, {0xe, 0x5}, {0x8, 0xfffffffc}]}, @union={0x8, 0x8, 0x0, 0x5, 0x1, 0xd, [{0x6, 0x0, 0xef}, {0xe, 0x2, 0x986}, {0x5, 0x3, 0x2}, {0xf, 0x3, 0x5}, {0xa, 0x1, 0xf98}, {0x10, 0x1, 0x101}, {0xc, 0x0, 0xfffffffc}, {0x1, 0x3, 0x401}]}, @var={0x3, 0x0, 0x0, 0xe, 0x5}, @struct={0x6, 0x5, 0x0, 0x4, 0x1, 0x2, [{0x6, 0x0, 0xff}, {0x5, 0x5, 0x3}, {0x8, 0x5, 0xd4}, {0x7, 0x4, 0xfffffffd}, {0x8, 0x2, 0x3f9}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x61, 0x0, 0x30, 0x30]}}, &(0x7f0000001900)=""/92, 0x129, 0x5c, 0x0, 0x2}, 0x28) 10m59.230509385s ago: executing program 33 (id=375): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4800, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)={'caif0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfa, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x7a, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r2, 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3768, '\x00', r1, 0xffffffffffffffff, 0x2, 0x5}, 0x50) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000480), 0x9) r5 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x80, 0x5, 0x4, 0x3, 0x0, 0x735b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xd6, 0x1, @perf_bp={&(0x7f00000004c0), 0x8}, 0x10, 0x9834, 0x3, 0x0, 0x7, 0x8, 0x0, 0x0, 0x84, 0x0, 0x401}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x9, &(0x7f00000005c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000640)='GPL\x00', 0x1, 0xac, &(0x7f0000000680)=""/172, 0x41000, 0x0, '\x00', r1, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x3, 0x10, 0x6, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000780)=[r4, r4, r4, r4, r4], &(0x7f00000007c0)=[{0x2, 0x1, 0x6, 0x9}, {0x1, 0x2, 0x9, 0x9}, {0x4, 0x4, 0x7, 0x9}, {0x5, 0x4, 0x7, 0x5}], 0x10, 0x100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000580)='afs_server\x00', r6, 0x0, 0x1}, 0x18) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000900)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000940)={'team_slave_1\x00', @local}) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000980), 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a40)={r4, 0xffffffffffffffff}, 0x4) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a00)='./file0\x00', 0x0, 0x4010, r8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='ext4_es_lookup_extent_exit\x00', r6}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r6, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb, &(0x7f0000000c00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x49, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0x1d, 0x1, 0x40, 0x7, 0x8000, r4, 0x80000000, '\x00', r10, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000ec0)={0xffffffffffffffff}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000f00)={'pimreg1\x00', 0x1000}) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f80)={&(0x7f0000000f40)='afs_receive_data\x00', r7, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f0000000fc0)={0x3, 0x80, 0x3, 0x9, 0x7, 0xa, 0x0, 0x8, 0x20, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x1, 0x8}, 0x802, 0x100, 0x2, 0x1, 0xee, 0x142b, 0x1, 0x0, 0xd, 0x0, 0x9e3}, 0x0, 0x4, r7, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000001040), 0x4eb708e3d3a53aa7, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x1b, 0x1c, &(0x7f0000001080)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @call={0x85, 0x0, 0x0, 0x93}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc0000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1000}, @map_fd={0x18, 0x0, 0x1, 0x0, r9}], &(0x7f0000001180)='syzkaller\x00', 0x400, 0xfa, &(0x7f00000011c0)=""/250, 0x41100, 0x20, '\x00', r1, @fallback=0xb, r3, 0x8, &(0x7f00000012c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000001300)={0x0, 0xc, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001340)=[r8, r7, r11, r8, r11], &(0x7f0000001380)=[{0x0, 0x1, 0x6}, {0x3, 0x3, 0x6, 0x2}, {0x2, 0x4, 0x8, 0x6}, {0x0, 0x5, 0x8, 0x6}, {0x3, 0x1, 0x6, 0x5}, {0x5, 0x4, 0x6, 0x5}, {0x1, 0x5, 0xd, 0x7}, {0x1, 0x5, 0x6, 0x3}], 0x10, 0x7}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001780)={r13, 0xe0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000001500)=[0x0, 0x0], &(0x7f0000001540)=[0x0, 0x0], 0x0, 0x65, &(0x7f0000001580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000015c0), &(0x7f0000001600), 0x8, 0xf9, 0x8, 0x8, &(0x7f0000001640)}}, 0x10) close(r12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001980)={&(0x7f00000017c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x108, 0x108, 0x9, [@enum={0xb, 0x7, 0x0, 0x6, 0x4, [{0x7, 0x3}, {0xd, 0x257}, {0x5, 0xe1}, {0x10, 0x9}, {0x3, 0x200}, {0xe, 0x5}, {0x8, 0xfffffffc}]}, @union={0x8, 0x8, 0x0, 0x5, 0x1, 0xd, [{0x6, 0x0, 0xef}, {0xe, 0x2, 0x986}, {0x5, 0x3, 0x2}, {0xf, 0x3, 0x5}, {0xa, 0x1, 0xf98}, {0x10, 0x1, 0x101}, {0xc, 0x0, 0xfffffffc}, {0x1, 0x3, 0x401}]}, @var={0x3, 0x0, 0x0, 0xe, 0x5}, @struct={0x6, 0x5, 0x0, 0x4, 0x1, 0x2, [{0x6, 0x0, 0xff}, {0x5, 0x5, 0x3}, {0x8, 0x5, 0xd4}, {0x7, 0x4, 0xfffffffd}, {0x8, 0x2, 0x3f9}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x61, 0x0, 0x30, 0x30]}}, &(0x7f0000001900)=""/92, 0x129, 0x5c, 0x0, 0x2}, 0x28) 10m59.128344518s ago: executing program 34 (id=332): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x1, 0xb, 0xff, 0x91, 0x0, 0x1ff, 0x59100, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0x6, 0xacd}, 0x1215, 0x2, 0x544d28fc, 0x8, 0xfff, 0x7, 0x7, 0x0, 0xa, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0x6, 0xa}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='workqueue_queue_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x84000, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x7000002}, 0x2c) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) close(r5) 10m59.121703677s ago: executing program 0 (id=368): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 10m58.965766351s ago: executing program 0 (id=369): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000003a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000500)="b958945d8ae49c4f19be14f06558", 0x0, 0x1cb0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@o_path={&(0x7f00000002c0)='./file0\x00', r0, 0x4000, r2}, 0x18) (async) close(r2) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x8810) (async) sendmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x146}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) (async, rerun: 64) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) close(r4) (async, rerun: 64) close(r5) (async, rerun: 64) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x6, 0x3, 0x1, 0xa, 0x0, 0x3f, 0x10800, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000200), 0xa}, 0x20, 0x6, 0x0, 0x0, 0x7f, 0xb322, 0xfffa, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10000a, r8, 0x2) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01000000", @ANYRES32=0x1, @ANYBLOB="00000000cbd82704b4288a60f3cf14a1df711c00543faf4b2b9b53d863000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000040000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb70300fd08000000b704005d3546a8eee4ff0002000000850000000300000095"], 0x0, 0x2bf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffee8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000005c0)='oom_score_adj_update\x00', r11}, 0x18) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r12, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x12, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r13}, 0x10) 10m58.965527921s ago: executing program 35 (id=369): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000003a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000500)="b958945d8ae49c4f19be14f06558", 0x0, 0x1cb0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@o_path={&(0x7f00000002c0)='./file0\x00', r0, 0x4000, r2}, 0x18) (async) close(r2) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x8810) (async) sendmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x146}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) (async, rerun: 64) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) close(r4) (async, rerun: 64) close(r5) (async, rerun: 64) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x6, 0x3, 0x1, 0xa, 0x0, 0x3f, 0x10800, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000200), 0xa}, 0x20, 0x6, 0x0, 0x0, 0x7f, 0xb322, 0xfffa, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10000a, r8, 0x2) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01000000", @ANYRES32=0x1, @ANYBLOB="00000000cbd82704b4288a60f3cf14a1df711c00543faf4b2b9b53d863000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000040000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb70300fd08000000b704005d3546a8eee4ff0002000000850000000300000095"], 0x0, 0x2bf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffee8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000005c0)='oom_score_adj_update\x00', r11}, 0x18) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r12, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x12, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r13}, 0x10) 10m58.921273251s ago: executing program 2 (id=370): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @multicast}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000c00000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 10m57.413544771s ago: executing program 2 (id=372): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0, 0x5, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), &(0x7f0000000380), 0x8, 0x7a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0xfd, 0x0, 0x41000, 0x12, '\x00', r0, @fallback=0x16, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r6}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="b993046f00000000000000000000000000000000000000499e24c8a35b03e6b733a09c3fb6f3b3608180a493bf3eceae7c7991b431a5d4da58f9dc3cc26868df79fc1a575947f260f49ee2990000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="02000000040000462f9c85defb96500008000c000000000080000000", @ANYRES32=r11, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000200"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r12}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r1], 0x50) r13 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000b00)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a00)={@cgroup=r13, 0x34, 0x1, 0xfffffffe, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000880)=[0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 10m57.413325881s ago: executing program 36 (id=372): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0, 0x5, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), &(0x7f0000000380), 0x8, 0x7a, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0xfd, 0x0, 0x41000, 0x12, '\x00', r0, @fallback=0x16, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r6}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="b993046f00000000000000000000000000000000000000499e24c8a35b03e6b733a09c3fb6f3b3608180a493bf3eceae7c7991b431a5d4da58f9dc3cc26868df79fc1a575947f260f49ee2990000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="02000000040000462f9c85defb96500008000c000000000080000000", @ANYRES32=r11, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000200"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r12}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r1], 0x50) r13 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000b00)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a00)={@cgroup=r13, 0x34, 0x1, 0xfffffffe, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000880)=[0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 3.461461763s ago: executing program 6 (id=6651): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xb5}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x2a}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='mm_page_alloc\x00'}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) syz_clone(0x62005000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.017457022s ago: executing program 9 (id=6654): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='cachefiles_trunc\x00', r3, 0x0, 0x1000000}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="d2205d96c717ab96f0ded75d86dd", 0x0, 0xd5b5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[], 0xffffffffffffffff, 0x3e, 0x0, 0x2}, 0x28) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x9060, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x1}, 0x440, 0xfffffffffffffff9, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="280100000000000001000000"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00', r7}, 0x18) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) recvmsg$unix(r5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb0}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) 2.629033389s ago: executing program 7 (id=6656): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0xb, 0x800, 0x10000, &(0x7f0000000140)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="09000000170000000800000040"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r0}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, &(0x7f0000000980), 0x20000992) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x8}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000000500000085000000a0"], 0x0, 0x4}, 0x94) 2.620934909s ago: executing program 8 (id=6657): socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="08000000040000311c1dcd000700000000000000dd5aa86e85fec26906405088ef5a0490b6bc571ff7ed8f30f75829270f3a2e7d4641c766d07c4063facbe5ddb1e9d36b1c4f3e4d1e19fe6f35038d36321e27de78fafb5d610d83d25b902d63ceda45af38ef399f078db70fc60c11cc9543eb8497d5bcc7127008202d3d8656916aebfc97d2d62fc664f1672af466cc527ef2138ed06b321200c69b21321145450f1e11ec7c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\t\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056a", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32, @ANYBLOB="02000000000000000000e2ff00"/22], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x1b, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @map_fd={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x7b}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.454706022s ago: executing program 8 (id=6659): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xcd62b1ab) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = gettid() r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c23003f) write$cgroup_int(r5, &(0x7f00000002c0)=0x9, 0x12) perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6}, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r7}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x9, 0x1, 0xa, &(0x7f0000000200)) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000400)='FREEZING\x00', 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xcc0, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001f00cd10b00e08e2632177fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x4000, 0x60000000, 0x2c3, 0xd17e91c4eaae85fe}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYRESDEC=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.723256207s ago: executing program 9 (id=6660): socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="08000000040000311c1dcd000700000000000000dd5aa86e85fec26906405088ef5a0490b6bc571ff7ed8f30f75829270f3a2e7d4641c766d07c4063facbe5ddb1e9d36b1c4f3e4d1e19fe6f35038d36321e27de78fafb5d610d83d25b902d63ceda45af38ef399f078db70fc60c11cc9543eb8497d5bcc7127008202d3d8656916aebfc97d2d62fc664f1672af466cc527ef2138ed06b321200c69b21321145450f1e11ec7c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056a", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32, @ANYBLOB="02000000000000000000e2ff00"/22], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x1b, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @map_fd={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x7b}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.620405689s ago: executing program 8 (id=6661): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x5}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000002000000000000000000000300000000020000000200000000000000000000000000000105000000080000000000000002000005000000000000000001000000000000000000000001000000183500000000691471a879a6f7"], 0x0, 0x66}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) gettid() close(0xffffffffffffffff) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0d00000004000000040000000700000000000000", @ANYRES32=r2, @ANYBLOB="0000010000000000000000000000000000007013", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x800) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00"/11, @ANYRES32, @ANYBLOB="00000000d3ec66ecc053c543da2e2e"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018e206eca728b1538327cf7d5db557641100008ca7ed88f56000000000000000b2bc33055bbf1c42dd43407dcff3acaaac9302c8cac87a7df7", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x46, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.616148609s ago: executing program 7 (id=6662): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0500000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000359ad5c2dd90d8dfc8af9bb9848d6a1f35cd73e204d1955f4887cf372a85f9097397653ea2f39e3962ce967014ac59770d5b02e6c5e9dd92c8c9991822e6a29e2302ca62176de5ea58dffbbd7c1dbaf505514892f81519201254f94551384f4f6bebf76de68adf3f69801f1c9e10c8e527e9054fa89a7f2f77d97ab001da81fd9b5604fccef5811cae6c94130c8790cd067842579051e0ff97"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000980)={&(0x7f00000002c0)="98339b674373e3bb155ea46057f77a91c231d02507037241a289d2967e7f766176c573a8b7df64cde45d56fd051f444f936726ccee", &(0x7f00000003c0)=""/54, &(0x7f0000000840)="8bb9f440d568f55e0ebcd8006f38540dc214c88eb22c570b0de5f62dc9b1e392dbe31e68411ad92bf7e05e8fd1db0ff8d0ab55b8c562eaf4fcb25b40f21156efbba61974cc34ba0b8da6da60f224bd7e5e80f8d8f919f3dfa06ae957a51e0771f1631eb80fcbbb93befb9410c3cd99c2f33bada2e4d1192745b24ba21aa23c8d1cef81", &(0x7f0000000900)="7403e4a273c47e845c196c1b76dee6c300a93432d6b1ad47fe59210b27386a90f45fd0ff685c6843cbed32ad28919f458330fb7e1b35bc23c55b7e70ef1a45e5db3ceb6b5e99c42c7b8d649628a4f5493476f053", 0xffff, r0, 0x4}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = syz_clone(0x10000000, &(0x7f0000000180)="5ca44104bacbd4ed9a63193f03d96fcefefd4c56923e051251f71eefebe02d822d2c0d9349613bfa55cc", 0x2a, 0x0, &(0x7f0000000280), &(0x7f0000000300)="1f81eef4ee181e80fb2a2d9e44a2ea6c3bb91cc12e751c9611191b10c80c12a937") syz_open_procfs$namespace(r4, &(0x7f0000000380)='ns/user\x00') r5 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x10, 0x0, &(0x7f0000000000)="b9ff03076044238c9e9e15f088a84cb6", 0x0, 0x5b5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0xdd, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r10, 0xffff0000, 0xf0, 0xe200, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.54456506s ago: executing program 6 (id=6663): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x200000000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) close(r2) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r3}, &(0x7f00000004c0), &(0x7f0000000300)=r4}, 0x20) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESHEX=r0, @ANYRES32=0x0, @ANYRESOCT=r0, @ANYBLOB='\x00'/28, @ANYRESHEX=r0], 0x48) 1.482111321s ago: executing program 3 (id=6664): socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="08000000040000311c1dcd000700000000000000dd5aa86e85fec26906405088ef5a0490b6bc571ff7ed8f30f75829270f3a2e7d4641c766d07c4063facbe5ddb1e9d36b1c4f3e4d1e19fe6f35038d36321e27de78fafb5d610d83d25b902d63ceda45af38ef399f078db70fc60c11cc9543eb8497d5bcc7127008202d3d8656916aebfc97d2d62fc664f1672af466cc527ef2138ed06b321200c69b21321145450f1e11ec7c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\t\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056a", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32, @ANYBLOB="02000000000000000000e2ff00"/22], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x1b, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @map_fd={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x7b}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.427810223s ago: executing program 6 (id=6665): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='(())') ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x9, 0x10}, 0xc) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x2}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000cc0)={0x6, 0x6, &(0x7f0000000e80)=ANY=[@ANYBLOB="18000000aef2ffff000000000600000018120000", @ANYRES32=0x1, @ANYBLOB="1900000000000000852000000500000095000000002c0c4822747e91a60505000000000003170000"], &(0x7f0000000b80)='GPL\x00', 0x6fe9, 0x1000, &(0x7f00000022c0)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000c00)={0x3, 0x5, 0x5cc2, 0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[0xffffffffffffffff], &(0x7f0000000c80)=[{0x0, 0x4, 0xc, 0x7}, {0x0, 0x1, 0xc, 0x8}], 0x10, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, r5}, 0x50) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="2b626c6b696f202d63707573657420066e6574202b63707561636374202b626c6b696f202b64657669636573202b64657669749bab6fb3cf24f57df0636573202b726c696d6974202d6e6574"], 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) 1.300563385s ago: executing program 8 (id=6666): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0xffffffffffffffd5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x8810) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000ff0f000f0000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000004cab350f010000f8ffffffb702000008000000b70300000000d0d4b911a3000085000000710000009500020000000000b35ea853668e9f6fcdbd8786d3e30991217f54af9a751b691ec6681ede54924071da422acbe0c3f3c4070c791beb0284de1afd42b6c43ea3d944ea07b86b13e1db94fe661957324c54b3770200696d77eb60ae253e885e6c8eb0f5f3cde440cd1a6e84d37f51a26f6646f99807"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0xb}, 0x50) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRESOCT, @ANYBLOB="010000000000005400f0ff000000000000000000ec2d7e31703ffd1c6ab182ea5af006fe52d4a3e64d8c843870807a6ef3088df48d8940f6336162c877e4c17b848f1a129596d43c193364033146954287e38015226df8a9cce147", @ANYRESHEX=r1, @ANYRES32, @ANYBLOB="000000000300794bcc5889bea2ac0000200000000000f0ffffff0010"], 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000004f6ff00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) 1.275193255s ago: executing program 9 (id=6667): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.188466687s ago: executing program 9 (id=6668): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0xffffffffffffffd5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x8810) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000ff0f000f0000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000004cab350f010000f8ffffffb702000008000000b70300000000d0d4b911a3000085000000710000009500020000000000b35ea853668e9f6fcdbd8786d3e30991217f54af9a751b691ec6681ede54924071da422acbe0c3f3c4070c791beb0284de1afd42b6c43ea3d944ea07b86b13e1db94fe661957324c54b3770200696d77eb60ae253e885e6c8eb0f5f3cde440cd1a6e84d37f51a26f6646f99807"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0xb}, 0x50) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRESOCT, @ANYBLOB="010000000000005400f0ff000000000000000000ec2d7e31703ffd1c6ab182ea5af006fe52d4a3e64d8c843870807a6ef3088df48d8940f6336162c877e4c17b848f1a129596d43c193364033146954287e38015226df8a9cce147", @ANYRESHEX=r1, @ANYRES32, @ANYBLOB="000000000300794bcc5889bea2ac0000200000000000f0ffffff0010"], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000004f6ff00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r11) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) 1.151256658s ago: executing program 8 (id=6669): socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="08000000040000311c1dcd000700000000000000dd5aa86e85fec26906405088ef5a0490b6bc571ff7ed8f30f75829270f3a2e7d4641c766d07c4063facbe5ddb1e9d36b1c4f3e4d1e19fe6f35038d36321e27de78fafb5d610d83d25b902d63ceda45af38ef399f078db70fc60c11cc9543eb8497d5bcc7127008202d3d8656916aebfc97d2d62fc664f1672af466cc527ef2138ed06b321200c69b21321145450f1e11ec7c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\t\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056a", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32, @ANYBLOB="02000000000000000000e2ff00"/22], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x1b, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @map_fd={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x7b}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.01944215s ago: executing program 9 (id=6671): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x19, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e000000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd3f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="2d63707520cff4f40300167eeb70331599c5223e7529f8e0bae5a26ad4300194808a04a1be5e4614"], 0x5) r4 = openat$cgroup_type(r1, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYRESDEC], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xffffffffffffff80}, 0x100888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) bpf$MAP_CREATE(0x0, 0x0, 0x0) 965.303051ms ago: executing program 3 (id=6672): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6920, 0x0, 0x5}, 0x0, 0xffeffffffffffffb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x2, 0x7, 0x0, 0x3}]}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000800)={0x2, 0xfffffecc, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92344f242b416ae9eeefc0e9c6f203cb1276bfdbb4ddffffff7f82dc2b938189a7ca02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc2880072599456d4c4e6f3fe684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd01008e49f4a94608c9a20819e02fc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b529cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400001000000000ff8d81006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864010067d6bab101446ebfe3fdeed7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab53038010000004abbfc59d6d1b18fe380df4bf024f120bd755d82033f2fb7d8fc9e0de834f7646c8dd27da1297d0c77b294e097e293db7f002c0024ab2fb4d32972cba6f49051cec1ff5d16231bbb90a2d201a500000000000000007700b06fa191ebd3a0c2ef0058ffebd7cc4cf80f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f8107671141ffffffe0c7d8e94a27a06a4e3d9acee835fd0571e5bbb3e6d2b5eba505000000968983811f832dc5390f83e817c602c4f1f0d0504255c22ee8674053d0e160e5255366139bbe5863e23c3dd42d21f542816edf56a93d0a7e6f08f9ffffff64875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430fe77ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b1da97c971c8c84a427edc3492b97e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd194d48e50c84892c97c800d156b059a718f6b10274b077a710f27ab8ee953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b5989543729e3600000000bc86cd51704f309130f534741377ea7b7bea3c46c0c4c4b7c27c5d057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9e45a35adbf0b9312be929863f000000000000004a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb2b5f59dfead7ac6e7fa84746e2e425769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e1878c5295fecc27f9c6d1f62da58c0002ea00000000009aa38a05e70591d5cdab1c488ef3c1984c7c0a566cfc2a080000009ec206a54fb49056a555414178ef00d8b8f3c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8adeaad7d3328fbb6e279f745d2872f0208635e465ca443c3a64c7803760880af23fb3f430a0311fffc96dd13b951642f1433f65b4e170a62a5f7b7d0f9d5cef0d17289c43d4aee0001f7a343899434594cc23e1c864164e130754b337e560f285dc670a31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2c7481ec261c00f725de74e48d9a86f7d4a5d28da3f099ca3e6472b9d7c86d961f525f799b4517141f018af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630e7fa0c2261bc2d5de32ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f297661d3f8ba21c65badf55d1859581f9e7ef3e2693b46a8fc85be061ce79a08002c04dc04de8b6536123b24be2ef80eb06b2db900fb30596c1574b2a31f81d61ccfd58080d2330b9c7b87b5d17d48c32daffead3414b91603e250eeedc7d601000000037426f643797be3e93da96b5643d3feed0b7c885d06006b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167abf5d6685d09945cbc778bcc3e7dcfaee5d9c1689a3bafc0d3b51b5a3bfd6007954c36d532960964183842601e5364ecb6ad9168040388c7640bfa2f88643de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e63daaadd8878ad468eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6f00003a73345b841d04a02bf441955b932c59608a555bc44873272812e0fb874618a0b56b4cf44990f60000000000000000000000b20000da0ca6797590ed13b0bccf71a39e05e877893646d185a77882f866785af6b0149e336c31fb177e3e85f4c60cd4de4ce6ea73a95f434328620fa493937386ad2e2a0d60eb815aa05c33e02c32276dab36d14c63af66a31409ab2a403ec3c7a4e07bd745efa2835a8c932f22aa6da40af9bcdf808b916bc8deb37d5b8c422b65c42d17e61751c561ce775a31b52703d398d52694cfbb7d2b3791b030093b321d9f16b2f06676cf94d75cbba6491ae0b5a16ce92320321314d8d2e88d1cd7e7b1216bdaecba309a38e107103e649d46958cc6ba2d660dd41b78d832beb7206ae01508377273ea96e40760410aeed1866971e04f578e9d856d01000000045aea928f5f669be0636dc3f34f90c34531735f271527412d1ae755a9243da523d713071f9370b509a34eeb46415b2f0d271a7072cbd17e293f20132e6c15756e92776c6a0d7c3a9f512ce17edf3f1ea190853bbf93e220a6ce968b79d504c057000e7d8f8249a8158e68a90bbea8bfab2bd3c067c28e185fe62ce7020f5282cf045b9c790984c6fb65fd3187bd8bfcbe663df6b7770000f58fbad41e6eee5c9595950c4172b9c925403b2f99bbf3cb1981bb0d14bded8eae35e08278020a1ec7f508628056fd3d408a02a1cf8594bcbb21a88f477673442804f714212d000045b9f563b5352fe460a30489b1b6a6d37daead86151492f7fd4b5c64007b68a1b04027eac124478a2ef7f59fe472795785de83578cb96334e0f7c1370dc397d3aa42d937b5718b7610cdcdfe104db7801ec74980b8b111a2748321f81512e4204eb2b024b9fc9e0f257f8c6037b93b2caa236d4354b32434d5a6b01e00000000ee2ea723ea2e1accb97a200609c77e0000000000000000d3a54ccd6e13a966801e9341260d6cbce5fe03999214462cbaa297448677ab659102d0f430fbeae119a7ef2e962d2829d4dd2201c4b30d491269594c88252fbd09aced90609851bd9e5c307e7e0d39e73579c1f3563eff1a6237d3699d61acdc8e36010d76093ddd237df1c4181b0a0c4543b4249e9ff2f5e8b5e0ba2048d542de40f643fda4036124b8feb2dd45d0fa52300518c8052cc09ad73f89734fce82cc627356aa2c651ed2644f34cfbc32e8b29cf29e895e43b473ddb9a43421b4b25f8bbce8e2d7cb8547d156d5972021ae4c9e30f85413276ddebde55999d2ec3c524632b74d703147ba09e0dcb26c4b89636d28428b67e955f53bfd0c9eeb7a9d17000000000096cd8ecf1c511eea07aefa1c5cae1841efa9329d80eafefe00000000000000009111274a44c722ff9f5151aa7cb99ea3e8b2c51eadbd2d0ba1a25b08cc3e67cd186c12ea62a55ff905388bb30d1a63d42593c9aea3a84f5a6fc470d8aaaafeccb373ca26c3685679e6a048af19fca3fc5315a33687"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYRESHEX=r1], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, 0x0, &(0x7f0000000380)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) 916.539733ms ago: executing program 8 (id=6673): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0xb, 0x800, 0x10000, &(0x7f0000000140)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="09000000170000000800000040"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r0}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, &(0x7f0000000980), 0x20000992) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x8}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000000500000085000000a0"], 0x0, 0x4}, 0x94) 757.629076ms ago: executing program 7 (id=6674): r0 = getpid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/cgroup\x00') r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x81, &(0x7f0000000140)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x99, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x0, 0xc, 0x4a, 0xab, 0x0, 0x1ff, 0x60550, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f00000003c0), 0x3}, 0x1010, 0xff, 0x3, 0x2, 0x6, 0x4, 0x0, 0x0, 0x8, 0x0, 0xd}, r0, 0x6, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000480)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{0x1, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)=r1}, 0x20) r7 = openat$cgroup_ro(r5, &(0x7f00000005c0)='blkio.bfq.io_serviced\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{0x1, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)=r1}, 0x20) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000900)=r3, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={r1, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000980)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f00000009c0)=[0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x92, &(0x7f0000000a40)=[{}], 0x8, 0x10, &(0x7f0000000a80), &(0x7f0000000ac0), 0x8, 0x70, 0x8, 0x8, &(0x7f0000000b00)}}, 0x10) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x6, 0x1, &(0x7f0000000c80)=@raw=[@alu={0x4, 0x0, 0x5, 0xb, 0x3, 0xffffffffffffffe0, 0x4}], &(0x7f0000000cc0)='GPL\x00', 0x3, 0x8, &(0x7f0000000d00)=""/8, 0x40f00, 0x1f, '\x00', r2, 0x25, r5, 0x8, &(0x7f0000000d40)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000d80)={0x5, 0x7, 0xd, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000dc0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000e00)=[{0x0, 0x5, 0xe, 0xa}, {0x5, 0x1, 0x6, 0xc}, {0x1, 0x4, 0x10}, {0x5, 0x1, 0x7, 0x3}, {0x1, 0x2, 0xf, 0x8}, {0x4, 0x2, 0x6, 0xa}, {0x1, 0x2, 0x10, 0xc}], 0x10, 0x9}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000f40)={0x1, 0xffffffffffffffff}, 0x4) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000f80)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xa00, '\x00', r2, 0xffffffffffffffff, 0x3, 0x5, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001000), &(0x7f0000001040)=r1}, 0x20) r15 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000010c0)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x1, '\x00', r2, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r17 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001180)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x8000, '\x00', r2, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x50) r18 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001200)={0xffffffffffffffff, 0x1, 0x4}, 0xc) r19 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001240)={0x1b, 0x0, 0x0, 0xfffffffc, 0x0, 0xffffffffffffffff, 0x4, '\x00', r2, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0xd983138aeebba68e, 0x26, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffbff, 0x0, 0x0, 0x0, 0x400}, [@generic={0x6, 0x6, 0x4, 0x6, 0x3e6a}, @generic={0x0, 0x9, 0xb, 0xb, 0xcd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x6}, @tail_call, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7a7}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @jmp={0x5, 0x0, 0xa, 0x0, 0x8, 0x0, 0x10}]}, &(0x7f0000000800)='syzkaller\x00', 0x10001, 0x86, &(0x7f0000000840)=""/134, 0x40f00, 0x5, '\x00', 0x0, @fallback, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000940)={0x0, 0x6, 0x1, 0x1}, 0x10, r10, r11, 0x4, &(0x7f00000012c0)=[r12, r13, r14, r15, r16, r17, r18, r19, r4], &(0x7f0000001300)=[{0x4, 0x2, 0x0, 0x5}, {0x2, 0x2, 0xa, 0x9}, {0x1, 0x4, 0x5, 0xb}, {0x5, 0x3, 0xe, 0xc}], 0x10, 0x1}, 0x94) r20 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xc, [@float={0x2, 0x0, 0x0, 0x10, 0x10}]}, {0x0, [0x30, 0x30, 0x0, 0x0, 0x2e, 0x30, 0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000001440)=""/33, 0x30, 0x21, 0x0, 0x1}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@bloom_filter={0x1e, 0x5, 0x4, 0xfffffff8, 0x0, 0x1, 0x100, '\x00', r2, r20, 0x2, 0x4, 0x0, 0xc}, 0x50) gettid() r21 = openat$cgroup_ro(r7, &(0x7f0000001540)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001880)={r21, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000018c0)={&(0x7f0000001580)="2faacb4630edd4e8ace0a31ee61868623851ba905bedf80ee31c7b9b30761c29ccde465a35e46c6a1dae83d7fc87a762108e32e3314e417431d3c4423985102cb2c89c0f9140e4ec25ffa79e3332c896b4e90b8faff223b68df4abd1c9c3e34f1c01bd83bdb0d29a00fe0324a7865a43e1179fcf4ef7125ae62bd2c516d61cf65f4a8168e18b8f8e9f6128f95e4df97407d03c32a24583618a7cfd11d4b38e779ced668b19109a5bb2066ea5261133de8df1f9848bb6b74180e4560412892427de93e982cbd5eda4ee2029f17513f4d954543c653b57c9164d0076cadaf4fb0ea04e8739c99a33f73250c8cbf01801ddb305", &(0x7f0000001680)=""/216, &(0x7f0000001780)="081b7230e07ace6bb7c410d5726ba5871ba55030ddbf5e7d2a7fbdff1e5cbf23fbfc348f3c3f3d7f336b8ec54f86f5be293e15e50f32b8277262c60377434fddba6c151032024206ea80bf59e472ba7e85f0bafb8e979c782b4d0f23dd92716c3ed32a90f389ffd8361920c0c1ae8633980afeefe9e23be3ca72b5d3a64bdbd93c", &(0x7f0000001840)="834aa0d039632a065a11897922610b98a82f4432252841132b2c9505a741df179f9442a4b4e5f8af25386227baea9a013c", 0x6, r22}, 0x38) ioctl$TUNSETIFINDEX(r21, 0x400454da, &(0x7f0000001900)=r2) 756.199405ms ago: executing program 9 (id=6675): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xb5}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x2a}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='mm_page_alloc\x00'}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) syz_clone(0x62005000, 0x0, 0x0, 0x0, 0x0, 0x0) 753.637215ms ago: executing program 6 (id=6676): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0xffffffffffffffd5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000ff0f000f0000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000004cab350f010000f8ffffffb702000008000000b70300000000d0d4b911a3000085000000710000009500020000000000b35ea853668e9f6fcdbd8786d3e30991217f54af9a751b691ec6681ede54924071da422acbe0c3f3c4070c791beb0284de1afd42b6c43ea3d944ea07b86b13e1db94fe661957324c54b3770200696d77eb60ae253e885e6c8eb0f5f3cde440cd1a6e84d37f51a26f6646f99807"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0xb}, 0x50) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRESOCT, @ANYBLOB="010000000000005400f0ff000000000000000000ec2d7e31703ffd1c6ab182ea5af006fe52d4a3e64d8c843870807a6ef3088df48d8940f6336162c877e4c17b848f1a129596d43c193364033146954287e38015226df8a9cce147", @ANYRESHEX=r1, @ANYRES32, @ANYBLOB="000000000300794bcc5889bea2ac0000200000000000f0ffffff0010"], 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000004f6ff00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r9) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r11) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) 701.207126ms ago: executing program 7 (id=6677): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00'}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) close(r3) 528.22873ms ago: executing program 7 (id=6678): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x5}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000002000000000000000000000300000000020000000200000000000000000000000000000105000000080000000000000002000005000000000000000001000000000000000000000001000000183500000000691471a879a6f7"], 0x0, 0x66}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) gettid() close(0xffffffffffffffff) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0d00000004000000040000000700000000000000", @ANYRES32=r2, @ANYBLOB="0000010000000000000000000000000000007013", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x800) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00"/11, @ANYRES32, @ANYBLOB="00000000d3ec66ecc053c543da2e2e"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018e206eca728b1538327cf7d5db557641100008ca7ed88f56000000000000000b2bc33055bbf1c42dd43407dcff3acaaac9302c8cac87a7df7", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x46, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 527.93096ms ago: executing program 3 (id=6679): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 451.542662ms ago: executing program 3 (id=6680): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0xffffffffffffffd5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x8810) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000ff0f000f0000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000004cab350f010000f8ffffffb702000008000000b70300000000d0d4b911a3000085000000710000009500020000000000b35ea853668e9f6fcdbd8786d3e30991217f54af9a751b691ec6681ede54924071da422acbe0c3f3c4070c791beb0284de1afd42b6c43ea3d944ea07b86b13e1db94fe661957324c54b3770200696d77eb60ae253e885e6c8eb0f5f3cde440cd1a6e84d37f51a26f6646f99807"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0xb}, 0x50) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRESOCT, @ANYBLOB="010000000000005400f0ff000000000000000000ec2d7e31703ffd1c6ab182ea5af006fe52d4a3e64d8c843870807a6ef3088df48d8940f6336162c877e4c17b848f1a129596d43c193364033146954287e38015226df8a9cce147", @ANYRESHEX=r1, @ANYRES32, @ANYBLOB="000000000300794bcc5889bea2ac0000200000000000f0ffffff0010"], 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000004f6ff00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) 393.980662ms ago: executing program 7 (id=6681): bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546000677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77674e802a0d42bc6099ad238af770b5ed8925161729298700000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809b5b9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed3957f813567f7a95435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac559eaf39027ceb379a902d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff7a1ef3282830689da6b53b263339863297771429d120000003341bf4abacac94500fca0493cf29b33dcc9ffffffffffffffd39f6ce0c6ff01589646efd1cf870cd7bb2366fdf870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1293b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd000c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301fb997316dbf17866fb84d4173731efe895ff2e1c55ef08235a0126e01254c44060926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a861887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7ad333545794f37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea139376f24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff070000001e48418046c216c1f895778cb25122a2a998de0842a486721737390cbf3a74cb2003016f1514216bdf57d2a40dddb51ab63e96ec84ac3571f02f647b3385b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df986741517abf11389b751f4e109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da230ed05a8fe64680b0a3f9f2dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b9100000000a55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa18854693ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab848753203b458b97ec1afb079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7db3c4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378ac2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6ca0400966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030108000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bffef97dcecc467ace456597685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c1e2af68c6f5054b078acd74b4a9c944e4505da485a3a4154387a0a88370d9ed9467b09c5888a06431df3f68abf0b366c4d5f8bea7b29c257ed756dff7a21c6b661cbdd43de65afd7f661d5c84f915c90e3d6ea012b68b787eb01d8320000000000000060176dacba0ec503a37fae6b472ec369c79ee6a420c0fd8d8d82fe136d5af6c30bfeb0a7275babfdb96a127aa9386e0671c6454245a18c1c8c49552cff5d27b547cdc34c0858c77a47a9ff86ee9fbd9ceda428716a4218821176d8067997527230fa67d26950d3e4f2750fa7c872874ad3a2d11f9f6eb08e6d7b6fa257b04d8ce36360f524e3dfd2211641f3d2637d86b80681eca50ce0eecafdd22d41fa515c15591e70ded4b70efac3cb42fb352d82e8f7573e8ed8248da356fa91a252976d3a4d8c1843a8d5bb7f5f1028453a0562a3ea93117076dd4940b7df50d78289fe66197525f6095f8662d232970bef61b03fa83027963a1a2e07cfee30c0d0b4c5877f93b3637ca21eab5afcf5d4638dfe8f9202aaad51c979049dd76d65368cbd4187d9f74257c7c4a23ac4a34eec5aa17e78c5167216f5e72138d20f8325dd5f8f96c32189c904eaef580987f1ce601a7cdc35461db9981ac42f9e24b0699bbe4e3d986e38952b0b7938eefd9e7a292bbb66367ad77045fdc18855c81c031dedd185c723238373fc698d676791d04f1ff5f0825a6619e844882f31ed190233d58ecee949e310bf2b1a51b8a33ae65a06d2b6ad386bf8dc49dd328bcd75d1843a13d68560175a18af7efc3c0f20e32f84f6aaaf000000000000000000000013a6c66bce74a8fb9092023df695da2714a7933d699d42de2bc4a85e0a0e22228290a7a7553ab93a16e42553ed86869a02df2f47d4088fac1772d3cd955c81cbf91c2ca7942942f61723b558079b82547844f92df2499c4b2c2ef2539e5daa8d8727baaa6b5755e6f83bbfca000000000000000000000509619f5f0cbc72eebc653946d3552236f0dfe485cfa71bd69f4ded6e131128c3875b785875addfcbd5931c12adbef75535e694f3a19f28f9f99fa32e8ff66e7b1ff674434fb63ba0e28aadccf77d387525c98e81476058c958eaccfa7d251d0671222dc9d06485f7f690d3d4227bd21bd7ff8338617705b7faec47c86789a488b43d0fedf1b0ee05d65c677ced1e8214b2f6cb74d73886eb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x4, 0x4, 0x0, 0x46821, r2, 0x10001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0xd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x40001000, &(0x7f00000004c0)="1dcd255f7d74d624082c8e60bfa500ccf245b460a9bff4b5b9f33b503af71ab837cd35d7a04c6b4b70578754c524b77c52feb8c421b7709be30cb772e579d8aa6cb190d25aa1c5f3ea16714b403a50590ea7c6018af4", 0x56, &(0x7f00000002c0), &(0x7f00000003c0), &(0x7f0000000580)="6120b8eefc46853747d0eaf7cd1d261521deacd8bb4851f6a4f7ec2e26bd7861e42d0937bec1ff7ee61d87d3c2ef6dd84b5b48345a7ca9b41ac0efa9fca445f91b52dc4ced82d9783a5918d97b99614012ce7cde936cfa9dd80aa8e16adb3298a65f1d7c699d7cd6ee7a1cfaed14e2ced5563347c3e6f51dbc1144fa0d29e8c119a2ddd625064d6754e9b922f4fedd97636798d902845148bf84daa9da5c3e9e234123e3a3efefe0a3684c6a7b75a8b9b08801a111c4b5d5200298abfe06f117cac48f340e1c8c69e011139c1e96b12a25b2c08c8db52eb89da13533808fd4aed4861f945d7b08575096") bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 258.040885ms ago: executing program 3 (id=6682): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0xffffffffffffffd5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x8810) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000ff0f000f0000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000004cab350f010000f8ffffffb702000008000000b70300000000d0d4b911a3000085000000710000009500020000000000b35ea853668e9f6fcdbd8786d3e30991217f54af9a751b691ec6681ede54924071da422acbe0c3f3c4070c791beb0284de1afd42b6c43ea3d944ea07b86b13e1db94fe661957324c54b3770200696d77eb60ae253e885e6c8eb0f5f3cde440cd1a6e84d37f51a26f6646f99807"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0xb}, 0x50) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRESOCT, @ANYBLOB="010000000000005400f0ff000000000000000000ec2d7e31703ffd1c6ab182ea5af006fe52d4a3e64d8c843870807a6ef3088df48d8940f6336162c877e4c17b848f1a129596d43c193364033146954287e38015226df8a9cce147", @ANYRESHEX=r1, @ANYRES32, @ANYBLOB="000000000300794bcc5889bea2ac0000200000000000f0ffffff0010"], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000004f6ff00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r11) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) 250.150525ms ago: executing program 6 (id=6683): socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="08000000040000311c1dcd000700000000000000dd5aa86e85fec26906405088ef5a0490b6bc571ff7ed8f30f75829270f3a2e7d4641c766d07c4063facbe5ddb1e9d36b1c4f3e4d1e19fe6f35038d36321e27de78fafb5d610d83d25b902d63ceda45af38ef399f078db70fc60c11cc9543eb8497d5bcc7127008202d3d8656916aebfc97d2d62fc664f1672af466cc527ef2138ed06b321200c69b21321145450f1e11ec7c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\t\x00'/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056a", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32, @ANYBLOB="02000000000000000000e2ff00"/22], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x1b, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @map_fd={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x7b}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40efe, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 93.550668ms ago: executing program 3 (id=6684): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000005c0)={r2}, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0xc) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000e0000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='(pu&&&\t&&') unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018300000", @ANYRES32, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000180900002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70200000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x23) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1}, 0x4) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000005c0)={r2}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0xc) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000e0000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='(pu&&&\t&&') (async) unlink(&(0x7f0000000140)='./cgroup\x00') (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018300000", @ANYRES32, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000180900002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70200000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x23) (async) 0s ago: executing program 6 (id=6685): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x18}, 0x8810) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x800000000000000}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x100002, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000300000000000000000000000000610000000000"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000010000000800000008"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r3, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000300)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000580)="213fbbd5e4a15b5fff69a8760693fe80fdfac88658", 0x0, 0x23, r4}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x101481, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x264, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a2, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x48) kernel console output (not intermixed with test programs): ink_show_fdinfo+0x310/0x310 [ 472.439728][T14315] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 472.445916][T14315] __x64_sys_bpf+0x7c/0x90 [ 472.450436][T14315] x64_sys_call+0x4b9/0x9a0 [ 472.454974][T14315] do_syscall_64+0x4c/0xa0 [ 472.459428][T14315] ? clear_bhb_loop+0x50/0xa0 [ 472.464138][T14315] ? clear_bhb_loop+0x50/0xa0 [ 472.468838][T14315] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 472.474764][T14315] RIP: 0033:0x7fae2ceafec9 [ 472.479208][T14315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 472.498836][T14315] RSP: 002b:00007fae2b918038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 472.507267][T14315] RAX: ffffffffffffffda RBX: 00007fae2d106fa0 RCX: 00007fae2ceafec9 [ 472.515252][T14315] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 472.523239][T14315] RBP: 00007fae2b918090 R08: 0000000000000000 R09: 0000000000000000 [ 472.531215][T14315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 472.539187][T14315] R13: 00007fae2d107038 R14: 00007fae2d106fa0 R15: 00007ffe85462578 [ 472.547177][T14315] [ 473.696789][T14352] FAULT_INJECTION: forcing a failure. [ 473.696789][T14352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 473.869538][T14352] CPU: 0 PID: 14352 Comm: syz.7.4368 Tainted: G W syzkaller #0 [ 473.878549][T14352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 473.888818][T14352] Call Trace: [ 473.892130][T14352] [ 473.895085][T14352] __dump_stack+0x21/0x30 [ 473.899447][T14352] dump_stack_lvl+0xee/0x150 [ 473.904178][T14352] ? show_regs_print_info+0x20/0x20 [ 473.909403][T14352] ? migrate_enable+0x192/0x260 [ 473.914281][T14352] ? migrate_disable+0x180/0x180 [ 473.919250][T14352] dump_stack+0x15/0x20 [ 473.923424][T14352] should_fail+0x3c1/0x510 [ 473.927908][T14352] should_fail_usercopy+0x1a/0x20 [ 473.932948][T14352] _copy_from_user+0x20/0xd0 [ 473.937554][T14352] generic_map_update_batch+0x44f/0x740 [ 473.943115][T14352] ? generic_map_delete_batch+0x510/0x510 [ 473.948846][T14352] ? __fdget+0x1a1/0x230 [ 473.953105][T14352] ? generic_map_delete_batch+0x510/0x510 [ 473.958855][T14352] bpf_map_do_batch+0x463/0x5f0 [ 473.963723][T14352] __sys_bpf+0x5e3/0x730 [ 473.968018][T14352] ? bpf_link_show_fdinfo+0x310/0x310 [ 473.973404][T14352] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 473.979572][T14352] __x64_sys_bpf+0x7c/0x90 [ 473.984080][T14352] x64_sys_call+0x4b9/0x9a0 [ 473.988588][T14352] do_syscall_64+0x4c/0xa0 [ 473.993014][T14352] ? clear_bhb_loop+0x50/0xa0 [ 473.997697][T14352] ? clear_bhb_loop+0x50/0xa0 [ 474.002404][T14352] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 474.008310][T14352] RIP: 0033:0x7fae2ceafec9 [ 474.012747][T14352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 474.032449][T14352] RSP: 002b:00007fae2b918038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 474.040981][T14352] RAX: ffffffffffffffda RBX: 00007fae2d106fa0 RCX: 00007fae2ceafec9 [ 474.049063][T14352] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 474.057038][T14352] RBP: 00007fae2b918090 R08: 0000000000000000 R09: 0000000000000000 [ 474.065021][T14352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 474.073026][T14352] R13: 00007fae2d107038 R14: 00007fae2d106fa0 R15: 00007ffe85462578 [ 474.081016][T14352] [ 475.680771][T14413] FAULT_INJECTION: forcing a failure. [ 475.680771][T14413] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 475.758406][T14413] CPU: 1 PID: 14413 Comm: syz.6.4392 Tainted: G W syzkaller #0 [ 475.767314][T14413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 475.777399][T14413] Call Trace: [ 475.780700][T14413] [ 475.783650][T14413] __dump_stack+0x21/0x30 [ 475.788011][T14413] dump_stack_lvl+0xee/0x150 [ 475.792639][T14413] ? show_regs_print_info+0x20/0x20 [ 475.797869][T14413] ? migrate_enable+0x192/0x260 [ 475.802743][T14413] ? migrate_disable+0x180/0x180 [ 475.807707][T14413] dump_stack+0x15/0x20 [ 475.811971][T14413] should_fail+0x3c1/0x510 [ 475.816421][T14413] should_fail_usercopy+0x1a/0x20 [ 475.821470][T14413] _copy_from_user+0x20/0xd0 [ 475.826084][T14413] generic_map_update_batch+0x4a3/0x740 [ 475.831667][T14413] ? generic_map_delete_batch+0x510/0x510 [ 475.837416][T14413] ? __fdget+0x1a1/0x230 [ 475.841681][T14413] ? generic_map_delete_batch+0x510/0x510 [ 475.847423][T14413] bpf_map_do_batch+0x463/0x5f0 [ 475.852389][T14413] __sys_bpf+0x5e3/0x730 [ 475.856768][T14413] ? bpf_link_show_fdinfo+0x310/0x310 [ 475.862156][T14413] __x64_sys_bpf+0x7c/0x90 [ 475.866619][T14413] x64_sys_call+0x4b9/0x9a0 [ 475.871305][T14413] do_syscall_64+0x4c/0xa0 [ 475.875735][T14413] ? clear_bhb_loop+0x50/0xa0 [ 475.880415][T14413] ? clear_bhb_loop+0x50/0xa0 [ 475.885290][T14413] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 475.891204][T14413] RIP: 0033:0x7fd3a9bfeec9 [ 475.895634][T14413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 475.915257][T14413] RSP: 002b:00007fd3a8667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 475.923697][T14413] RAX: ffffffffffffffda RBX: 00007fd3a9e55fa0 RCX: 00007fd3a9bfeec9 [ 475.931691][T14413] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 475.939678][T14413] RBP: 00007fd3a8667090 R08: 0000000000000000 R09: 0000000000000000 [ 475.947760][T14413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 475.955854][T14413] R13: 00007fd3a9e56038 R14: 00007fd3a9e55fa0 R15: 00007ffc02a5f878 [ 475.963842][T14413] [ 475.980626][T14418] device syzkaller0 entered promiscuous mode [ 476.390852][T14443] device sit0 entered promiscuous mode [ 477.337218][T14457] FAULT_INJECTION: forcing a failure. [ 477.337218][T14457] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 477.429056][T14457] CPU: 1 PID: 14457 Comm: syz.7.4410 Tainted: G W syzkaller #0 [ 477.437971][T14457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 477.448046][T14457] Call Trace: [ 477.451339][T14457] [ 477.454299][T14457] __dump_stack+0x21/0x30 [ 477.458657][T14457] dump_stack_lvl+0xee/0x150 [ 477.463354][T14457] ? show_regs_print_info+0x20/0x20 [ 477.468571][T14457] ? migrate_enable+0x192/0x260 [ 477.473444][T14457] ? migrate_disable+0x180/0x180 [ 477.478405][T14457] dump_stack+0x15/0x20 [ 477.482577][T14457] should_fail+0x3c1/0x510 [ 477.487011][T14457] should_fail_usercopy+0x1a/0x20 [ 477.492079][T14457] _copy_from_user+0x20/0xd0 [ 477.496706][T14457] generic_map_update_batch+0x44f/0x740 [ 477.502282][T14457] ? generic_map_delete_batch+0x510/0x510 [ 477.508024][T14457] ? __fdget+0x1a1/0x230 [ 477.512459][T14457] ? generic_map_delete_batch+0x510/0x510 [ 477.518198][T14457] bpf_map_do_batch+0x463/0x5f0 [ 477.523070][T14457] __sys_bpf+0x5e3/0x730 [ 477.527444][T14457] ? bpf_link_show_fdinfo+0x310/0x310 [ 477.532930][T14457] ? debug_smp_processor_id+0x17/0x20 [ 477.538333][T14457] __x64_sys_bpf+0x7c/0x90 [ 477.542764][T14457] x64_sys_call+0x4b9/0x9a0 [ 477.547286][T14457] do_syscall_64+0x4c/0xa0 [ 477.551719][T14457] ? clear_bhb_loop+0x50/0xa0 [ 477.556501][T14457] ? clear_bhb_loop+0x50/0xa0 [ 477.561205][T14457] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 477.567115][T14457] RIP: 0033:0x7fae2ceafec9 [ 477.571548][T14457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 477.591171][T14457] RSP: 002b:00007fae2b918038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 477.599610][T14457] RAX: ffffffffffffffda RBX: 00007fae2d106fa0 RCX: 00007fae2ceafec9 [ 477.607812][T14457] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 477.615797][T14457] RBP: 00007fae2b918090 R08: 0000000000000000 R09: 0000000000000000 [ 477.624237][T14457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 477.632228][T14457] R13: 00007fae2d107038 R14: 00007fae2d106fa0 R15: 00007ffe85462578 [ 477.640230][T14457] [ 477.988104][T14471] device syzkaller0 entered promiscuous mode [ 479.943778][T14534] device syzkaller0 entered promiscuous mode [ 480.880384][T14566] syz.7.4451[14566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.880517][T14566] syz.7.4451[14566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.124186][T14583] device pim6reg1 entered promiscuous mode [ 481.162079][T14585] syz.6.4457[14585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.162172][T14585] syz.6.4457[14585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.226938][T14585] device sit0 entered promiscuous mode [ 482.375076][T14642] device bridge_slave_1 left promiscuous mode [ 482.388689][T14642] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.406612][T14642] device bridge_slave_0 left promiscuous mode [ 482.425226][T14642] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.765326][T14674] FAULT_INJECTION: forcing a failure. [ 483.765326][T14674] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 483.868967][T14674] CPU: 0 PID: 14674 Comm: syz.7.4489 Tainted: G W syzkaller #0 [ 483.877889][T14674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 483.887966][T14674] Call Trace: [ 483.891249][T14674] [ 483.894274][T14674] __dump_stack+0x21/0x30 [ 483.898706][T14674] dump_stack_lvl+0xee/0x150 [ 483.903302][T14674] ? show_regs_print_info+0x20/0x20 [ 483.908501][T14674] ? migrate_enable+0x192/0x260 [ 483.913364][T14674] ? migrate_disable+0x180/0x180 [ 483.918306][T14674] dump_stack+0x15/0x20 [ 483.922464][T14674] should_fail+0x3c1/0x510 [ 483.926891][T14674] should_fail_usercopy+0x1a/0x20 [ 483.931921][T14674] _copy_from_user+0x20/0xd0 [ 483.936520][T14674] generic_map_update_batch+0x44f/0x740 [ 483.942076][T14674] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 483.948341][T14674] ? generic_map_delete_batch+0x510/0x510 [ 483.954065][T14674] ? __fdget+0x1a1/0x230 [ 483.958350][T14674] ? generic_map_delete_batch+0x510/0x510 [ 483.964857][T14674] bpf_map_do_batch+0x463/0x5f0 [ 483.969714][T14674] __sys_bpf+0x5e3/0x730 [ 483.973962][T14674] ? bpf_link_show_fdinfo+0x310/0x310 [ 483.979607][T14674] __x64_sys_bpf+0x7c/0x90 [ 483.984029][T14674] x64_sys_call+0x4b9/0x9a0 [ 483.988542][T14674] do_syscall_64+0x4c/0xa0 [ 483.992966][T14674] ? clear_bhb_loop+0x50/0xa0 [ 483.997678][T14674] ? clear_bhb_loop+0x50/0xa0 [ 484.002361][T14674] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 484.008259][T14674] RIP: 0033:0x7fae2ceafec9 [ 484.012681][T14674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 484.032294][T14674] RSP: 002b:00007fae2b918038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 484.040827][T14674] RAX: ffffffffffffffda RBX: 00007fae2d106fa0 RCX: 00007fae2ceafec9 [ 484.048799][T14674] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 484.056771][T14674] RBP: 00007fae2b918090 R08: 0000000000000000 R09: 0000000000000000 [ 484.064748][T14674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 484.072730][T14674] R13: 00007fae2d107038 R14: 00007fae2d106fa0 R15: 00007ffe85462578 [ 484.080739][T14674] [ 484.210072][T14681] device pim6reg1 entered promiscuous mode [ 484.312328][T14689] device pim6reg1 entered promiscuous mode [ 485.734276][T14727] FAULT_INJECTION: forcing a failure. [ 485.734276][T14727] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 485.778712][T14727] CPU: 0 PID: 14727 Comm: syz.7.4505 Tainted: G W syzkaller #0 [ 485.787655][T14727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 485.797738][T14727] Call Trace: [ 485.801038][T14727] [ 485.804093][T14727] __dump_stack+0x21/0x30 [ 485.808448][T14727] dump_stack_lvl+0xee/0x150 [ 485.813054][T14727] ? show_regs_print_info+0x20/0x20 [ 485.818279][T14727] ? dump_stack+0x9/0x20 [ 485.822560][T14727] dump_stack+0x15/0x20 [ 485.826737][T14727] should_fail+0x3c1/0x510 [ 485.831186][T14727] should_fail_usercopy+0x1a/0x20 [ 485.836230][T14727] _copy_from_user+0x20/0xd0 [ 485.840850][T14727] generic_map_update_batch+0x4a3/0x740 [ 485.846427][T14727] ? generic_map_delete_batch+0x510/0x510 [ 485.852170][T14727] ? __fdget+0x1a1/0x230 [ 485.856435][T14727] ? generic_map_delete_batch+0x510/0x510 [ 485.862366][T14727] bpf_map_do_batch+0x463/0x5f0 [ 485.867377][T14727] __sys_bpf+0x5e3/0x730 [ 485.871642][T14727] ? bpf_link_show_fdinfo+0x310/0x310 [ 485.877061][T14727] __x64_sys_bpf+0x7c/0x90 [ 485.881494][T14727] x64_sys_call+0x4b9/0x9a0 [ 485.886028][T14727] do_syscall_64+0x4c/0xa0 [ 485.890476][T14727] ? clear_bhb_loop+0x50/0xa0 [ 485.895262][T14727] ? clear_bhb_loop+0x50/0xa0 [ 485.899966][T14727] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 485.905881][T14727] RIP: 0033:0x7fae2ceafec9 [ 485.910509][T14727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.930148][T14727] RSP: 002b:00007fae2b918038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 485.938594][T14727] RAX: ffffffffffffffda RBX: 00007fae2d106fa0 RCX: 00007fae2ceafec9 [ 485.946600][T14727] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 485.954603][T14727] RBP: 00007fae2b918090 R08: 0000000000000000 R09: 0000000000000000 [ 485.962588][T14727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 485.970552][T14727] R13: 00007fae2d107038 R14: 00007fae2d106fa0 R15: 00007ffe85462578 [ 485.978525][T14727] [ 487.204345][T14770] FAULT_INJECTION: forcing a failure. [ 487.204345][T14770] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 487.220747][T14770] CPU: 0 PID: 14770 Comm: syz.3.4521 Tainted: G W syzkaller #0 [ 487.229641][T14770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 487.239729][T14770] Call Trace: [ 487.243028][T14770] [ 487.245975][T14770] __dump_stack+0x21/0x30 [ 487.250332][T14770] dump_stack_lvl+0xee/0x150 [ 487.254949][T14770] ? show_regs_print_info+0x20/0x20 [ 487.260266][T14770] ? migrate_enable+0x192/0x260 [ 487.265228][T14770] ? migrate_disable+0x180/0x180 [ 487.270300][T14770] dump_stack+0x15/0x20 [ 487.274491][T14770] should_fail+0x3c1/0x510 [ 487.278944][T14770] should_fail_usercopy+0x1a/0x20 [ 487.284000][T14770] _copy_from_user+0x20/0xd0 [ 487.288657][T14770] generic_map_update_batch+0x44f/0x740 [ 487.294324][T14770] ? generic_map_delete_batch+0x510/0x510 [ 487.300076][T14770] ? __fdget+0x1a1/0x230 [ 487.304365][T14770] ? generic_map_delete_batch+0x510/0x510 [ 487.310136][T14770] bpf_map_do_batch+0x463/0x5f0 [ 487.315017][T14770] __sys_bpf+0x5e3/0x730 [ 487.319282][T14770] ? bpf_link_show_fdinfo+0x310/0x310 [ 487.324712][T14770] __x64_sys_bpf+0x7c/0x90 [ 487.329158][T14770] x64_sys_call+0x4b9/0x9a0 [ 487.333700][T14770] do_syscall_64+0x4c/0xa0 [ 487.338145][T14770] ? clear_bhb_loop+0x50/0xa0 [ 487.343038][T14770] ? clear_bhb_loop+0x50/0xa0 [ 487.347837][T14770] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 487.353773][T14770] RIP: 0033:0x7f34b7944ec9 [ 487.358209][T14770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 487.378052][T14770] RSP: 002b:00007f34b63ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 487.386537][T14770] RAX: ffffffffffffffda RBX: 00007f34b7b9bfa0 RCX: 00007f34b7944ec9 [ 487.394861][T14770] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 487.402862][T14770] RBP: 00007f34b63ad090 R08: 0000000000000000 R09: 0000000000000000 [ 487.410855][T14770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 487.419136][T14770] R13: 00007f34b7b9c038 R14: 00007f34b7b9bfa0 R15: 00007ffc7df9dd38 [ 487.427141][T14770] [ 488.793348][T14828] FAULT_INJECTION: forcing a failure. [ 488.793348][T14828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 488.829105][T14828] CPU: 1 PID: 14828 Comm: syz.6.4537 Tainted: G W syzkaller #0 [ 488.838186][T14828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 488.848264][T14828] Call Trace: [ 488.851559][T14828] [ 488.854507][T14828] __dump_stack+0x21/0x30 [ 488.858861][T14828] dump_stack_lvl+0xee/0x150 [ 488.863476][T14828] ? show_regs_print_info+0x20/0x20 [ 488.868701][T14828] dump_stack+0x15/0x20 [ 488.872875][T14828] should_fail+0x3c1/0x510 [ 488.877406][T14828] should_fail_usercopy+0x1a/0x20 [ 488.882464][T14828] _copy_from_user+0x20/0xd0 [ 488.887214][T14828] generic_map_update_batch+0x4a3/0x740 [ 488.892901][T14828] ? __fget_files+0x2c/0x320 [ 488.897520][T14828] ? generic_map_delete_batch+0x510/0x510 [ 488.903266][T14828] ? __fdget+0x1a1/0x230 [ 488.907618][T14828] ? generic_map_delete_batch+0x510/0x510 [ 488.913454][T14828] bpf_map_do_batch+0x463/0x5f0 [ 488.918329][T14828] __sys_bpf+0x5e3/0x730 [ 488.922610][T14828] ? bpf_link_show_fdinfo+0x310/0x310 [ 488.928016][T14828] ? debug_smp_processor_id+0x17/0x20 [ 488.933432][T14828] __x64_sys_bpf+0x7c/0x90 [ 488.937861][T14828] x64_sys_call+0x4b9/0x9a0 [ 488.942369][T14828] do_syscall_64+0x4c/0xa0 [ 488.946795][T14828] ? clear_bhb_loop+0x50/0xa0 [ 488.951479][T14828] ? clear_bhb_loop+0x50/0xa0 [ 488.956169][T14828] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 488.962071][T14828] RIP: 0033:0x7fd3a9bfeec9 [ 488.966497][T14828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 488.986124][T14828] RSP: 002b:00007fd3a8667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 488.994634][T14828] RAX: ffffffffffffffda RBX: 00007fd3a9e55fa0 RCX: 00007fd3a9bfeec9 [ 489.002616][T14828] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 489.010703][T14828] RBP: 00007fd3a8667090 R08: 0000000000000000 R09: 0000000000000000 [ 489.018677][T14828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 489.026661][T14828] R13: 00007fd3a9e56038 R14: 00007fd3a9e55fa0 R15: 00007ffc02a5f878 [ 489.034650][T14828] [ 489.186986][T14838] device sit0 left promiscuous mode [ 489.216114][T14838] device sit0 entered promiscuous mode [ 489.539887][T14854] device veth1_macvtap left promiscuous mode [ 489.591892][T14854] device veth1_macvtap entered promiscuous mode [ 489.641091][T14854] device macsec0 entered promiscuous mode [ 489.782311][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 490.441106][T14870] FAULT_INJECTION: forcing a failure. [ 490.441106][T14870] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 490.537603][T14870] CPU: 0 PID: 14870 Comm: syz.8.4552 Tainted: G W syzkaller #0 [ 490.546540][T14870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 490.556906][T14870] Call Trace: [ 490.560213][T14870] [ 490.563166][T14870] __dump_stack+0x21/0x30 [ 490.567529][T14870] dump_stack_lvl+0xee/0x150 [ 490.572140][T14870] ? show_regs_print_info+0x20/0x20 [ 490.577387][T14870] dump_stack+0x15/0x20 [ 490.581561][T14870] should_fail+0x3c1/0x510 [ 490.586003][T14870] should_fail_usercopy+0x1a/0x20 [ 490.591047][T14870] _copy_from_user+0x20/0xd0 [ 490.595667][T14870] generic_map_update_batch+0x44f/0x740 [ 490.601280][T14870] ? generic_map_delete_batch+0x510/0x510 [ 490.607045][T14870] ? __fdget+0x1a1/0x230 [ 490.611312][T14870] ? generic_map_delete_batch+0x510/0x510 [ 490.617056][T14870] bpf_map_do_batch+0x463/0x5f0 [ 490.621934][T14870] __sys_bpf+0x5e3/0x730 [ 490.626203][T14870] ? bpf_link_show_fdinfo+0x310/0x310 [ 490.631604][T14870] __x64_sys_bpf+0x7c/0x90 [ 490.636045][T14870] x64_sys_call+0x4b9/0x9a0 [ 490.640571][T14870] do_syscall_64+0x4c/0xa0 [ 490.645032][T14870] ? clear_bhb_loop+0x50/0xa0 [ 490.650251][T14870] ? clear_bhb_loop+0x50/0xa0 [ 490.654965][T14870] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 490.660886][T14870] RIP: 0033:0x7fd670669ec9 [ 490.665334][T14870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 490.684964][T14870] RSP: 002b:00007fd66f0d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 490.693407][T14870] RAX: ffffffffffffffda RBX: 00007fd6708c0fa0 RCX: 00007fd670669ec9 [ 490.701484][T14870] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 490.709474][T14870] RBP: 00007fd66f0d2090 R08: 0000000000000000 R09: 0000000000000000 [ 490.717557][T14870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 490.725540][T14870] R13: 00007fd6708c1038 R14: 00007fd6708c0fa0 R15: 00007ffc5d83d358 [ 490.733547][T14870] [ 491.588986][T14914] FAULT_INJECTION: forcing a failure. [ 491.588986][T14914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 491.661388][T14914] CPU: 0 PID: 14914 Comm: syz.8.4567 Tainted: G W syzkaller #0 [ 491.670311][T14914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 491.680408][T14914] Call Trace: [ 491.683709][T14914] [ 491.686661][T14914] __dump_stack+0x21/0x30 [ 491.691014][T14914] dump_stack_lvl+0xee/0x150 [ 491.695627][T14914] ? show_regs_print_info+0x20/0x20 [ 491.700847][T14914] ? migrate_enable+0x192/0x260 [ 491.705720][T14914] ? migrate_disable+0x180/0x180 [ 491.710700][T14914] dump_stack+0x15/0x20 [ 491.714990][T14914] should_fail+0x3c1/0x510 [ 491.719429][T14914] should_fail_usercopy+0x1a/0x20 [ 491.724477][T14914] _copy_from_user+0x20/0xd0 [ 491.729096][T14914] generic_map_update_batch+0x4a3/0x740 [ 491.734675][T14914] ? generic_map_delete_batch+0x510/0x510 [ 491.740422][T14914] ? __fdget+0x1a1/0x230 [ 491.744692][T14914] ? generic_map_delete_batch+0x510/0x510 [ 491.750438][T14914] bpf_map_do_batch+0x463/0x5f0 [ 491.755326][T14914] __sys_bpf+0x5e3/0x730 [ 491.759585][T14914] ? bpf_link_show_fdinfo+0x310/0x310 [ 491.764990][T14914] __x64_sys_bpf+0x7c/0x90 [ 491.769429][T14914] x64_sys_call+0x4b9/0x9a0 [ 491.774146][T14914] do_syscall_64+0x4c/0xa0 [ 491.778594][T14914] ? clear_bhb_loop+0x50/0xa0 [ 491.783311][T14914] ? clear_bhb_loop+0x50/0xa0 [ 491.788029][T14914] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 491.793964][T14914] RIP: 0033:0x7fd670669ec9 [ 491.798402][T14914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 491.818034][T14914] RSP: 002b:00007fd66f0d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 491.826517][T14914] RAX: ffffffffffffffda RBX: 00007fd6708c0fa0 RCX: 00007fd670669ec9 [ 491.834502][T14914] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 491.842492][T14914] RBP: 00007fd66f0d2090 R08: 0000000000000000 R09: 0000000000000000 [ 491.850468][T14914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 491.858444][T14914] R13: 00007fd6708c1038 R14: 00007fd6708c0fa0 R15: 00007ffc5d83d358 [ 491.866435][T14914] [ 492.162493][T14928] device wg2 entered promiscuous mode [ 492.246476][T14934] ip6_vti0: mtu greater than device maximum [ 492.829503][T14961] FAULT_INJECTION: forcing a failure. [ 492.829503][T14961] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 492.843200][T14961] CPU: 1 PID: 14961 Comm: syz.3.4582 Tainted: G W syzkaller #0 [ 492.852097][T14961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 492.862710][T14961] Call Trace: [ 492.866004][T14961] [ 492.868946][T14961] __dump_stack+0x21/0x30 [ 492.873291][T14961] dump_stack_lvl+0xee/0x150 [ 492.877982][T14961] ? show_regs_print_info+0x20/0x20 [ 492.883192][T14961] ? dump_stack+0x9/0x20 [ 492.887526][T14961] dump_stack+0x15/0x20 [ 492.891687][T14961] should_fail+0x3c1/0x510 [ 492.896114][T14961] should_fail_usercopy+0x1a/0x20 [ 492.901159][T14961] _copy_from_user+0x20/0xd0 [ 492.905763][T14961] generic_map_update_batch+0x44f/0x740 [ 492.911432][T14961] ? generic_map_delete_batch+0x510/0x510 [ 492.917173][T14961] ? __fdget+0x1a1/0x230 [ 492.921436][T14961] ? generic_map_delete_batch+0x510/0x510 [ 492.927253][T14961] bpf_map_do_batch+0x463/0x5f0 [ 492.932114][T14961] __sys_bpf+0x5e3/0x730 [ 492.936358][T14961] ? bpf_link_show_fdinfo+0x310/0x310 [ 492.941739][T14961] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 492.947906][T14961] __x64_sys_bpf+0x7c/0x90 [ 492.952458][T14961] x64_sys_call+0x4b9/0x9a0 [ 492.956967][T14961] do_syscall_64+0x4c/0xa0 [ 492.961585][T14961] ? clear_bhb_loop+0x50/0xa0 [ 492.966271][T14961] ? clear_bhb_loop+0x50/0xa0 [ 492.970951][T14961] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 492.976859][T14961] RIP: 0033:0x7f34b7944ec9 [ 492.981275][T14961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 493.000904][T14961] RSP: 002b:00007f34b63ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 493.009322][T14961] RAX: ffffffffffffffda RBX: 00007f34b7b9bfa0 RCX: 00007f34b7944ec9 [ 493.017295][T14961] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 493.025295][T14961] RBP: 00007f34b63ad090 R08: 0000000000000000 R09: 0000000000000000 [ 493.033272][T14961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 493.041242][T14961] R13: 00007f34b7b9c038 R14: 00007f34b7b9bfa0 R15: 00007ffc7df9dd38 [ 493.049225][T14961] [ 493.120125][T14963] device sit0 left promiscuous mode [ 493.185826][T14963] device sit0 entered promiscuous mode [ 493.497486][ T30] audit: type=1400 audit(1758949371.958:164): avc: denied { setattr } for pid=14969 comm="syz.6.4585" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 493.560603][T14978] device syzkaller0 entered promiscuous mode [ 495.327957][T15024] device sit0 entered promiscuous mode [ 495.541488][T15031] FAULT_INJECTION: forcing a failure. [ 495.541488][T15031] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 495.558128][T15031] CPU: 0 PID: 15031 Comm: syz.9.4604 Tainted: G W syzkaller #0 [ 495.567145][T15031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 495.577245][T15031] Call Trace: [ 495.580536][T15031] [ 495.583480][T15031] __dump_stack+0x21/0x30 [ 495.587830][T15031] dump_stack_lvl+0xee/0x150 [ 495.592446][T15031] ? show_regs_print_info+0x20/0x20 [ 495.597660][T15031] ? dump_stack+0x9/0x20 [ 495.601922][T15031] dump_stack+0x15/0x20 [ 495.606098][T15031] should_fail+0x3c1/0x510 [ 495.610533][T15031] should_fail_usercopy+0x1a/0x20 [ 495.615577][T15031] _copy_from_user+0x20/0xd0 [ 495.620189][T15031] generic_map_update_batch+0x4a3/0x740 [ 495.625761][T15031] ? generic_map_delete_batch+0x510/0x510 [ 495.631499][T15031] ? __fdget+0x1a1/0x230 [ 495.635769][T15031] ? generic_map_delete_batch+0x510/0x510 [ 495.641508][T15031] bpf_map_do_batch+0x463/0x5f0 [ 495.646462][T15031] __sys_bpf+0x5e3/0x730 [ 495.650724][T15031] ? bpf_link_show_fdinfo+0x310/0x310 [ 495.656119][T15031] __x64_sys_bpf+0x7c/0x90 [ 495.660558][T15031] x64_sys_call+0x4b9/0x9a0 [ 495.665079][T15031] do_syscall_64+0x4c/0xa0 [ 495.669515][T15031] ? clear_bhb_loop+0x50/0xa0 [ 495.674209][T15031] ? clear_bhb_loop+0x50/0xa0 [ 495.678906][T15031] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 495.684823][T15031] RIP: 0033:0x7fd77773bec9 [ 495.689266][T15031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 495.708986][T15031] RSP: 002b:00007fd7761a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 495.717698][T15031] RAX: ffffffffffffffda RBX: 00007fd777992fa0 RCX: 00007fd77773bec9 [ 495.726055][T15031] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 495.734047][T15031] RBP: 00007fd7761a4090 R08: 0000000000000000 R09: 0000000000000000 [ 495.742039][T15031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 495.750034][T15031] R13: 00007fd777993038 R14: 00007fd777992fa0 R15: 00007ffc9af5d2d8 [ 495.758040][T15031] [ 496.961005][T15077] FAULT_INJECTION: forcing a failure. [ 496.961005][T15077] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 496.974307][T15077] CPU: 0 PID: 15077 Comm: syz.6.4622 Tainted: G W syzkaller #0 [ 496.983289][T15077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 496.993378][T15077] Call Trace: [ 496.996691][T15077] [ 496.999731][T15077] __dump_stack+0x21/0x30 [ 497.004116][T15077] dump_stack_lvl+0xee/0x150 [ 497.008737][T15077] ? show_regs_print_info+0x20/0x20 [ 497.013949][T15077] ? __activate_page+0xd40/0xd40 [ 497.018918][T15077] dump_stack+0x15/0x20 [ 497.023079][T15077] should_fail+0x3c1/0x510 [ 497.027498][T15077] should_fail_usercopy+0x1a/0x20 [ 497.032539][T15077] copy_page_from_iter_atomic+0x3fb/0x1350 [ 497.038361][T15077] ? pipe_zero+0x370/0x370 [ 497.042783][T15077] generic_perform_write+0x307/0x670 [ 497.048080][T15077] ? grab_cache_page_write_begin+0xb0/0xb0 [ 497.053885][T15077] ? file_remove_privs+0x590/0x590 [ 497.058996][T15077] ? rwsem_write_trylock+0x130/0x300 [ 497.064282][T15077] ? clear_nonspinnable+0x60/0x60 [ 497.069325][T15077] ? avc_policy_seqno+0x1b/0x70 [ 497.074179][T15077] __generic_file_write_iter+0x268/0x480 [ 497.079848][T15077] generic_file_write_iter+0xa9/0x1d0 [ 497.085233][T15077] vfs_write+0x802/0xf70 [ 497.089475][T15077] ? file_end_write+0x1b0/0x1b0 [ 497.094429][T15077] ? wait_for_completion_killable_timeout+0x10/0x10 [ 497.101015][T15077] ? __fget_files+0x2c4/0x320 [ 497.105704][T15077] ? __fdget_pos+0x2d2/0x380 [ 497.110733][T15077] ? ksys_write+0x71/0x240 [ 497.115147][T15077] ksys_write+0x140/0x240 [ 497.119505][T15077] ? __ia32_sys_read+0x90/0x90 [ 497.124449][T15077] ? debug_smp_processor_id+0x17/0x20 [ 497.129843][T15077] __x64_sys_write+0x7b/0x90 [ 497.134446][T15077] x64_sys_call+0x8ef/0x9a0 [ 497.138969][T15077] do_syscall_64+0x4c/0xa0 [ 497.143518][T15077] ? clear_bhb_loop+0x50/0xa0 [ 497.148226][T15077] ? clear_bhb_loop+0x50/0xa0 [ 497.152919][T15077] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 497.158825][T15077] RIP: 0033:0x7fd3a9bfeec9 [ 497.163274][T15077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 497.183090][T15077] RSP: 002b:00007fd3a8667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 497.191528][T15077] RAX: ffffffffffffffda RBX: 00007fd3a9e55fa0 RCX: 00007fd3a9bfeec9 [ 497.199519][T15077] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 000000000000000a [ 497.207495][T15077] RBP: 00007fd3a8667090 R08: 0000000000000000 R09: 0000000000000000 [ 497.215469][T15077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 497.223436][T15077] R13: 00007fd3a9e56038 R14: 00007fd3a9e55fa0 R15: 00007ffc02a5f878 [ 497.231431][T15077] [ 497.294201][T15079] FAULT_INJECTION: forcing a failure. [ 497.294201][T15079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 497.364824][T15079] CPU: 1 PID: 15079 Comm: syz.9.4624 Tainted: G W syzkaller #0 [ 497.373862][T15079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 497.383956][T15079] Call Trace: [ 497.387259][T15079] [ 497.390208][T15079] __dump_stack+0x21/0x30 [ 497.394576][T15079] dump_stack_lvl+0xee/0x150 [ 497.399201][T15079] ? show_regs_print_info+0x20/0x20 [ 497.404441][T15079] dump_stack+0x15/0x20 [ 497.408613][T15079] should_fail+0x3c1/0x510 [ 497.413049][T15079] should_fail_usercopy+0x1a/0x20 [ 497.418146][T15079] _copy_from_user+0x20/0xd0 [ 497.422779][T15079] generic_map_update_batch+0x44f/0x740 [ 497.428355][T15079] ? generic_map_delete_batch+0x510/0x510 [ 497.434105][T15079] ? __fdget+0x1a1/0x230 [ 497.438365][T15079] ? generic_map_delete_batch+0x510/0x510 [ 497.444108][T15079] bpf_map_do_batch+0x463/0x5f0 [ 497.448965][T15079] __sys_bpf+0x5e3/0x730 [ 497.453208][T15079] ? bpf_link_show_fdinfo+0x310/0x310 [ 497.458599][T15079] __x64_sys_bpf+0x7c/0x90 [ 497.463045][T15079] x64_sys_call+0x4b9/0x9a0 [ 497.467639][T15079] do_syscall_64+0x4c/0xa0 [ 497.472063][T15079] ? clear_bhb_loop+0x50/0xa0 [ 497.476780][T15079] ? clear_bhb_loop+0x50/0xa0 [ 497.481599][T15079] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 497.487515][T15079] RIP: 0033:0x7fd77773bec9 [ 497.491948][T15079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 497.511609][T15079] RSP: 002b:00007fd7761a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 497.520046][T15079] RAX: ffffffffffffffda RBX: 00007fd777992fa0 RCX: 00007fd77773bec9 [ 497.528022][T15079] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 497.536020][T15079] RBP: 00007fd7761a4090 R08: 0000000000000000 R09: 0000000000000000 [ 497.543999][T15079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 497.551979][T15079] R13: 00007fd777993038 R14: 00007fd777992fa0 R15: 00007ffc9af5d2d8 [ 497.559988][T15079] [ 497.745748][T15096] device sit0 left promiscuous mode [ 497.876893][T15096] device sit0 entered promiscuous mode [ 498.144092][T15105] device sit0 left promiscuous mode [ 498.320494][T15107] device sit0 entered promiscuous mode [ 498.642754][T15116] FAULT_INJECTION: forcing a failure. [ 498.642754][T15116] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 498.655921][T15116] CPU: 0 PID: 15116 Comm: syz.6.4638 Tainted: G W syzkaller #0 [ 498.664878][T15116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 498.674940][T15116] Call Trace: [ 498.678216][T15116] [ 498.681147][T15116] __dump_stack+0x21/0x30 [ 498.685485][T15116] dump_stack_lvl+0xee/0x150 [ 498.690079][T15116] ? show_regs_print_info+0x20/0x20 [ 498.695283][T15116] ? __activate_page+0xd40/0xd40 [ 498.700237][T15116] dump_stack+0x15/0x20 [ 498.704420][T15116] should_fail+0x3c1/0x510 [ 498.708846][T15116] should_fail_usercopy+0x1a/0x20 [ 498.713882][T15116] copy_page_from_iter_atomic+0x3fb/0x1350 [ 498.719722][T15116] ? pipe_zero+0x370/0x370 [ 498.724148][T15116] generic_perform_write+0x307/0x670 [ 498.729446][T15116] ? grab_cache_page_write_begin+0xb0/0xb0 [ 498.735266][T15116] ? file_remove_privs+0x590/0x590 [ 498.740379][T15116] ? rwsem_write_trylock+0x130/0x300 [ 498.745672][T15116] ? clear_nonspinnable+0x60/0x60 [ 498.750788][T15116] ? avc_policy_seqno+0x1b/0x70 [ 498.755695][T15116] __generic_file_write_iter+0x268/0x480 [ 498.761329][T15116] generic_file_write_iter+0xa9/0x1d0 [ 498.766706][T15116] vfs_write+0x802/0xf70 [ 498.770956][T15116] ? file_end_write+0x1b0/0x1b0 [ 498.775809][T15116] ? wait_for_completion_killable_timeout+0x10/0x10 [ 498.782399][T15116] ? __fget_files+0x2c4/0x320 [ 498.787085][T15116] ? __fdget_pos+0x2d2/0x380 [ 498.791683][T15116] ? ksys_write+0x71/0x240 [ 498.796102][T15116] ksys_write+0x140/0x240 [ 498.800434][T15116] ? __ia32_sys_read+0x90/0x90 [ 498.805219][T15116] ? debug_smp_processor_id+0x17/0x20 [ 498.810603][T15116] __x64_sys_write+0x7b/0x90 [ 498.815194][T15116] x64_sys_call+0x8ef/0x9a0 [ 498.819702][T15116] do_syscall_64+0x4c/0xa0 [ 498.824126][T15116] ? clear_bhb_loop+0x50/0xa0 [ 498.828813][T15116] ? clear_bhb_loop+0x50/0xa0 [ 498.833491][T15116] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 498.839387][T15116] RIP: 0033:0x7fd3a9bfeec9 [ 498.843830][T15116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 498.863883][T15116] RSP: 002b:00007fd3a8667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 498.872387][T15116] RAX: ffffffffffffffda RBX: 00007fd3a9e55fa0 RCX: 00007fd3a9bfeec9 [ 498.880358][T15116] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 000000000000000a [ 498.888454][T15116] RBP: 00007fd3a8667090 R08: 0000000000000000 R09: 0000000000000000 [ 498.896447][T15116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 498.904418][T15116] R13: 00007fd3a9e56038 R14: 00007fd3a9e55fa0 R15: 00007ffc02a5f878 [ 498.912489][T15116] [ 498.954494][T15118] FAULT_INJECTION: forcing a failure. [ 498.954494][T15118] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 498.969009][T15118] CPU: 1 PID: 15118 Comm: syz.9.4639 Tainted: G W syzkaller #0 [ 498.977909][T15118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 498.987971][T15118] Call Trace: [ 498.991264][T15118] [ 498.994206][T15118] __dump_stack+0x21/0x30 [ 498.998635][T15118] dump_stack_lvl+0xee/0x150 [ 499.003230][T15118] ? show_regs_print_info+0x20/0x20 [ 499.008437][T15118] dump_stack+0x15/0x20 [ 499.012594][T15118] should_fail+0x3c1/0x510 [ 499.017015][T15118] should_fail_usercopy+0x1a/0x20 [ 499.022040][T15118] _copy_from_user+0x20/0xd0 [ 499.026642][T15118] generic_map_update_batch+0x4a3/0x740 [ 499.032192][T15118] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 499.038012][T15118] ? generic_map_delete_batch+0x510/0x510 [ 499.043763][T15118] ? __fdget+0x1a1/0x230 [ 499.048041][T15118] ? generic_map_delete_batch+0x510/0x510 [ 499.053763][T15118] bpf_map_do_batch+0x463/0x5f0 [ 499.058703][T15118] __sys_bpf+0x5e3/0x730 [ 499.062947][T15118] ? bpf_link_show_fdinfo+0x310/0x310 [ 499.068330][T15118] __x64_sys_bpf+0x7c/0x90 [ 499.072744][T15118] x64_sys_call+0x4b9/0x9a0 [ 499.077247][T15118] do_syscall_64+0x4c/0xa0 [ 499.081685][T15118] ? clear_bhb_loop+0x50/0xa0 [ 499.086363][T15118] ? clear_bhb_loop+0x50/0xa0 [ 499.091039][T15118] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 499.096938][T15118] RIP: 0033:0x7fd77773bec9 [ 499.101358][T15118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 499.120974][T15118] RSP: 002b:00007fd7761a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 499.129587][T15118] RAX: ffffffffffffffda RBX: 00007fd777992fa0 RCX: 00007fd77773bec9 [ 499.137565][T15118] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 499.145536][T15118] RBP: 00007fd7761a4090 R08: 0000000000000000 R09: 0000000000000000 [ 499.153528][T15118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 499.161499][T15118] R13: 00007fd777993038 R14: 00007fd777992fa0 R15: 00007ffc9af5d2d8 [ 499.169487][T15118] [ 499.290130][T15134] device sit0 left promiscuous mode [ 499.448958][T15144] device sit0 entered promiscuous mode [ 499.730054][T15158] FAULT_INJECTION: forcing a failure. [ 499.730054][T15158] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 499.819098][T15158] CPU: 0 PID: 15158 Comm: syz.6.4652 Tainted: G W syzkaller #0 [ 499.828014][T15158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 499.838271][T15158] Call Trace: [ 499.841605][T15158] [ 499.844557][T15158] __dump_stack+0x21/0x30 [ 499.848925][T15158] dump_stack_lvl+0xee/0x150 [ 499.853601][T15158] ? show_regs_print_info+0x20/0x20 [ 499.858845][T15158] dump_stack+0x15/0x20 [ 499.863027][T15158] should_fail+0x3c1/0x510 [ 499.867665][T15158] should_fail_usercopy+0x1a/0x20 [ 499.872721][T15158] _copy_from_user+0x20/0xd0 [ 499.877515][T15158] generic_map_update_batch+0x44f/0x740 [ 499.883108][T15158] ? generic_map_delete_batch+0x510/0x510 [ 499.888865][T15158] ? __fdget+0x1a1/0x230 [ 499.893254][T15158] ? generic_map_delete_batch+0x510/0x510 [ 499.899007][T15158] bpf_map_do_batch+0x463/0x5f0 [ 499.903889][T15158] __sys_bpf+0x5e3/0x730 [ 499.908345][T15158] ? bpf_link_show_fdinfo+0x310/0x310 [ 499.913830][T15158] ? __kasan_check_write+0x14/0x20 [ 499.918973][T15158] ? switch_fpu_return+0x15d/0x2c0 [ 499.924108][T15158] __x64_sys_bpf+0x7c/0x90 [ 499.928542][T15158] x64_sys_call+0x4b9/0x9a0 [ 499.933070][T15158] do_syscall_64+0x4c/0xa0 [ 499.937512][T15158] ? clear_bhb_loop+0x50/0xa0 [ 499.942311][T15158] ? clear_bhb_loop+0x50/0xa0 [ 499.947011][T15158] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 499.952929][T15158] RIP: 0033:0x7fd3a9bfeec9 [ 499.957364][T15158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 499.977032][T15158] RSP: 002b:00007fd3a8667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 499.985478][T15158] RAX: ffffffffffffffda RBX: 00007fd3a9e55fa0 RCX: 00007fd3a9bfeec9 [ 499.993470][T15158] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 500.001464][T15158] RBP: 00007fd3a8667090 R08: 0000000000000000 R09: 0000000000000000 [ 500.009460][T15158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 500.017468][T15158] R13: 00007fd3a9e56038 R14: 00007fd3a9e55fa0 R15: 00007ffc02a5f878 [ 500.025496][T15158] [ 500.884253][T15175] device sit0 left promiscuous mode [ 500.963691][T15180] FAULT_INJECTION: forcing a failure. [ 500.963691][T15180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 500.976914][T15180] CPU: 1 PID: 15180 Comm: syz.8.4658 Tainted: G W syzkaller #0 [ 500.985795][T15180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 500.995929][T15180] Call Trace: [ 500.999226][T15180] [ 501.002174][T15180] __dump_stack+0x21/0x30 [ 501.006528][T15180] dump_stack_lvl+0xee/0x150 [ 501.011156][T15180] ? show_regs_print_info+0x20/0x20 [ 501.016382][T15180] ? __activate_page+0xd40/0xd40 [ 501.021359][T15180] dump_stack+0x15/0x20 [ 501.025605][T15180] should_fail+0x3c1/0x510 [ 501.030060][T15180] should_fail_usercopy+0x1a/0x20 [ 501.035220][T15180] copy_page_from_iter_atomic+0x3fb/0x1350 [ 501.041056][T15180] ? pipe_zero+0x370/0x370 [ 501.045519][T15180] generic_perform_write+0x307/0x670 [ 501.050830][T15180] ? grab_cache_page_write_begin+0xb0/0xb0 [ 501.056826][T15180] ? file_remove_privs+0x590/0x590 [ 501.061958][T15180] ? rwsem_write_trylock+0x130/0x300 [ 501.067269][T15180] ? clear_nonspinnable+0x60/0x60 [ 501.072324][T15180] ? avc_policy_seqno+0x1b/0x70 [ 501.077212][T15180] __generic_file_write_iter+0x268/0x480 [ 501.082892][T15180] generic_file_write_iter+0xa9/0x1d0 [ 501.088461][T15180] vfs_write+0x802/0xf70 [ 501.092740][T15180] ? file_end_write+0x1b0/0x1b0 [ 501.097606][T15180] ? wait_for_completion_killable_timeout+0x10/0x10 [ 501.104213][T15180] ? __fget_files+0x2c4/0x320 [ 501.108913][T15180] ? __fdget_pos+0x2d2/0x380 [ 501.113532][T15180] ? ksys_write+0x71/0x240 [ 501.117978][T15180] ksys_write+0x140/0x240 [ 501.122345][T15180] ? __ia32_sys_read+0x90/0x90 [ 501.127142][T15180] ? debug_smp_processor_id+0x17/0x20 [ 501.132638][T15180] __x64_sys_write+0x7b/0x90 [ 501.137248][T15180] x64_sys_call+0x8ef/0x9a0 [ 501.141889][T15180] do_syscall_64+0x4c/0xa0 [ 501.146321][T15180] ? clear_bhb_loop+0x50/0xa0 [ 501.151022][T15180] ? clear_bhb_loop+0x50/0xa0 [ 501.155866][T15180] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 501.161795][T15180] RIP: 0033:0x7fd670669ec9 [ 501.166238][T15180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 501.186190][T15180] RSP: 002b:00007fd66f0d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 501.194725][T15180] RAX: ffffffffffffffda RBX: 00007fd6708c0fa0 RCX: 00007fd670669ec9 [ 501.202726][T15180] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 000000000000000a [ 501.210725][T15180] RBP: 00007fd66f0d2090 R08: 0000000000000000 R09: 0000000000000000 [ 501.218719][T15180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 501.226712][T15180] R13: 00007fd6708c1038 R14: 00007fd6708c0fa0 R15: 00007ffc5d83d358 [ 501.234719][T15180] [ 501.250888][T15177] device sit0 entered promiscuous mode [ 501.463228][T15188] device sit0 entered promiscuous mode [ 501.740930][T15201] FAULT_INJECTION: forcing a failure. [ 501.740930][T15201] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 501.858806][T15201] CPU: 1 PID: 15201 Comm: syz.3.4665 Tainted: G W syzkaller #0 [ 501.867845][T15201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 501.877924][T15201] Call Trace: [ 501.881224][T15201] [ 501.884172][T15201] __dump_stack+0x21/0x30 [ 501.888528][T15201] dump_stack_lvl+0xee/0x150 [ 501.893138][T15201] ? show_regs_print_info+0x20/0x20 [ 501.898369][T15201] dump_stack+0x15/0x20 [ 501.902543][T15201] should_fail+0x3c1/0x510 [ 501.906978][T15201] should_fail_usercopy+0x1a/0x20 [ 501.912025][T15201] _copy_from_user+0x20/0xd0 [ 501.916650][T15201] generic_map_update_batch+0x4a3/0x740 [ 501.922228][T15201] ? generic_map_delete_batch+0x510/0x510 [ 501.927977][T15201] ? __fdget+0x1a1/0x230 [ 501.932249][T15201] ? generic_map_delete_batch+0x510/0x510 [ 501.937993][T15201] bpf_map_do_batch+0x463/0x5f0 [ 501.942875][T15201] __sys_bpf+0x5e3/0x730 [ 501.947139][T15201] ? bpf_link_show_fdinfo+0x310/0x310 [ 501.952539][T15201] __x64_sys_bpf+0x7c/0x90 [ 501.956966][T15201] x64_sys_call+0x4b9/0x9a0 [ 501.961488][T15201] do_syscall_64+0x4c/0xa0 [ 501.965928][T15201] ? clear_bhb_loop+0x50/0xa0 [ 501.970719][T15201] ? clear_bhb_loop+0x50/0xa0 [ 501.975510][T15201] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 501.981440][T15201] RIP: 0033:0x7f34b7944ec9 [ 501.985878][T15201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 502.005680][T15201] RSP: 002b:00007f34b63ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 502.014126][T15201] RAX: ffffffffffffffda RBX: 00007f34b7b9bfa0 RCX: 00007f34b7944ec9 [ 502.022137][T15201] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 502.030133][T15201] RBP: 00007f34b63ad090 R08: 0000000000000000 R09: 0000000000000000 [ 502.038129][T15201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 502.046119][T15201] R13: 00007f34b7b9c038 R14: 00007f34b7b9bfa0 R15: 00007ffc7df9dd38 [ 502.054131][T15201] [ 502.715279][T15218] FAULT_INJECTION: forcing a failure. [ 502.715279][T15218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 502.728490][T15218] CPU: 0 PID: 15218 Comm: syz.6.4673 Tainted: G W syzkaller #0 [ 502.737455][T15218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 502.747625][T15218] Call Trace: [ 502.750925][T15218] [ 502.753871][T15218] __dump_stack+0x21/0x30 [ 502.758227][T15218] dump_stack_lvl+0xee/0x150 [ 502.762838][T15218] ? show_regs_print_info+0x20/0x20 [ 502.768065][T15218] ? __activate_page+0xd40/0xd40 [ 502.773030][T15218] dump_stack+0x15/0x20 [ 502.777237][T15218] should_fail+0x3c1/0x510 [ 502.781679][T15218] should_fail_usercopy+0x1a/0x20 [ 502.786747][T15218] copy_page_from_iter_atomic+0x3fb/0x1350 [ 502.792602][T15218] ? pipe_zero+0x370/0x370 [ 502.797048][T15218] generic_perform_write+0x307/0x670 [ 502.802374][T15218] ? grab_cache_page_write_begin+0xb0/0xb0 [ 502.808238][T15218] ? file_remove_privs+0x590/0x590 [ 502.813387][T15218] ? rwsem_write_trylock+0x130/0x300 [ 502.818711][T15218] ? clear_nonspinnable+0x60/0x60 [ 502.823762][T15218] ? avc_policy_seqno+0x1b/0x70 [ 502.828638][T15218] __generic_file_write_iter+0x268/0x480 [ 502.834300][T15218] generic_file_write_iter+0xa9/0x1d0 [ 502.839694][T15218] vfs_write+0x802/0xf70 [ 502.843973][T15218] ? file_end_write+0x1b0/0x1b0 [ 502.848842][T15218] ? wait_for_completion_killable_timeout+0x10/0x10 [ 502.855455][T15218] ? __fget_files+0x2c4/0x320 [ 502.860162][T15218] ? __fdget_pos+0x2d2/0x380 [ 502.864773][T15218] ? ksys_write+0x71/0x240 [ 502.869217][T15218] ksys_write+0x140/0x240 [ 502.873568][T15218] ? __ia32_sys_read+0x90/0x90 [ 502.878353][T15218] ? debug_smp_processor_id+0x17/0x20 [ 502.883757][T15218] __x64_sys_write+0x7b/0x90 [ 502.888469][T15218] x64_sys_call+0x8ef/0x9a0 [ 502.892990][T15218] do_syscall_64+0x4c/0xa0 [ 502.897431][T15218] ? clear_bhb_loop+0x50/0xa0 [ 502.902132][T15218] ? clear_bhb_loop+0x50/0xa0 [ 502.906836][T15218] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 502.912757][T15218] RIP: 0033:0x7fd3a9bfeec9 [ 502.917198][T15218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 502.936821][T15218] RSP: 002b:00007fd3a8667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 502.945268][T15218] RAX: ffffffffffffffda RBX: 00007fd3a9e55fa0 RCX: 00007fd3a9bfeec9 [ 502.953265][T15218] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 000000000000000a [ 502.961369][T15218] RBP: 00007fd3a8667090 R08: 0000000000000000 R09: 0000000000000000 [ 502.969484][T15218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 502.977473][T15218] R13: 00007fd3a9e56038 R14: 00007fd3a9e55fa0 R15: 00007ffc02a5f878 [ 502.985482][T15218] [ 503.676347][T15230] device pim6reg1 entered promiscuous mode [ 504.145871][T15241] FAULT_INJECTION: forcing a failure. [ 504.145871][T15241] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 504.268862][T15241] CPU: 0 PID: 15241 Comm: syz.9.4681 Tainted: G W syzkaller #0 [ 504.277765][T15241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 504.287978][T15241] Call Trace: [ 504.291351][T15241] [ 504.294309][T15241] __dump_stack+0x21/0x30 [ 504.298670][T15241] dump_stack_lvl+0xee/0x150 [ 504.303289][T15241] ? show_regs_print_info+0x20/0x20 [ 504.308519][T15241] ? migrate_enable+0x192/0x260 [ 504.313403][T15241] ? migrate_disable+0x180/0x180 [ 504.318381][T15241] dump_stack+0x15/0x20 [ 504.322649][T15241] should_fail+0x3c1/0x510 [ 504.327095][T15241] should_fail_usercopy+0x1a/0x20 [ 504.332151][T15241] _copy_from_user+0x20/0xd0 [ 504.336772][T15241] generic_map_update_batch+0x44f/0x740 [ 504.342373][T15241] ? generic_map_delete_batch+0x510/0x510 [ 504.348129][T15241] ? __fdget+0x1a1/0x230 [ 504.352494][T15241] ? generic_map_delete_batch+0x510/0x510 [ 504.358246][T15241] bpf_map_do_batch+0x463/0x5f0 [ 504.363129][T15241] __sys_bpf+0x5e3/0x730 [ 504.367405][T15241] ? bpf_link_show_fdinfo+0x310/0x310 [ 504.372826][T15241] __x64_sys_bpf+0x7c/0x90 [ 504.377276][T15241] x64_sys_call+0x4b9/0x9a0 [ 504.381816][T15241] do_syscall_64+0x4c/0xa0 [ 504.386251][T15241] ? clear_bhb_loop+0x50/0xa0 [ 504.390948][T15241] ? clear_bhb_loop+0x50/0xa0 [ 504.395651][T15241] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 504.401574][T15241] RIP: 0033:0x7fd77773bec9 [ 504.406107][T15241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 504.425737][T15241] RSP: 002b:00007fd7761a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 504.434178][T15241] RAX: ffffffffffffffda RBX: 00007fd777992fa0 RCX: 00007fd77773bec9 [ 504.442174][T15241] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 504.450171][T15241] RBP: 00007fd7761a4090 R08: 0000000000000000 R09: 0000000000000000 [ 504.458166][T15241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 504.466152][T15241] R13: 00007fd777993038 R14: 00007fd777992fa0 R15: 00007ffc9af5d2d8 [ 504.474154][T15241] [ 505.495772][T15284] FAULT_INJECTION: forcing a failure. [ 505.495772][T15284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 505.568636][T15284] CPU: 1 PID: 15284 Comm: syz.9.4698 Tainted: G W syzkaller #0 [ 505.577654][T15284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 505.587741][T15284] Call Trace: [ 505.591040][T15284] [ 505.593996][T15284] __dump_stack+0x21/0x30 [ 505.598365][T15284] dump_stack_lvl+0xee/0x150 [ 505.603021][T15284] ? show_regs_print_info+0x20/0x20 [ 505.608266][T15284] ? migrate_enable+0x192/0x260 [ 505.613239][T15284] ? migrate_disable+0x180/0x180 [ 505.618212][T15284] dump_stack+0x15/0x20 [ 505.622403][T15284] should_fail+0x3c1/0x510 [ 505.626864][T15284] should_fail_usercopy+0x1a/0x20 [ 505.631962][T15284] _copy_from_user+0x20/0xd0 [ 505.636601][T15284] generic_map_update_batch+0x4a3/0x740 [ 505.642190][T15284] ? generic_map_delete_batch+0x510/0x510 [ 505.647952][T15284] ? bpf_map_do_batch+0x1e7/0x5f0 [ 505.653012][T15284] ? generic_map_delete_batch+0x510/0x510 [ 505.658764][T15284] bpf_map_do_batch+0x463/0x5f0 [ 505.663655][T15284] __sys_bpf+0x5e3/0x730 [ 505.667923][T15284] ? bpf_link_show_fdinfo+0x310/0x310 [ 505.673464][T15284] __x64_sys_bpf+0x7c/0x90 [ 505.677904][T15284] x64_sys_call+0x4b9/0x9a0 [ 505.682432][T15284] do_syscall_64+0x4c/0xa0 [ 505.686873][T15284] ? clear_bhb_loop+0x50/0xa0 [ 505.691576][T15284] ? clear_bhb_loop+0x50/0xa0 [ 505.696306][T15284] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 505.702226][T15284] RIP: 0033:0x7fd77773bec9 [ 505.706662][T15284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 505.726382][T15284] RSP: 002b:00007fd7761a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 505.734833][T15284] RAX: ffffffffffffffda RBX: 00007fd777992fa0 RCX: 00007fd77773bec9 [ 505.742827][T15284] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 505.751003][T15284] RBP: 00007fd7761a4090 R08: 0000000000000000 R09: 0000000000000000 [ 505.759088][T15284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 505.767098][T15284] R13: 00007fd777993038 R14: 00007fd777992fa0 R15: 00007ffc9af5d2d8 [ 505.775267][T15284] [ 505.899061][T15294] device sit0 left promiscuous mode [ 506.501595][T15315] device sit0 left promiscuous mode [ 506.543323][T15315] device sit0 entered promiscuous mode [ 506.922306][T15330] FAULT_INJECTION: forcing a failure. [ 506.922306][T15330] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 506.952488][T15334] FAULT_INJECTION: forcing a failure. [ 506.952488][T15334] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 506.965670][T15334] CPU: 0 PID: 15334 Comm: syz.9.4716 Tainted: G W syzkaller #0 [ 506.974552][T15334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 506.984645][T15334] Call Trace: [ 506.987946][T15334] [ 506.990897][T15334] __dump_stack+0x21/0x30 [ 506.995270][T15334] dump_stack_lvl+0xee/0x150 [ 506.999908][T15334] ? show_regs_print_info+0x20/0x20 [ 507.005164][T15334] ? __activate_page+0xd40/0xd40 [ 507.010150][T15334] dump_stack+0x15/0x20 [ 507.014334][T15334] should_fail+0x3c1/0x510 [ 507.018811][T15334] should_fail_usercopy+0x1a/0x20 [ 507.023866][T15334] copy_page_from_iter_atomic+0x3fb/0x1350 [ 507.029706][T15334] ? pipe_zero+0x370/0x370 [ 507.034299][T15334] generic_perform_write+0x307/0x670 [ 507.039704][T15334] ? grab_cache_page_write_begin+0xb0/0xb0 [ 507.045541][T15334] ? file_remove_privs+0x590/0x590 [ 507.050686][T15334] ? rwsem_write_trylock+0x130/0x300 [ 507.056005][T15334] ? clear_nonspinnable+0x60/0x60 [ 507.061052][T15334] ? avc_policy_seqno+0x1b/0x70 [ 507.065926][T15334] __generic_file_write_iter+0x268/0x480 [ 507.071593][T15334] generic_file_write_iter+0xa9/0x1d0 [ 507.076995][T15334] vfs_write+0x802/0xf70 [ 507.081368][T15334] ? file_end_write+0x1b0/0x1b0 [ 507.086265][T15334] ? wait_for_completion_killable_timeout+0x10/0x10 [ 507.092894][T15334] ? __fget_files+0x2c4/0x320 [ 507.097609][T15334] ? __fdget_pos+0x2d2/0x380 [ 507.102206][T15334] ? ksys_write+0x71/0x240 [ 507.106627][T15334] ksys_write+0x140/0x240 [ 507.110960][T15334] ? __ia32_sys_read+0x90/0x90 [ 507.115734][T15334] ? debug_smp_processor_id+0x17/0x20 [ 507.121111][T15334] __x64_sys_write+0x7b/0x90 [ 507.125718][T15334] x64_sys_call+0x8ef/0x9a0 [ 507.130224][T15334] do_syscall_64+0x4c/0xa0 [ 507.134651][T15334] ? clear_bhb_loop+0x50/0xa0 [ 507.139338][T15334] ? clear_bhb_loop+0x50/0xa0 [ 507.144090][T15334] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 507.149997][T15334] RIP: 0033:0x7fd77773bec9 [ 507.154415][T15334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 507.174040][T15334] RSP: 002b:00007fd7761a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 507.182491][T15334] RAX: ffffffffffffffda RBX: 00007fd777992fa0 RCX: 00007fd77773bec9 [ 507.190471][T15334] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 000000000000000a [ 507.198448][T15334] RBP: 00007fd7761a4090 R08: 0000000000000000 R09: 0000000000000000 [ 507.206426][T15334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 507.214399][T15334] R13: 00007fd777993038 R14: 00007fd777992fa0 R15: 00007ffc9af5d2d8 [ 507.222386][T15334] [ 507.227038][T15330] CPU: 0 PID: 15330 Comm: syz.3.4714 Tainted: G W syzkaller #0 [ 507.235933][T15330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 507.246012][T15330] Call Trace: [ 507.249332][T15330] [ 507.252286][T15330] __dump_stack+0x21/0x30 [ 507.256656][T15330] dump_stack_lvl+0xee/0x150 [ 507.261280][T15330] ? show_regs_print_info+0x20/0x20 [ 507.266515][T15330] ? migrate_enable+0x192/0x260 [ 507.271381][T15330] ? migrate_disable+0x180/0x180 [ 507.276330][T15330] dump_stack+0x15/0x20 [ 507.280582][T15330] should_fail+0x3c1/0x510 [ 507.285098][T15330] should_fail_usercopy+0x1a/0x20 [ 507.290168][T15330] _copy_from_user+0x20/0xd0 [ 507.294778][T15330] generic_map_update_batch+0x44f/0x740 [ 507.300350][T15330] ? generic_map_delete_batch+0x510/0x510 [ 507.306097][T15330] ? __fdget+0x1a1/0x230 [ 507.310367][T15330] ? generic_map_delete_batch+0x510/0x510 [ 507.316110][T15330] bpf_map_do_batch+0x463/0x5f0 [ 507.320974][T15330] __sys_bpf+0x5e3/0x730 [ 507.325320][T15330] ? bpf_link_show_fdinfo+0x310/0x310 [ 507.330713][T15330] __x64_sys_bpf+0x7c/0x90 [ 507.335136][T15330] x64_sys_call+0x4b9/0x9a0 [ 507.339648][T15330] do_syscall_64+0x4c/0xa0 [ 507.344081][T15330] ? clear_bhb_loop+0x50/0xa0 [ 507.348789][T15330] ? clear_bhb_loop+0x50/0xa0 [ 507.353472][T15330] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 507.359367][T15330] RIP: 0033:0x7f34b7944ec9 [ 507.363940][T15330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 507.383641][T15330] RSP: 002b:00007f34b63ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 507.392066][T15330] RAX: ffffffffffffffda RBX: 00007f34b7b9bfa0 RCX: 00007f34b7944ec9 [ 507.400046][T15330] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 507.408023][T15330] RBP: 00007f34b63ad090 R08: 0000000000000000 R09: 0000000000000000 [ 507.415998][T15330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 507.423999][T15330] R13: 00007f34b7b9c038 R14: 00007f34b7b9bfa0 R15: 00007ffc7df9dd38 [ 507.431987][T15330] [ 510.713282][T15374] FAULT_INJECTION: forcing a failure. [ 510.713282][T15374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 510.726568][T15374] CPU: 1 PID: 15374 Comm: syz.3.4730 Tainted: G W syzkaller #0 [ 510.735449][T15374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 510.745527][T15374] Call Trace: [ 510.748822][T15374] [ 510.751760][T15374] __dump_stack+0x21/0x30 [ 510.756100][T15374] dump_stack_lvl+0xee/0x150 [ 510.760697][T15374] ? show_regs_print_info+0x20/0x20 [ 510.765925][T15374] ? __activate_page+0xd40/0xd40 [ 510.770877][T15374] dump_stack+0x15/0x20 [ 510.775159][T15374] should_fail+0x3c1/0x510 [ 510.779623][T15374] should_fail_usercopy+0x1a/0x20 [ 510.784657][T15374] copy_page_from_iter_atomic+0x3fb/0x1350 [ 510.790561][T15374] ? pipe_zero+0x370/0x370 [ 510.794988][T15374] generic_perform_write+0x307/0x670 [ 510.800485][T15374] ? grab_cache_page_write_begin+0xb0/0xb0 [ 510.806311][T15374] ? file_remove_privs+0x590/0x590 [ 510.811481][T15374] ? rwsem_write_trylock+0x130/0x300 [ 510.816944][T15374] ? clear_nonspinnable+0x60/0x60 [ 510.822012][T15374] ? avc_policy_seqno+0x1b/0x70 [ 510.826877][T15374] __generic_file_write_iter+0x268/0x480 [ 510.832537][T15374] generic_file_write_iter+0xa9/0x1d0 [ 510.838004][T15374] vfs_write+0x802/0xf70 [ 510.842253][T15374] ? file_end_write+0x1b0/0x1b0 [ 510.847115][T15374] ? wait_for_completion_killable_timeout+0x10/0x10 [ 510.853715][T15374] ? __fget_files+0x2c4/0x320 [ 510.858621][T15374] ? __fdget_pos+0x2d2/0x380 [ 510.863334][T15374] ? ksys_write+0x71/0x240 [ 510.867795][T15374] ksys_write+0x140/0x240 [ 510.872260][T15374] ? __ia32_sys_read+0x90/0x90 [ 510.877056][T15374] ? debug_smp_processor_id+0x17/0x20 [ 510.882507][T15374] __x64_sys_write+0x7b/0x90 [ 510.887114][T15374] x64_sys_call+0x8ef/0x9a0 [ 510.891714][T15374] do_syscall_64+0x4c/0xa0 [ 510.896142][T15374] ? clear_bhb_loop+0x50/0xa0 [ 510.900825][T15374] ? clear_bhb_loop+0x50/0xa0 [ 510.905519][T15374] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 510.911438][T15374] RIP: 0033:0x7f34b7944ec9 [ 510.915862][T15374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 510.935577][T15374] RSP: 002b:00007f34b63ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 510.944007][T15374] RAX: ffffffffffffffda RBX: 00007f34b7b9bfa0 RCX: 00007f34b7944ec9 [ 510.952087][T15374] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 000000000000000a [ 510.960368][T15374] RBP: 00007f34b63ad090 R08: 0000000000000000 R09: 0000000000000000 [ 510.968670][T15374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 510.976780][T15374] R13: 00007f34b7b9c038 R14: 00007f34b7b9bfa0 R15: 00007ffc7df9dd38 [ 510.984808][T15374] [ 512.200919][T15403] device sit0 left promiscuous mode [ 512.349906][T15405] device pim6reg1 entered promiscuous mode [ 512.368894][T15404] device sit0 entered promiscuous mode [ 517.748209][T15538] device pim6reg1 entered promiscuous mode [ 519.769160][T15562] device syzkaller0 entered promiscuous mode [ 521.048161][T15600] device wg2 left promiscuous mode [ 526.430843][T15750] syz.8.4857[15750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.966475][T15772] device syzkaller0 entered promiscuous mode [ 527.566317][T15784] device sit0 entered promiscuous mode [ 528.292669][T15805] device syzkaller0 entered promiscuous mode [ 532.844900][T15843] device sit0 left promiscuous mode [ 532.895303][T15843] device sit0 entered promiscuous mode [ 535.919052][T15904] device pim6reg1 entered promiscuous mode [ 536.259472][T15912] device veth0_vlan left promiscuous mode [ 536.294427][T15912] device veth0_vlan entered promiscuous mode [ 536.474417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 536.511603][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 536.602410][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 536.980471][T15924] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 544.903137][T16024] device veth0_vlan left promiscuous mode [ 544.935486][T16024] device veth0_vlan entered promiscuous mode [ 544.973310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 544.989498][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 545.008849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 545.859833][T16047] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 545.892593][T16047] syzkaller1: linktype set to 280 [ 546.278937][ T30] audit: type=1400 audit(1758949424.738:165): avc: denied { create } for pid=16056 comm="syz.9.4963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 551.000630][T16173] bond_slave_1: mtu less than device minimum [ 552.869006][T16229] device pim6reg1 entered promiscuous mode [ 557.525514][T16346] GPL: port 1(erspan0) entered blocking state [ 557.594251][T16346] GPL: port 1(erspan0) entered disabled state [ 557.633277][T16346] device erspan0 entered promiscuous mode [ 557.705383][T16348] GPL: port 1(erspan0) entered blocking state [ 557.711540][T16348] GPL: port 1(erspan0) entered forwarding state [ 558.152053][T16363] GPL: port 2(dummy0) entered blocking state [ 558.197828][T16363] GPL: port 2(dummy0) entered disabled state [ 558.261809][T16363] device dummy0 entered promiscuous mode [ 558.315847][T16363] GPL: port 2(dummy0) entered blocking state [ 558.322376][T16363] GPL: port 2(dummy0) entered forwarding state [ 561.790607][T16417] device pim6reg1 entered promiscuous mode [ 563.237851][T16468] GPL: port 1(dummy0) entered blocking state [ 563.268566][T16468] GPL: port 1(dummy0) entered disabled state [ 563.285300][T16468] device dummy0 entered promiscuous mode [ 563.339077][T16474] syz.3.5109[16474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 563.339160][T16474] syz.3.5109[16474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 563.353170][T16470] device pim6reg1 entered promiscuous mode [ 563.403024][T16474] syz.3.5109[16474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 563.403104][T16474] syz.3.5109[16474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 567.549616][T16603] device veth0_vlan left promiscuous mode [ 567.598573][T16603] device veth0_vlan entered promiscuous mode [ 567.636305][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 567.652845][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 567.679154][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 569.085368][T16624] GPL: port 2(dummy0) entered disabled state [ 569.092151][T16624] GPL: port 1(erspan0) entered disabled state [ 569.295878][T16640] device pim6reg1 entered promiscuous mode [ 573.750722][T16732] device syzkaller0 entered promiscuous mode [ 573.784421][T16748] pim6reg0: tun_chr_ioctl cmd 2147767506 [ 573.828669][T16748] pim6reg0: tun_chr_ioctl cmd 2147767507 [ 574.788943][T16782] device pim6reg1 entered promiscuous mode [ 575.079065][T16792] device wg2 entered promiscuous mode [ 575.337953][T16799] syz.9.5219[16799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.338052][T16799] syz.9.5219[16799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.109535][T16842] device wg2 left promiscuous mode [ 578.225741][T16899] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.235120][T16899] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.829815][T17000] device syzkaller0 entered promiscuous mode [ 583.579783][ T30] audit: type=1400 audit(1758949462.038:166): avc: denied { create } for pid=17045 comm="syz.7.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 584.124811][T17071] syz.8.5311[17071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.124889][T17071] syz.8.5311[17071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.148903][T17071] syz.8.5311[17071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.160997][T17071] syz.8.5311[17071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.178578][T17116] device syzkaller0 entered promiscuous mode [ 585.409615][T17139] device pim6reg1 entered promiscuous mode [ 587.776449][T17219] device veth1_macvtap left promiscuous mode [ 588.484780][T17248] device veth0_vlan left promiscuous mode [ 588.506106][T17248] device veth0_vlan entered promiscuous mode [ 588.522503][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 588.538607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 588.546469][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 589.621121][T17297] device syzkaller0 entered promiscuous mode [ 592.365215][T17385] syz.6.5404[17385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.367799][T17385] syz.6.5404[17385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.386835][T17389] device wg2 entered promiscuous mode [ 595.368652][T17445] device wg2 entered promiscuous mode [ 597.015730][T17491] device sit0 left promiscuous mode [ 598.067725][T17523] ÿÿÿÿÿÿ: renamed from vlan1 [ 598.651501][T17552] syz.7.5458[17552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.651601][T17552] syz.7.5458[17552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.792821][T17547] device wg2 entered promiscuous mode [ 599.185980][T17568] device pim6reg1 entered promiscuous mode [ 600.528089][T17602] device sit0 left promiscuous mode [ 600.615567][T17607] device wg2 left promiscuous mode [ 601.662477][T17643] ÿÿÿÿÿÿ: renamed from vlan1 [ 603.008782][T17681] device wg2 left promiscuous mode [ 604.260842][T17713] ÿÿÿÿÿÿ: renamed from vlan1 [ 604.767418][T17724] device sit0 entered promiscuous mode [ 606.662638][T17787] device pim6reg1 entered promiscuous mode [ 608.102034][ T30] audit: type=1400 audit(1758949486.568:167): avc: denied { mounton } for pid=17808 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 608.212601][T17807] device wg2 left promiscuous mode [ 608.465023][T17808] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.503243][T17808] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.551624][T17808] device bridge_slave_0 entered promiscuous mode [ 608.608997][T17808] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.656652][T17808] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.710038][T17808] device bridge_slave_1 entered promiscuous mode [ 608.970592][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 608.978356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 608.993368][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 609.002544][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 609.011235][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.018293][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 609.025935][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 609.034658][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 609.043128][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.050205][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 609.076766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 609.084644][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 609.093609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 609.110512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 609.120674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.132059][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 609.139761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 609.149654][T17808] device veth0_vlan entered promiscuous mode [ 609.162690][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 609.172231][T17808] device veth1_macvtap entered promiscuous mode [ 609.182627][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 609.192533][ T1933] device veth1_macvtap left promiscuous mode [ 609.300475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 609.334948][ T30] audit: type=1400 audit(1758949487.798:168): avc: denied { unmount } for pid=17808 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 610.616374][ T30] audit: type=1400 audit(1758949489.068:169): avc: denied { create } for pid=17848 comm="syz.6.5545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 610.863695][T17854] device syzkaller0 entered promiscuous mode [ 611.041116][T17877] syz.7.5553[17877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.041190][T17877] syz.7.5553[17877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 613.363452][T17943] device syzkaller0 entered promiscuous mode [ 614.903172][T17986] device pim6reg1 entered promiscuous mode [ 618.180028][T18059] device sit0 left promiscuous mode [ 619.773018][T18112] device veth1_macvtap left promiscuous mode [ 619.889813][T18112] device veth1_macvtap entered promiscuous mode [ 619.898764][T18112] device macsec0 entered promiscuous mode [ 620.171227][T18112] device syzkaller0 entered promiscuous mode [ 620.821393][T18133] device syzkaller0 entered promiscuous mode [ 623.780820][T18259] syz.3.5673[18259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.780965][T18259] syz.3.5673[18259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.841940][ T30] audit: type=1400 audit(1758949502.308:170): avc: denied { create } for pid=18262 comm="syz.9.5674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 623.887892][T18259] ref_ctr_offset mismatch. inode: 0xb2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 623.921571][T18261] device sit0 left promiscuous mode [ 625.496109][T18322] device syzkaller0 entered promiscuous mode [ 625.822216][T18350] device wg2 entered promiscuous mode [ 626.080101][T18358] device wg2 entered promiscuous mode [ 627.130808][T18387] syz.6.5712[18387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 627.130906][T18387] syz.6.5712[18387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 627.386334][T18387] ref_ctr_offset mismatch. inode: 0x882 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 627.994128][T18413] device pim6reg1 entered promiscuous mode [ 629.827832][T18453] device sit0 entered promiscuous mode [ 630.445058][T18468] syz.8.5739[18468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.445149][T18468] syz.8.5739[18468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.587615][T18468] ref_ctr_offset mismatch. inode: 0x68d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 630.731362][T18469] GPL: port 2(erspan0) entered blocking state [ 630.770706][T18469] GPL: port 2(erspan0) entered disabled state [ 630.796921][T18469] device erspan0 entered promiscuous mode [ 630.975755][T18488] device wg2 left promiscuous mode [ 631.153941][T18499] device syzkaller0 entered promiscuous mode [ 632.188996][T18545] device sit0 entered promiscuous mode [ 632.384230][T18569] device sit0 left promiscuous mode [ 632.512291][T18571] device sit0 entered promiscuous mode [ 633.463818][T18617] device sit0 entered promiscuous mode [ 634.114741][T18623] device sit0 left promiscuous mode [ 634.161566][T18626] device sit0 entered promiscuous mode [ 635.959747][T18653] device pim6reg1 entered promiscuous mode [ 636.176560][T18656] syz.6.5793[18656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.176669][T18656] syz.6.5793[18656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.336086][T18693] device syzkaller0 entered promiscuous mode [ 638.918055][T18713] device sit0 left promiscuous mode [ 639.092904][T18716] device pim6reg1 entered promiscuous mode [ 639.116987][T18715] device sit0 entered promiscuous mode [ 639.908519][T18753] device pim6reg1 entered promiscuous mode [ 640.586170][T18781] device syzkaller0 entered promiscuous mode [ 642.410567][T18839] device sit0 left promiscuous mode [ 642.467989][T18834] device sit0 entered promiscuous mode [ 643.751881][T18872] device pim6reg1 entered promiscuous mode [ 645.140668][T18944] syz.8.5881[18944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.140784][T18944] syz.8.5881[18944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.278954][T18951] syz.8.5881[18951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.403953][T18951] syz.8.5881[18951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 646.612579][T18987] device sit0 left promiscuous mode [ 646.716100][T18990] device sit0 entered promiscuous mode [ 647.375180][T18999] device syzkaller0 entered promiscuous mode [ 648.005113][T19009] device wg2 left promiscuous mode [ 649.510656][T19057] device pim6reg1 entered promiscuous mode [ 650.191665][T19081] device sit0 left promiscuous mode [ 650.235176][T19081] device sit0 entered promiscuous mode [ 650.386849][T19086] device sit0 left promiscuous mode [ 650.401711][T19089] device sit0 entered promiscuous mode [ 652.832806][T19155] device sit0 left promiscuous mode [ 652.923613][T19158] device sit0 entered promiscuous mode [ 653.320759][T19182] device sit0 left promiscuous mode [ 653.417039][T19182] device sit0 entered promiscuous mode [ 653.828414][T19199] device sit0 left promiscuous mode [ 653.853582][T19204] device sit0 entered promiscuous mode [ 654.063043][T19212] device sit0 left promiscuous mode [ 654.102443][T19218] device veth1_macvtap left promiscuous mode [ 654.150902][T19212] device sit0 entered promiscuous mode [ 654.462566][T19231] device sit0 left promiscuous mode [ 654.548678][T19234] device sit0 entered promiscuous mode [ 655.314705][T19254] device sit0 left promiscuous mode [ 655.362097][T19254] device sit0 entered promiscuous mode [ 655.619313][T19276] FAULT_INJECTION: forcing a failure. [ 655.619313][T19276] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 655.678504][T19276] CPU: 1 PID: 19276 Comm: syz.8.5992 Tainted: G W syzkaller #0 [ 655.687423][T19276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 655.697499][T19276] Call Trace: [ 655.700805][T19276] [ 655.703755][T19276] __dump_stack+0x21/0x30 [ 655.708112][T19276] dump_stack_lvl+0xee/0x150 [ 655.712726][T19276] ? show_regs_print_info+0x20/0x20 [ 655.717953][T19276] ? dump_stack+0x9/0x20 [ 655.722226][T19276] dump_stack+0x15/0x20 [ 655.726519][T19276] should_fail+0x3c1/0x510 [ 655.730975][T19276] should_fail_usercopy+0x1a/0x20 [ 655.736015][T19276] _copy_from_user+0x20/0xd0 [ 655.740736][T19276] __sys_bpf+0x233/0x730 [ 655.744995][T19276] ? bpf_link_show_fdinfo+0x310/0x310 [ 655.750381][T19276] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 655.756561][T19276] __x64_sys_bpf+0x7c/0x90 [ 655.760992][T19276] x64_sys_call+0x4b9/0x9a0 [ 655.765593][T19276] do_syscall_64+0x4c/0xa0 [ 655.770019][T19276] ? clear_bhb_loop+0x50/0xa0 [ 655.774703][T19276] ? clear_bhb_loop+0x50/0xa0 [ 655.779387][T19276] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 655.785284][T19276] RIP: 0033:0x7fd670669ec9 [ 655.789965][T19276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 655.809590][T19276] RSP: 002b:00007fd66f0d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 655.818029][T19276] RAX: ffffffffffffffda RBX: 00007fd6708c0fa0 RCX: 00007fd670669ec9 [ 655.826004][T19276] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 655.833981][T19276] RBP: 00007fd66f0d2090 R08: 0000000000000000 R09: 0000000000000000 [ 655.841951][T19276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 655.850009][T19276] R13: 00007fd6708c1038 R14: 00007fd6708c0fa0 R15: 00007ffc5d83d358 [ 655.858253][T19276] [ 656.681748][T19323] FAULT_INJECTION: forcing a failure. [ 656.681748][T19323] name failslab, interval 1, probability 0, space 0, times 0 [ 656.807087][T19323] CPU: 0 PID: 19323 Comm: syz.3.6007 Tainted: G W syzkaller #0 [ 656.816012][T19323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 656.826127][T19323] Call Trace: [ 656.829446][T19323] [ 656.832407][T19323] __dump_stack+0x21/0x30 [ 656.836766][T19323] dump_stack_lvl+0xee/0x150 [ 656.841384][T19323] ? show_regs_print_info+0x20/0x20 [ 656.846613][T19323] dump_stack+0x15/0x20 [ 656.850804][T19323] should_fail+0x3c1/0x510 [ 656.855263][T19323] __should_failslab+0xa4/0xe0 [ 656.860061][T19323] should_failslab+0x9/0x20 [ 656.864600][T19323] slab_pre_alloc_hook+0x3b/0xe0 [ 656.869575][T19323] __kmalloc+0x6d/0x2c0 [ 656.873781][T19323] ? kvmalloc_node+0x206/0x300 [ 656.878570][T19323] kvmalloc_node+0x206/0x300 [ 656.883186][T19323] ? __kasan_check_write+0x1/0x20 [ 656.888231][T19323] ? vm_mmap+0xb0/0xb0 [ 656.892322][T19323] ? __kasan_check_write+0x14/0x20 [ 656.897454][T19323] ? proc_fail_nth_write+0x17a/0x1f0 [ 656.902771][T19323] generic_map_update_batch+0x382/0x740 [ 656.908355][T19323] ? generic_map_delete_batch+0x510/0x510 [ 656.914106][T19323] ? __fdget+0x1a1/0x230 [ 656.918493][T19323] ? generic_map_delete_batch+0x510/0x510 [ 656.924240][T19323] bpf_map_do_batch+0x463/0x5f0 [ 656.929118][T19323] __sys_bpf+0x5e3/0x730 [ 656.933379][T19323] ? bpf_link_show_fdinfo+0x310/0x310 [ 656.938779][T19323] ? debug_smp_processor_id+0x17/0x20 [ 656.944177][T19323] __x64_sys_bpf+0x7c/0x90 [ 656.948615][T19323] x64_sys_call+0x4b9/0x9a0 [ 656.953148][T19323] do_syscall_64+0x4c/0xa0 [ 656.957587][T19323] ? clear_bhb_loop+0x50/0xa0 [ 656.962296][T19323] ? clear_bhb_loop+0x50/0xa0 [ 656.967007][T19323] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 656.972938][T19323] RIP: 0033:0x7f3b3ce68ec9 [ 656.977376][T19323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 656.997008][T19323] RSP: 002b:00007f3b3b8d1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 657.005452][T19323] RAX: ffffffffffffffda RBX: 00007f3b3d0bffa0 RCX: 00007f3b3ce68ec9 [ 657.013448][T19323] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 657.021440][T19323] RBP: 00007f3b3b8d1090 R08: 0000000000000000 R09: 0000000000000000 [ 657.029524][T19323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 657.037522][T19323] R13: 00007f3b3d0c0038 R14: 00007f3b3d0bffa0 R15: 00007fff77ac0de8 [ 657.045536][T19323] [ 657.051827][T19330] device sit0 left promiscuous mode [ 657.179056][T19331] device sit0 entered promiscuous mode [ 657.545872][T19343] device syzkaller0 entered promiscuous mode [ 657.620859][T19341] GPL: port 1(erspan0) entered blocking state [ 657.627298][T19341] GPL: port 1(erspan0) entered disabled state [ 657.650103][T19341] device erspan0 entered promiscuous mode [ 658.303646][T19363] FAULT_INJECTION: forcing a failure. [ 658.303646][T19363] name failslab, interval 1, probability 0, space 0, times 0 [ 658.346932][T19366] syz.7.6018[19366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 658.347019][T19366] syz.7.6018[19366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 658.362293][T19363] CPU: 1 PID: 19363 Comm: syz.9.6020 Tainted: G W syzkaller #0 [ 658.382646][T19363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 658.392838][T19363] Call Trace: [ 658.396147][T19363] [ 658.399097][T19363] __dump_stack+0x21/0x30 [ 658.403454][T19363] dump_stack_lvl+0xee/0x150 [ 658.408066][T19363] ? show_regs_print_info+0x20/0x20 [ 658.413383][T19363] dump_stack+0x15/0x20 [ 658.417570][T19363] should_fail+0x3c1/0x510 [ 658.420897][T19358] syz.7.6018[19358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 658.422017][T19363] __should_failslab+0xa4/0xe0 [ 658.423113][T19358] syz.7.6018[19358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 658.433403][T19363] should_failslab+0x9/0x20 [ 658.433427][T19363] slab_pre_alloc_hook+0x3b/0xe0 [ 658.433452][T19363] __kmalloc+0x6d/0x2c0 [ 658.433492][T19363] ? kvmalloc_node+0x206/0x300 [ 658.433516][T19363] kvmalloc_node+0x206/0x300 [ 658.433537][T19363] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 658.433566][T19363] ? vm_mmap+0xb0/0xb0 [ 658.433592][T19363] generic_map_update_batch+0x3af/0x740 [ 658.433625][T19363] ? generic_map_delete_batch+0x510/0x510 [ 658.433652][T19363] ? __fdget+0x1a1/0x230 [ 658.433677][T19363] ? generic_map_delete_batch+0x510/0x510 [ 658.433702][T19363] bpf_map_do_batch+0x463/0x5f0 [ 658.509335][T19363] __sys_bpf+0x5e3/0x730 [ 658.513776][T19363] ? bpf_link_show_fdinfo+0x310/0x310 [ 658.519156][T19363] ? debug_smp_processor_id+0x17/0x20 [ 658.524542][T19363] __x64_sys_bpf+0x7c/0x90 [ 658.528966][T19363] x64_sys_call+0x4b9/0x9a0 [ 658.533471][T19363] do_syscall_64+0x4c/0xa0 [ 658.537889][T19363] ? clear_bhb_loop+0x50/0xa0 [ 658.542572][T19363] ? clear_bhb_loop+0x50/0xa0 [ 658.547274][T19363] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 658.553195][T19363] RIP: 0033:0x7fd77773bec9 [ 658.557630][T19363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 658.577328][T19363] RSP: 002b:00007fd7761a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 658.585853][T19363] RAX: ffffffffffffffda RBX: 00007fd777992fa0 RCX: 00007fd77773bec9 [ 658.593831][T19363] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 658.601798][T19363] RBP: 00007fd7761a4090 R08: 0000000000000000 R09: 0000000000000000 [ 658.609768][T19363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 658.617738][T19363] R13: 00007fd777993038 R14: 00007fd777992fa0 R15: 00007ffc9af5d2d8 [ 658.625723][T19363] [ 658.726057][T19371] device sit0 entered promiscuous mode [ 658.897813][T19366] syz.7.6018[19366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 658.897897][T19366] syz.7.6018[19366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 659.075696][T19381] device sit0 left promiscuous mode [ 659.306343][T19389] device sit0 entered promiscuous mode [ 660.134115][T19407] FAULT_INJECTION: forcing a failure. [ 660.134115][T19407] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 660.238696][T19407] CPU: 0 PID: 19407 Comm: syz.9.6033 Tainted: G W syzkaller #0 [ 660.247991][T19407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 660.258162][T19407] Call Trace: [ 660.261479][T19407] [ 660.264411][T19407] __dump_stack+0x21/0x30 [ 660.268758][T19407] dump_stack_lvl+0xee/0x150 [ 660.273354][T19407] ? show_regs_print_info+0x20/0x20 [ 660.278560][T19407] ? __kmalloc+0x13d/0x2c0 [ 660.282981][T19407] ? kvmalloc_node+0x206/0x300 [ 660.287748][T19407] dump_stack+0x15/0x20 [ 660.291908][T19407] should_fail+0x3c1/0x510 [ 660.296337][T19407] should_fail_usercopy+0x1a/0x20 [ 660.301369][T19407] _copy_from_user+0x20/0xd0 [ 660.305963][T19407] generic_map_update_batch+0x44f/0x740 [ 660.311517][T19407] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 660.317335][T19407] ? generic_map_delete_batch+0x510/0x510 [ 660.323065][T19407] ? __sanitizer_cov_trace_pc+0x36/0x60 [ 660.328704][T19407] ? __fdget+0x1a1/0x230 [ 660.332950][T19407] ? generic_map_delete_batch+0x510/0x510 [ 660.338701][T19407] bpf_map_do_batch+0x463/0x5f0 [ 660.343559][T19407] __sys_bpf+0x5e3/0x730 [ 660.347801][T19407] ? bpf_link_show_fdinfo+0x310/0x310 [ 660.353182][T19407] ? debug_smp_processor_id+0x17/0x20 [ 660.358657][T19407] __x64_sys_bpf+0x7c/0x90 [ 660.363080][T19407] x64_sys_call+0x4b9/0x9a0 [ 660.367586][T19407] do_syscall_64+0x4c/0xa0 [ 660.372124][T19407] ? clear_bhb_loop+0x50/0xa0 [ 660.376818][T19407] ? clear_bhb_loop+0x50/0xa0 [ 660.381516][T19407] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 660.387508][T19407] RIP: 0033:0x7fd77773bec9 [ 660.391935][T19407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 660.411548][T19407] RSP: 002b:00007fd7761a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 660.419998][T19407] RAX: ffffffffffffffda RBX: 00007fd777992fa0 RCX: 00007fd77773bec9 [ 660.427974][T19407] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 660.435949][T19407] RBP: 00007fd7761a4090 R08: 0000000000000000 R09: 0000000000000000 [ 660.443925][T19407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 660.451981][T19407] R13: 00007fd777993038 R14: 00007fd777992fa0 R15: 00007ffc9af5d2d8 [ 660.459964][T19407] [ 660.528485][T19409] device sit0 left promiscuous mode [ 660.675923][T19410] device sit0 entered promiscuous mode [ 660.860750][T19413] device sit0 left promiscuous mode [ 660.882708][T19413] device sit0 entered promiscuous mode [ 661.846798][T19436] GPL: port 1(erspan0) entered blocking state [ 661.894111][T19436] GPL: port 1(erspan0) entered disabled state [ 662.009806][T19436] device erspan0 entered promiscuous mode [ 662.318825][T19450] device sit0 left promiscuous mode [ 662.592509][T19451] device sit0 entered promiscuous mode [ 662.857860][T19453] device sit0 left promiscuous mode [ 662.959902][T19455] device sit0 entered promiscuous mode [ 663.345072][T19469] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 663.856269][T19506] device sit0 left promiscuous mode [ 663.937850][T19506] device sit0 entered promiscuous mode [ 664.367402][T19523] nr0: tun_chr_ioctl cmd 1074025673 [ 664.372944][T19521] FAULT_INJECTION: forcing a failure. [ 664.372944][T19521] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 664.388598][T19521] CPU: 1 PID: 19521 Comm: syz.7.6070 Tainted: G W syzkaller #0 [ 664.397575][T19521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 664.407963][T19521] Call Trace: [ 664.411365][T19521] [ 664.414295][T19521] __dump_stack+0x21/0x30 [ 664.418645][T19521] dump_stack_lvl+0xee/0x150 [ 664.423297][T19521] ? show_regs_print_info+0x20/0x20 [ 664.428518][T19521] ? migrate_enable+0x192/0x260 [ 664.433404][T19521] ? migrate_disable+0x180/0x180 [ 664.438467][T19521] dump_stack+0x15/0x20 [ 664.442653][T19521] should_fail+0x3c1/0x510 [ 664.447103][T19521] should_fail_usercopy+0x1a/0x20 [ 664.452140][T19521] _copy_from_user+0x20/0xd0 [ 664.456777][T19521] generic_map_update_batch+0x4a3/0x740 [ 664.462354][T19521] ? generic_map_delete_batch+0x510/0x510 [ 664.468204][T19521] ? __fdget+0x1a1/0x230 [ 664.472457][T19521] ? generic_map_delete_batch+0x510/0x510 [ 664.478186][T19521] bpf_map_do_batch+0x463/0x5f0 [ 664.483051][T19521] __sys_bpf+0x5e3/0x730 [ 664.487304][T19521] ? bpf_link_show_fdinfo+0x310/0x310 [ 664.492706][T19521] ? debug_smp_processor_id+0x17/0x20 [ 664.498091][T19521] __x64_sys_bpf+0x7c/0x90 [ 664.502534][T19521] x64_sys_call+0x4b9/0x9a0 [ 664.507064][T19521] do_syscall_64+0x4c/0xa0 [ 664.511498][T19521] ? clear_bhb_loop+0x50/0xa0 [ 664.516180][T19521] ? clear_bhb_loop+0x50/0xa0 [ 664.520875][T19521] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 664.526784][T19521] RIP: 0033:0x7fae2ceafec9 [ 664.531204][T19521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 664.550987][T19521] RSP: 002b:00007fae2b918038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 664.559404][T19521] RAX: ffffffffffffffda RBX: 00007fae2d106fa0 RCX: 00007fae2ceafec9 [ 664.567595][T19521] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 664.575588][T19521] RBP: 00007fae2b918090 R08: 0000000000000000 R09: 0000000000000000 [ 664.583560][T19521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 664.591530][T19521] R13: 00007fae2d107038 R14: 00007fae2d106fa0 R15: 00007ffe85462578 [ 664.599516][T19521] [ 665.449041][T19561] FAULT_INJECTION: forcing a failure. [ 665.449041][T19561] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 665.520755][T19562] syz.3.6083[19562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.520842][T19562] syz.3.6083[19562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.583300][T19561] CPU: 0 PID: 19561 Comm: syz.6.6084 Tainted: G W syzkaller #0 [ 665.603559][T19561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 665.613654][T19561] Call Trace: [ 665.616952][T19561] [ 665.619901][T19561] __dump_stack+0x21/0x30 [ 665.624263][T19561] dump_stack_lvl+0xee/0x150 [ 665.628890][T19561] ? show_regs_print_info+0x20/0x20 [ 665.634112][T19561] ? migrate_enable+0x192/0x260 [ 665.638981][T19561] ? migrate_disable+0x180/0x180 [ 665.643941][T19561] dump_stack+0x15/0x20 [ 665.648120][T19561] should_fail+0x3c1/0x510 [ 665.652551][T19561] should_fail_usercopy+0x1a/0x20 [ 665.657595][T19561] _copy_from_user+0x20/0xd0 [ 665.662726][T19561] generic_map_update_batch+0x44f/0x740 [ 665.668309][T19561] ? generic_map_delete_batch+0x510/0x510 [ 665.674175][T19561] ? __fdget+0x1a1/0x230 [ 665.678443][T19561] ? generic_map_delete_batch+0x510/0x510 [ 665.684191][T19561] bpf_map_do_batch+0x463/0x5f0 [ 665.689070][T19561] __sys_bpf+0x5e3/0x730 [ 665.693336][T19561] ? bpf_link_show_fdinfo+0x310/0x310 [ 665.698737][T19561] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 665.705013][T19561] __x64_sys_bpf+0x7c/0x90 [ 665.709427][T19561] x64_sys_call+0x4b9/0x9a0 [ 665.713924][T19561] do_syscall_64+0x4c/0xa0 [ 665.718338][T19561] ? clear_bhb_loop+0x50/0xa0 [ 665.723012][T19561] ? clear_bhb_loop+0x50/0xa0 [ 665.727692][T19561] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 665.733589][T19561] RIP: 0033:0x7fd3a9bfeec9 [ 665.738012][T19561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 665.757655][T19561] RSP: 002b:00007fd3a8667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 665.766069][T19561] RAX: ffffffffffffffda RBX: 00007fd3a9e55fa0 RCX: 00007fd3a9bfeec9 [ 665.774052][T19561] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 665.782033][T19561] RBP: 00007fd3a8667090 R08: 0000000000000000 R09: 0000000000000000 [ 665.790011][T19561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 665.797977][T19561] R13: 00007fd3a9e56038 R14: 00007fd3a9e55fa0 R15: 00007ffc02a5f878 [ 665.806043][T19561] [ 665.816312][T19560] syz.3.6083[19560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.816391][T19560] syz.3.6083[19560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.903414][T19562] syz.3.6083[19562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.914964][T19562] syz.3.6083[19562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.637106][T19589] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 667.794823][T19594] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 667.809871][T19594] syzkaller0: linktype set to 4 [ 670.418701][T19648] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 670.512890][T19648] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 670.549775][T19648] syzkaller0: linktype set to 4 [ 671.253978][T19670] device sit0 left promiscuous mode [ 671.290788][T19670] device sit0 entered promiscuous mode [ 672.813472][T19715] device sit0 left promiscuous mode [ 672.892633][T19720] device sit0 entered promiscuous mode [ 673.410133][T19725] device sit0 left promiscuous mode [ 673.489117][T19730] device sit0 entered promiscuous mode [ 673.877051][T19735] device sit0 left promiscuous mode [ 673.927970][T19736] device sit0 entered promiscuous mode [ 674.193893][T19754] device sit0 left promiscuous mode [ 674.499642][T19755] device sit0 entered promiscuous mode [ 675.299389][T19782] device sit0 left promiscuous mode [ 675.363604][T19785] ªªªªªª: renamed from vlan0 [ 675.374418][T19791] device sit0 left promiscuous mode [ 676.483881][T19782] device sit0 entered promiscuous mode [ 676.697872][T19791] device sit0 entered promiscuous mode [ 677.772061][T19831] device sit0 left promiscuous mode [ 677.807511][T19831] device sit0 entered promiscuous mode [ 678.653309][T19863] device pim6reg1 entered promiscuous mode [ 679.087518][T19866] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.138503][T19866] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.146292][T19866] device bridge_slave_0 entered promiscuous mode [ 679.205233][T19866] bridge0: port 2(bridge_slave_1) entered blocking state [ 679.212650][T19866] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.220355][T19866] device bridge_slave_1 entered promiscuous mode [ 679.271835][T19881] device sit0 left promiscuous mode [ 679.340269][T19883] device sit0 entered promiscuous mode [ 679.950757][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 679.981359][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 680.046252][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 680.061772][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 680.120281][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.127532][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 680.148716][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 680.157298][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 680.168825][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 680.175914][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 680.188612][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 680.207016][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 680.215246][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 680.225003][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 680.238817][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 680.444769][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 680.493910][T19866] device veth0_vlan entered promiscuous mode [ 680.514016][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 680.562160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 680.576555][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 680.610793][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 680.623838][T19866] device veth1_macvtap entered promiscuous mode [ 680.673296][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 680.682555][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 680.730862][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 680.740977][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 680.837199][T19919] device sit0 entered promiscuous mode [ 681.667109][T19933] FAULT_INJECTION: forcing a failure. [ 681.667109][T19933] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 681.753936][T19933] CPU: 1 PID: 19933 Comm: syz.3.6193 Tainted: G W syzkaller #0 [ 681.762951][T19933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 681.773065][T19933] Call Trace: [ 681.776363][T19933] [ 681.779311][T19933] __dump_stack+0x21/0x30 [ 681.783683][T19933] dump_stack_lvl+0xee/0x150 [ 681.788398][T19933] ? show_regs_print_info+0x20/0x20 [ 681.793631][T19933] dump_stack+0x15/0x20 [ 681.797805][T19933] should_fail+0x3c1/0x510 [ 681.802238][T19933] should_fail_usercopy+0x1a/0x20 [ 681.807276][T19933] _copy_from_user+0x20/0xd0 [ 681.811911][T19933] generic_map_update_batch+0x44f/0x740 [ 681.817521][T19933] ? generic_map_delete_batch+0x510/0x510 [ 681.823353][T19933] ? __fdget+0x1a1/0x230 [ 681.827634][T19933] ? generic_map_delete_batch+0x510/0x510 [ 681.833371][T19933] bpf_map_do_batch+0x463/0x5f0 [ 681.838246][T19933] __sys_bpf+0x5e3/0x730 [ 681.842524][T19933] ? bpf_link_show_fdinfo+0x310/0x310 [ 681.847923][T19933] __x64_sys_bpf+0x7c/0x90 [ 681.852440][T19933] x64_sys_call+0x4b9/0x9a0 [ 681.856990][T19933] do_syscall_64+0x4c/0xa0 [ 681.861439][T19933] ? clear_bhb_loop+0x50/0xa0 [ 681.866155][T19933] ? clear_bhb_loop+0x50/0xa0 [ 681.870853][T19933] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 681.876766][T19933] RIP: 0033:0x7f3b3ce68ec9 [ 681.881259][T19933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 681.901058][T19933] RSP: 002b:00007f3b3b8d1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 681.909523][T19933] RAX: ffffffffffffffda RBX: 00007f3b3d0bffa0 RCX: 00007f3b3ce68ec9 [ 681.917534][T19933] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 681.925606][T19933] RBP: 00007f3b3b8d1090 R08: 0000000000000000 R09: 0000000000000000 [ 681.933700][T19933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 681.941702][T19933] R13: 00007f3b3d0c0038 R14: 00007f3b3d0bffa0 R15: 00007fff77ac0de8 [ 681.949705][T19933] [ 684.456161][T19998] device sit0 left promiscuous mode [ 684.563524][T19998] device sit0 entered promiscuous mode [ 685.516938][T20048] device sit0 left promiscuous mode [ 685.531116][T20047] device sit0 left promiscuous mode [ 685.562088][T20048] device sit0 entered promiscuous mode [ 685.696957][T20047] device sit0 entered promiscuous mode [ 686.563731][T20104] device sit0 left promiscuous mode [ 686.634524][T20104] device sit0 entered promiscuous mode [ 687.342121][T20144] device sit0 left promiscuous mode [ 687.901999][T20161] device syzkaller0 entered promiscuous mode [ 687.944794][T20179] device sit0 left promiscuous mode [ 688.027278][T20179] device sit0 entered promiscuous mode [ 688.310290][T20200] device sit0 left promiscuous mode [ 688.334465][T20200] device sit0 entered promiscuous mode [ 688.714413][T20222] device veth0_vlan left promiscuous mode [ 688.736643][T20222] device veth0_vlan entered promiscuous mode [ 688.761343][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 688.770851][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 688.780250][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 689.793063][T20263] device sit0 left promiscuous mode [ 689.840645][T20263] device sit0 entered promiscuous mode [ 690.719107][T20300] device sit0 left promiscuous mode [ 690.904558][T20303] device sit0 entered promiscuous mode [ 691.448615][T20318] ip6_vti0: mtu greater than device maximum [ 691.678293][T20338] device pim6reg1 entered promiscuous mode [ 693.237256][T20387] device sit0 left promiscuous mode [ 693.306438][T20387] device sit0 entered promiscuous mode [ 694.221773][T20423] device syzkaller0 entered promiscuous mode [ 694.942474][T20438] device sit0 entered promiscuous mode [ 695.225611][T20446] syzkaller0: create flow: hash 1340531944 index 0 [ 695.283328][T20444] device syzkaller0 entered promiscuous mode [ 695.360993][T17276] syzkaller0: tun_net_xmit 48 [ 695.478571][T20444] syzkaller0 (unregistered): delete flow: hash 1340531944 index 0 [ 695.808072][T20480] device sit0 left promiscuous mode [ 695.891307][T20483] device sit0 entered promiscuous mode [ 696.733939][T20522] device macsec0 entered promiscuous mode [ 696.749043][T20522] device veth1_macvtap entered promiscuous mode [ 700.905502][T20649] device syzkaller0 entered promiscuous mode [ 701.845662][T20691] syz.8.6450[20691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 701.845809][T20691] syz.8.6450[20691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 701.898970][T20691] syz.8.6450[20691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 701.963865][T20691] syz.8.6450[20691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 702.072135][T20695] device pim6reg1 entered promiscuous mode [ 702.284621][ T30] audit: type=1400 audit(1758949580.748:171): avc: denied { associate } for pid=20697 comm="syz.8.6452" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 702.990421][T20736] device syzkaller0 entered promiscuous mode [ 703.346218][T20739] bridge0: port 1(bridge_slave_0) entered blocking state [ 703.353483][T20739] bridge0: port 1(bridge_slave_0) entered disabled state [ 703.361255][T20739] device bridge_slave_0 entered promiscuous mode [ 703.369064][T20739] bridge0: port 2(bridge_slave_1) entered blocking state [ 703.376319][T20739] bridge0: port 2(bridge_slave_1) entered disabled state [ 703.385252][T20739] device bridge_slave_1 entered promiscuous mode [ 703.963925][T20739] bridge0: port 2(bridge_slave_1) entered blocking state [ 703.971049][T20739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 703.978578][T20739] bridge0: port 1(bridge_slave_0) entered blocking state [ 703.985643][T20739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 704.087782][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.100915][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 704.129098][T20781] device pim6reg1 entered promiscuous mode [ 704.442172][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 704.459544][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 704.467440][T20796] device sit0 left promiscuous mode [ 704.540212][T20801] device sit0 entered promiscuous mode [ 704.738977][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 704.769051][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 704.799341][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 704.806434][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 704.855658][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 704.864490][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 704.872919][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 704.879981][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 704.891433][ T1933] device erspan0 left promiscuous mode [ 704.897092][ T1933] GPL: port 1(erspan0) entered disabled state [ 704.934587][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 704.957210][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 704.974571][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 704.998898][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 705.027226][T20829] device sit0 left promiscuous mode [ 705.147547][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 705.163447][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 705.328197][T20834] device sit0 entered promiscuous mode [ 705.371473][T20843] syz.3.6496[20843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.371564][T20843] syz.3.6496[20843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.458084][T20835] device vlan0 entered promiscuous mode [ 705.532050][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 705.540451][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 705.550721][T20739] device veth0_vlan entered promiscuous mode [ 705.568588][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 705.586582][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 705.605273][T20847] device sit0 left promiscuous mode [ 705.623492][T20851] syz.7.6499[20851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.623616][T20851] syz.7.6499[20851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.645771][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 705.646115][T20851] syz.7.6499[20851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.666211][T20851] syz.7.6499[20851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.678333][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 705.705176][T20847] device sit0 entered promiscuous mode [ 705.845223][ T1933] device dummy0 left promiscuous mode [ 705.850849][ T1933] GPL: port 2(dummy0) entered disabled state [ 705.863588][ T1933] device veth1_macvtap left promiscuous mode [ 705.982727][T20739] device veth1_macvtap entered promiscuous mode [ 705.994663][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 706.011315][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 706.049310][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 706.070568][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 706.081675][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 706.164371][T20879] kfree: port 1(veth1) entered blocking state [ 706.171470][T20879] kfree: port 1(veth1) entered disabled state [ 706.189267][T20879] device veth1 entered promiscuous mode [ 707.946502][T20949] device sit0 left promiscuous mode [ 708.227036][T20950] device sit0 entered promiscuous mode [ 710.374193][T21018] ÿ: renamed from bond_slave_0 [ 710.848672][T21039] device vlan0 entered promiscuous mode [ 711.230348][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 711.241807][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 711.329016][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 716.208760][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 716.243783][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 716.269321][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 717.930675][T21208] device sit0 left promiscuous mode [ 717.992219][T21208] device sit0 entered promiscuous mode [ 718.368899][T21235] device sit0 left promiscuous mode [ 718.554247][T21235] device sit0 entered promiscuous mode [ 718.936282][T21253] device veth0_vlan left promiscuous mode [ 718.944959][T21253] device veth0_vlan entered promiscuous mode [ 718.985924][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 718.994758][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 719.002836][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 719.836476][T21276] device sit0 left promiscuous mode [ 719.871388][T21274] device sit0 left promiscuous mode [ 719.921582][T21279] device sit0 entered promiscuous mode [ 720.075107][T21276] device sit0 entered promiscuous mode [ 720.443939][T21299] device sit0 left promiscuous mode [ 720.495757][T21299] device sit0 entered promiscuous mode [ 720.633546][T21308] device sit0 left promiscuous mode [ 720.861279][T21312] device sit0 entered promiscuous mode [ 721.406835][T21329] device sit0 left promiscuous mode [ 721.422052][T21331] device sit0 left promiscuous mode [ 721.573948][T21331] device sit0 entered promiscuous mode [ 722.343930][T21342] device sit0 entered promiscuous mode [ 722.684013][T21352] device sit0 left promiscuous mode [ 722.794088][T21358] device sit0 entered promiscuous mode [ 723.836717][T21405] device sit0 left promiscuous mode [ 824.068360][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 824.075397][ C1] rcu: 0-...!: (1 GPs behind) idle=e91/1/0x4000000000000000 softirq=85952/85953 fqs=1 last_accelerate: a4a8/cc44 dyntick_enabled: 1 [ 824.089027][ C1] (detected by 1, t=10005 jiffies, g=109925, q=152) [ 824.095706][ C1] Sending NMI from CPU 1 to CPUs 0: [ 824.101105][ C0] NMI backtrace for cpu 0 [ 824.101118][ C0] CPU: 0 PID: 21411 Comm: syz.6.6685 Tainted: G W syzkaller #0 [ 824.101137][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 824.101149][ C0] RIP: 0010:kvm_wait+0xcc/0x140 [ 824.101175][ C0] Code: 20 f6 44 24 21 02 75 24 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 48 0f b6 07 40 38 f0 75 a6 66 90 0f 00 2d e5 91 d6 03 f4 9a fa 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 3f 0f b6 07 [ 824.101192][ C0] RSP: 0018:ffffc900009e7400 EFLAGS: 00000046 [ 824.101208][ C0] RAX: 0000000000000003 RBX: ffff8881002fb06c RCX: ffffffff814f4259 [ 824.101222][ C0] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8881002fb06c [ 824.101234][ C0] RBP: ffffc900009e7490 R08: dffffc0000000000 R09: ffffed102005f60e [ 824.101248][ C0] R10: ffffed102005f60e R11: 1ffff1102005f60d R12: 1ffff1103ee00001 [ 824.101262][ C0] R13: ffff8881f7038ad4 R14: dffffc0000000000 R15: 1ffff9200013ce80 [ 824.101276][ C0] FS: 00007fd3a86676c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 824.101293][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 824.101305][ C0] CR2: 00002000000000c0 CR3: 0000000160cb0000 CR4: 00000000003506b0 [ 824.101331][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 824.101341][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 824.101353][ C0] Call Trace: [ 824.101360][ C0] [ 824.101371][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 824.101390][ C0] ? visit_groups_merge+0xd53/0xd90 [ 824.101410][ C0] ? pv_hash+0x86/0x150 [ 824.101429][ C0] __pv_queued_spin_lock_slowpath+0x60f/0x9c0 [ 824.101452][ C0] ? __pv_queued_spin_unlock_slowpath+0x300/0x300 [ 824.101475][ C0] queued_spin_lock_slowpath+0x47/0x50 [ 824.101500][ C0] _raw_spin_lock_irq+0xd9/0xe0 [ 824.101521][ C0] ? _raw_spin_lock_irqsave+0x110/0x110 [ 824.101541][ C0] ? debug_smp_processor_id+0x17/0x20 [ 824.101564][ C0] ? perf_trace_buf_alloc+0x1b8/0x320 [ 824.101585][ C0] perf_trace_sched_blocked_reason+0x243/0x4a0 [ 824.101605][ C0] ? trace_event_raw_event_sched_blocked_reason+0x350/0x350 [ 824.101630][ C0] ? __kasan_check_write+0x14/0x20 [ 824.101649][ C0] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 824.101669][ C0] try_to_wake_up+0xea1/0x1160 [ 824.101690][ C0] wake_up_process+0x10/0x20 [ 824.101707][ C0] swake_up_one+0x6a/0x150 [ 824.101736][ C0] __rcu_report_exp_rnp+0x1aa/0x1b0 [ 824.101759][ C0] rcu_preempt_deferred_qs_irqrestore+0x6f3/0x9d0 [ 824.101785][ C0] rcu_read_unlock_special+0xab/0x460 [ 824.101804][ C0] ? sidtab_context_to_sid+0x7c/0xc50 [ 824.101825][ C0] ? __rcu_read_unlock+0xa0/0xa0 [ 824.101843][ C0] ? mls_context_isvalid+0xb8/0x3b0 [ 824.101863][ C0] __rcu_read_unlock+0x5e/0xa0 [ 824.101880][ C0] security_compute_sid+0x1315/0x1440 [ 824.101896][ C0] ? _raw_spin_unlock+0x4d/0x70 [ 824.101921][ C0] ? security_transition_sid+0x90/0x90 [ 824.101938][ C0] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 824.101957][ C0] ? rcu_preempt_deferred_qs_irqrestore+0x6cd/0x9d0 [ 824.101982][ C0] ? rcu_read_unlock_special+0xab/0x460 [ 824.101999][ C0] ? irqentry_exit_cond_resched+0x29/0x30 [ 824.102018][ C0] ? __rcu_read_unlock+0xa0/0xa0 [ 824.102036][ C0] ? irqentry_exit+0x37/0x40 [ 824.102056][ C0] security_transition_sid+0x7d/0x90 [ 824.102086][ C0] selinux_socket_post_create+0x328/0x450 [ 824.102107][ C0] ? selinux_socket_create+0x290/0x290 [ 824.102126][ C0] ? __local_bh_enable_ip+0x58/0x80 [ 824.102144][ C0] ? local_bh_enable+0x1f/0x30 [ 824.102162][ C0] ? unix_create1+0x516/0x610 [ 824.102178][ C0] security_socket_post_create+0x82/0xb0 [ 824.102199][ C0] __sock_create+0x43b/0x7a0 [ 824.102239][ C0] __sys_socketpair+0x1a1/0x590 [ 824.102260][ C0] __x64_sys_socketpair+0x9b/0xb0 [ 824.102293][ C0] x64_sys_call+0x36/0x9a0 [ 824.102309][ C0] do_syscall_64+0x4c/0xa0 [ 824.102326][ C0] ? clear_bhb_loop+0x50/0xa0 [ 824.102343][ C0] ? clear_bhb_loop+0x50/0xa0 [ 824.102361][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 824.102380][ C0] RIP: 0033:0x7fd3a9bfeec9 [ 824.102397][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 824.102412][ C0] RSP: 002b:00007fd3a8667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 824.102429][ C0] RAX: ffffffffffffffda RBX: 00007fd3a9e55fa0 RCX: 00007fd3a9bfeec9 [ 824.102442][ C0] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000001 [ 824.102453][ C0] RBP: 00007fd3a9c81f91 R08: 0000000000000000 R09: 0000000000000000 [ 824.102464][ C0] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000 [ 824.102475][ C0] R13: 00007fd3a9e56038 R14: 00007fd3a9e55fa0 R15: 00007ffc02a5f878 [ 824.102497][ C0] [ 824.103000][ C1] rcu: rcu_preempt kthread starved for 10000 jiffies! g109925 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 824.582888][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 824.592952][ C1] rcu: RCU grace-period kthread stack dump: [ 824.598918][ C1] task:rcu_preempt state:R running task stack:28752 pid: 14 ppid: 2 flags:0x00004000 [ 824.609684][ C1] Call Trace: [ 824.612970][ C1] [ 824.615905][ C1] __schedule+0xb6e/0x14c0 [ 824.620322][ C1] ? release_firmware_map_entry+0x190/0x190 [ 824.626229][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 824.632071][ C1] ? __mod_timer+0x7ae/0xb30 [ 824.636660][ C1] schedule+0x11e/0x1e0 [ 824.640819][ C1] schedule_timeout+0x12c/0x2e0 [ 824.645838][ C1] ? console_conditional_schedule+0x30/0x30 [ 824.651735][ C1] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 824.657204][ C1] ? update_process_times+0x200/0x200 [ 824.662596][ C1] ? prepare_to_swait_event+0x308/0x320 [ 824.668313][ C1] rcu_gp_fqs_loop+0x293/0xf60 [ 824.673088][ C1] ? rcu_cleanup_dead_rnp+0x180/0x180 [ 824.678473][ C1] ? rcu_gp_init+0xc00/0xc00 [ 824.683061][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 824.688260][ C1] ? rcu_gp_init+0x9a7/0xc00 [ 824.692959][ C1] rcu_gp_kthread+0x98/0x330 [ 824.697633][ C1] ? wake_nocb_gp+0x1d0/0x1d0 [ 824.702308][ C1] ? __kasan_check_read+0x11/0x20 [ 824.707328][ C1] ? __kthread_parkme+0xac/0x200 [ 824.712264][ C1] ? preempt_count_add+0x90/0x1b0 [ 824.717283][ C1] kthread+0x411/0x500 [ 824.721350][ C1] ? wake_nocb_gp+0x1d0/0x1d0 [ 824.726550][ C1] ? kthread_blkcg+0xd0/0xd0 [ 824.731161][ C1] ret_from_fork+0x1f/0x30 [ 824.735597][ C1] [ 824.738618][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 824.744940][ C1] NMI backtrace for cpu 1 [ 824.749264][ C1] CPU: 1 PID: 21410 Comm: syz.6.6685 Tainted: G W syzkaller #0 [ 824.758226][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 824.768302][ C1] Call Trace: [ 824.771579][ C1] [ 824.774424][ C1] __dump_stack+0x21/0x30 [ 824.778761][ C1] dump_stack_lvl+0xee/0x150 [ 824.783369][ C1] ? show_regs_print_info+0x20/0x20 [ 824.788584][ C1] dump_stack+0x15/0x20 [ 824.792740][ C1] nmi_cpu_backtrace+0x2b4/0x2c0 [ 824.797680][ C1] ? nmi_trigger_cpumask_backtrace+0x240/0x240 [ 824.803841][ C1] ? load_image+0x3a0/0x3a0 [ 824.808401][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 824.814647][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 824.820757][ C1] nmi_trigger_cpumask_backtrace+0x138/0x240 [ 824.826840][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 824.832747][ C1] rcu_check_gp_kthread_starvation+0x1e0/0x260 [ 824.839095][ C1] print_other_cpu_stall+0xded/0xfd0 [ 824.844427][ C1] ? print_cpu_stall+0x600/0x600 [ 824.849373][ C1] ? tick_nohz_handler+0x300/0x300 [ 824.854585][ C1] ? accumulate_nsecs_to_secs+0xb1/0x230 [ 824.860325][ C1] ? cgroup_rstat_updated+0xf5/0x370 [ 824.865617][ C1] rcu_sched_clock_irq+0x8a3/0x12b0 [ 824.870821][ C1] ? rcu_boost_kthread_setaffinity+0x310/0x310 [ 824.877018][ C1] ? hrtimer_run_queues+0x166/0x430 [ 824.882222][ C1] update_process_times+0x198/0x200 [ 824.887418][ C1] tick_sched_timer+0x17c/0x240 [ 824.892302][ C1] ? tick_setup_sched_timer+0x450/0x450 [ 824.897849][ C1] __hrtimer_run_queues+0x3b5/0x9e0 [ 824.903082][ C1] ? hrtimer_interrupt+0x8c0/0x8c0 [ 824.908215][ C1] ? ktime_get_update_offsets_now+0x2fa/0x310 [ 824.914281][ C1] hrtimer_interrupt+0x3c7/0x8c0 [ 824.919245][ C1] __sysvec_apic_timer_interrupt+0xfa/0x3e0 [ 824.925138][ C1] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 824.930907][ C1] [ 824.933851][ C1] [ 824.936777][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 824.942759][ C1] RIP: 0010:smp_call_function_many_cond+0x8c3/0x9f0 [ 824.949354][ C1] Code: 84 c0 0f 85 9d 00 00 00 41 8b 1f 89 de 83 e6 01 31 ff e8 90 37 0a 00 83 e3 01 48 8b 5c 24 10 75 07 e8 d1 33 0a 00 eb 42 f3 90 <48> b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 00 84 c0 75 10 41 f7 [ 824.969043][ C1] RSP: 0000:ffffc90000fe7580 EFLAGS: 00000293 [ 824.975100][ C1] RAX: ffffffff815e8b05 RBX: ffff8881f7138e80 RCX: ffff8881153a3b40 [ 824.983064][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 824.991028][ C1] RBP: ffffc90000fe7690 R08: dffffc0000000000 R09: ffffed10268c16f6 [ 824.998996][ C1] R10: ffffed10268c16f6 R11: 1ffff110268c16f5 R12: 1ffff1103ee271d0 [ 825.006984][ C1] R13: 1ffff1103ee07af9 R14: 0000000000000000 R15: ffff8881f703d7c8 [ 825.015043][ C1] ? smp_call_function_many_cond+0x8e5/0x9f0 [ 825.021049][ C1] ? flush_tlb_func+0x4c0/0x4c0 [ 825.025986][ C1] ? native_flush_tlb_multi+0x210/0x210 [ 825.031527][ C1] ? smp_call_function_many+0x40/0x40 [ 825.036909][ C1] ? native_flush_tlb_multi+0x210/0x210 [ 825.042714][ C1] ? flush_tlb_func+0x4c0/0x4c0 [ 825.047865][ C1] on_each_cpu_cond_mask+0x43/0x80 [ 825.053025][ C1] native_flush_tlb_multi+0x144/0x210 [ 825.058419][ C1] flush_tlb_mm_range+0x32f/0x490 [ 825.063456][ C1] ptep_clear_flush+0x111/0x150 [ 825.068442][ C1] wp_page_copy+0xd72/0x18f0 [ 825.073036][ C1] ? insert_page_into_pte_locked+0x310/0x310 [ 825.079020][ C1] ? _raw_spin_trylock+0xb1/0x140 [ 825.084064][ C1] ? __cpuidle_text_end+0xb/0xb [ 825.089003][ C1] ? vm_normal_page+0x99/0x1f0 [ 825.093767][ C1] do_wp_page+0x731/0xc90 [ 825.098100][ C1] handle_pte_fault+0x73c/0x2680 [ 825.103035][ C1] ? trace_event_buffer_commit+0x25a/0x8a0 [ 825.108843][ C1] ? do_futex+0xc91/0x2620 [ 825.113277][ C1] ? fault_around_bytes_set+0xc0/0xc0 [ 825.118651][ C1] ? memcpy+0x56/0x70 [ 825.122647][ C1] do_handle_mm_fault+0x1a6d/0x1d50 [ 825.127839][ C1] ? futex_exit_release+0x1d0/0x1d0 [ 825.133059][ C1] ? bpf_probe_write_user+0xf0/0xf0 [ 825.138257][ C1] ? numa_migrate_prep+0xd0/0xd0 [ 825.143284][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 825.148827][ C1] ? __perf_event_task_sched_in+0x1fb/0x280 [ 825.154899][ C1] ? find_vma_from_tree+0xfd/0x110 [ 825.160045][ C1] ? access_error+0x152/0x260 [ 825.164754][ C1] do_user_addr_fault+0x554/0x1180 [ 825.169894][ C1] ? do_kern_addr_fault+0x80/0x80 [ 825.174927][ C1] ? debug_smp_processor_id+0x17/0x20 [ 825.180298][ C1] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 825.186396][ C1] ? exit_to_user_mode_prepare+0x39/0xd0 [ 825.192067][ C1] exc_page_fault+0x51/0xb0 [ 825.196583][ C1] asm_exc_page_fault+0x27/0x30 [ 825.201445][ C1] RIP: 0033:0x7fd3a9bb5fbe [ 825.205867][ C1] Code: 31 ff 4d 01 f2 41 0f 92 c7 72 a6 48 8b 44 24 08 48 8d 84 06 00 08 00 00 4c 01 f0 48 21 d8 49 39 c2 72 8e 31 c0 be 01 00 00 00 0f b1 35 ba 76 dd 00 0f 85 26 0a 00 00 c1 e1 02 48 8b 05 ca 76 [ 825.225780][ C1] RSP: 002b:00007ffc02a5f820 EFLAGS: 00010246 [ 825.231952][ C1] RAX: 0000000000000000 RBX: fffffffffffff000 RCX: 0000000000000006 [ 825.240045][ C1] RDX: 000000000000003f RSI: 0000000000000001 RDI: 00007ffc02a5f968 [ 825.248029][ C1] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000032 [ 825.256014][ C1] R10: 0000000000021000 R11: 0000000000020000 R12: 00007ffc02a5f970 [ 825.264169][ C1] R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000 [ 825.272161][ C1] [ 969.483059][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 245s! [syz.6.6685:21410] [ 969.491442][ C1] Modules linked in: [ 969.495338][ C1] CPU: 1 PID: 21410 Comm: syz.6.6685 Tainted: G W syzkaller #0 [ 969.504176][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 969.514223][ C1] RIP: 0010:smp_call_function_many_cond+0x8c3/0x9f0 [ 969.520817][ C1] Code: 84 c0 0f 85 9d 00 00 00 41 8b 1f 89 de 83 e6 01 31 ff e8 90 37 0a 00 83 e3 01 48 8b 5c 24 10 75 07 e8 d1 33 0a 00 eb 42 f3 90 <48> b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 00 84 c0 75 10 41 f7 [ 969.540428][ C1] RSP: 0000:ffffc90000fe7580 EFLAGS: 00000293 [ 969.546743][ C1] RAX: ffffffff815e8b05 RBX: ffff8881f7138e80 RCX: ffff8881153a3b40 [ 969.554726][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 969.562711][ C1] RBP: ffffc90000fe7690 R08: dffffc0000000000 R09: ffffed10268c16f6 [ 969.570695][ C1] R10: ffffed10268c16f6 R11: 1ffff110268c16f5 R12: 1ffff1103ee271d0 [ 969.578685][ C1] R13: 1ffff1103ee07af9 R14: 0000000000000000 R15: ffff8881f703d7c8 [ 969.586651][ C1] FS: 000055557d05a500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 969.595575][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 969.602148][ C1] CR2: 00007fd3aa98d680 CR3: 0000000160cb0000 CR4: 00000000003506a0 [ 969.610207][ C1] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 969.618173][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 969.626156][ C1] Call Trace: [ 969.629432][ C1] [ 969.632524][ C1] ? flush_tlb_func+0x4c0/0x4c0 [ 969.637391][ C1] ? native_flush_tlb_multi+0x210/0x210 [ 969.642940][ C1] ? smp_call_function_many+0x40/0x40 [ 969.648329][ C1] ? native_flush_tlb_multi+0x210/0x210 [ 969.653975][ C1] ? flush_tlb_func+0x4c0/0x4c0 [ 969.658818][ C1] on_each_cpu_cond_mask+0x43/0x80 [ 969.663928][ C1] native_flush_tlb_multi+0x144/0x210 [ 969.669305][ C1] flush_tlb_mm_range+0x32f/0x490 [ 969.674323][ C1] ptep_clear_flush+0x111/0x150 [ 969.679168][ C1] wp_page_copy+0xd72/0x18f0 [ 969.683865][ C1] ? insert_page_into_pte_locked+0x310/0x310 [ 969.689925][ C1] ? _raw_spin_trylock+0xb1/0x140 [ 969.695034][ C1] ? __cpuidle_text_end+0xb/0xb [ 969.699879][ C1] ? vm_normal_page+0x99/0x1f0 [ 969.704635][ C1] do_wp_page+0x731/0xc90 [ 969.708959][ C1] handle_pte_fault+0x73c/0x2680 [ 969.713893][ C1] ? trace_event_buffer_commit+0x25a/0x8a0 [ 969.719710][ C1] ? do_futex+0xc91/0x2620 [ 969.724121][ C1] ? fault_around_bytes_set+0xc0/0xc0 [ 969.729588][ C1] ? memcpy+0x56/0x70 [ 969.733670][ C1] do_handle_mm_fault+0x1a6d/0x1d50 [ 969.738910][ C1] ? futex_exit_release+0x1d0/0x1d0 [ 969.744131][ C1] ? bpf_probe_write_user+0xf0/0xf0 [ 969.749366][ C1] ? numa_migrate_prep+0xd0/0xd0 [ 969.754312][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 969.759865][ C1] ? __perf_event_task_sched_in+0x1fb/0x280 [ 969.765761][ C1] ? find_vma_from_tree+0xfd/0x110 [ 969.770877][ C1] ? access_error+0x152/0x260 [ 969.775557][ C1] do_user_addr_fault+0x554/0x1180 [ 969.780675][ C1] ? do_kern_addr_fault+0x80/0x80 [ 969.785702][ C1] ? debug_smp_processor_id+0x17/0x20 [ 969.791072][ C1] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 969.797133][ C1] ? exit_to_user_mode_prepare+0x39/0xd0 [ 969.802760][ C1] exc_page_fault+0x51/0xb0 [ 969.807371][ C1] asm_exc_page_fault+0x27/0x30 [ 969.812215][ C1] RIP: 0033:0x7fd3a9bb5fbe [ 969.816624][ C1] Code: 31 ff 4d 01 f2 41 0f 92 c7 72 a6 48 8b 44 24 08 48 8d 84 06 00 08 00 00 4c 01 f0 48 21 d8 49 39 c2 72 8e 31 c0 be 01 00 00 00 0f b1 35 ba 76 dd 00 0f 85 26 0a 00 00 c1 e1 02 48 8b 05 ca 76 [ 969.836395][ C1] RSP: 002b:00007ffc02a5f820 EFLAGS: 00010246 [ 969.842479][ C1] RAX: 0000000000000000 RBX: fffffffffffff000 RCX: 0000000000000006 [ 969.850569][ C1] RDX: 000000000000003f RSI: 0000000000000001 RDI: 00007ffc02a5f968 [ 969.858635][ C1] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000032 [ 969.866616][ C1] R10: 0000000000021000 R11: 0000000000020000 R12: 00007ffc02a5f970 [ 969.874673][ C1] R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000 [ 969.882663][ C1] [ 969.885679][ C1] Sending NMI from CPU 1 to CPUs 0: [ 969.890930][ C0] NMI backtrace for cpu 0 [ 969.890942][ C0] CPU: 0 PID: 21411 Comm: syz.6.6685 Tainted: G W syzkaller #0 [ 969.890962][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 969.890974][ C0] RIP: 0010:kvm_wait+0xcc/0x140 [ 969.891008][ C0] Code: 20 f6 44 24 21 02 75 24 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 48 0f b6 07 40 38 f0 75 a6 66 90 0f 00 2d e5 91 d6 03 f4 9a fa 48 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 3f 0f b6 07 [ 969.891024][ C0] RSP: 0018:ffffc900009e7400 EFLAGS: 00000046 [ 969.891040][ C0] RAX: 0000000000000003 RBX: ffff8881002fb06c RCX: ffffffff814f4259 [ 969.891053][ C0] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8881002fb06c [ 969.891077][ C0] RBP: ffffc900009e7490 R08: dffffc0000000000 R09: ffffed102005f60e [ 969.891090][ C0] R10: ffffed102005f60e R11: 1ffff1102005f60d R12: 1ffff1103ee00001 [ 969.891103][ C0] R13: ffff8881f7038ad4 R14: dffffc0000000000 R15: 1ffff9200013ce80 [ 969.891116][ C0] FS: 00007fd3a86676c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 969.891132][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 969.891145][ C0] CR2: 00002000000000c0 CR3: 0000000160cb0000 CR4: 00000000003506b0 [ 969.891161][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 969.891171][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 969.891182][ C0] Call Trace: [ 969.891189][ C0] [ 969.891198][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 969.891225][ C0] ? visit_groups_merge+0xd53/0xd90 [ 969.891254][ C0] ? pv_hash+0x86/0x150 [ 969.891283][ C0] __pv_queued_spin_lock_slowpath+0x60f/0x9c0 [ 969.891318][ C0] ? __pv_queued_spin_unlock_slowpath+0x300/0x300 [ 969.891354][ C0] queued_spin_lock_slowpath+0x47/0x50 [ 969.891382][ C0] _raw_spin_lock_irq+0xd9/0xe0 [ 969.891413][ C0] ? _raw_spin_lock_irqsave+0x110/0x110 [ 969.891443][ C0] ? debug_smp_processor_id+0x17/0x20 [ 969.891476][ C0] ? perf_trace_buf_alloc+0x1b8/0x320 [ 969.891505][ C0] perf_trace_sched_blocked_reason+0x243/0x4a0 [ 969.891533][ C0] ? trace_event_raw_event_sched_blocked_reason+0x350/0x350 [ 969.891553][ C0] ? __kasan_check_write+0x14/0x20 [ 969.891572][ C0] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 969.891592][ C0] try_to_wake_up+0xea1/0x1160 [ 969.891613][ C0] wake_up_process+0x10/0x20 [ 969.891629][ C0] swake_up_one+0x6a/0x150 [ 969.891648][ C0] __rcu_report_exp_rnp+0x1aa/0x1b0 [ 969.891670][ C0] rcu_preempt_deferred_qs_irqrestore+0x6f3/0x9d0 [ 969.891695][ C0] rcu_read_unlock_special+0xab/0x460 [ 969.891713][ C0] ? sidtab_context_to_sid+0x7c/0xc50 [ 969.891734][ C0] ? __rcu_read_unlock+0xa0/0xa0 [ 969.891751][ C0] ? mls_context_isvalid+0xb8/0x3b0 [ 969.891772][ C0] __rcu_read_unlock+0x5e/0xa0 [ 969.891819][ C0] security_compute_sid+0x1315/0x1440 [ 969.891835][ C0] ? _raw_spin_unlock+0x4d/0x70 [ 969.891859][ C0] ? security_transition_sid+0x90/0x90 [ 969.891875][ C0] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 969.891893][ C0] ? rcu_preempt_deferred_qs_irqrestore+0x6cd/0x9d0 [ 969.891919][ C0] ? rcu_read_unlock_special+0xab/0x460 [ 969.891936][ C0] ? irqentry_exit_cond_resched+0x29/0x30 [ 969.891954][ C0] ? __rcu_read_unlock+0xa0/0xa0 [ 969.891972][ C0] ? irqentry_exit+0x37/0x40 [ 969.891991][ C0] security_transition_sid+0x7d/0x90 [ 969.892009][ C0] selinux_socket_post_create+0x328/0x450 [ 969.892032][ C0] ? selinux_socket_create+0x290/0x290 [ 969.892051][ C0] ? __local_bh_enable_ip+0x58/0x80 [ 969.892070][ C0] ? local_bh_enable+0x1f/0x30 [ 969.892087][ C0] ? unix_create1+0x516/0x610 [ 969.892104][ C0] security_socket_post_create+0x82/0xb0 [ 969.892127][ C0] __sock_create+0x43b/0x7a0 [ 969.892150][ C0] __sys_socketpair+0x1a1/0x590 [ 969.892170][ C0] __x64_sys_socketpair+0x9b/0xb0 [ 969.892189][ C0] x64_sys_call+0x36/0x9a0 [ 969.892207][ C0] do_syscall_64+0x4c/0xa0 [ 969.892223][ C0] ? clear_bhb_loop+0x50/0xa0 [ 969.892241][ C0] ? clear_bhb_loop+0x50/0xa0 [ 969.892259][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 969.892278][ C0] RIP: 0033:0x7fd3a9bfeec9 [ 969.892295][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 969.892310][ C0] RSP: 002b:00007fd3a8667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 969.892327][ C0] RAX: ffffffffffffffda RBX: 00007fd3a9e55fa0 RCX: 00007fd3a9bfeec9 [ 969.892340][ C0] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000001 [ 969.892351][ C0] RBP: 00007fd3a9c81f91 R08: 0000000000000000 R09: 0000000000000000 [ 969.892362][ C0] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000 [ 969.892374][ C0] R13: 00007fd3a9e56038 R14: 00007fd3a9e55fa0 R15: 00007ffc02a5f878 [ 969.892394][ C0]