last executing test programs: 9m29.736551881s ago: executing program 3 (id=1720): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r5 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000540)='(pu&00\t||') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/65, 0x41}], 0x1}, 0x10100) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETTXFILTER(r6, 0x400454ca, &(0x7f0000000100)=ANY=[@ANYBLOB="2e42000c371303ed6a33f2ff8689b3f20e"]) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000001840)=ANY=[@ANYBLOB="00000c00ffffffffaf5aa5cea8c35d23c8fd94acdf9ec180fefffff76fc2000000bbbbbbbbbbbbaaaaaaaaaabbd7b9db29fe3f66c75d7199227ec3ec6bb1488853b78a59e39577"]) 9m29.332373808s ago: executing program 1 (id=1725): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9356}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000fa00000006"], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000180)={&(0x7f0000000040)="7a337a7f9d72100c10", &(0x7f0000001340)=""/4096, &(0x7f0000000100)="b5bb2e763f8650874b492acde1707c555a6492fae78bd430eedb6409cc03633ff154d271642ac46b1ac9b6439367a48d0ff7f1a67e3f4f2bcda5d667ea8821267ad03f682b3e74eadf39612bb13d3636", &(0x7f0000002a00), 0x3e6c, r2}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, r1, 0x0, 0xffffffffffffffff}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000600000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000001200000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)=@generic={&(0x7f0000000340)='./file0\x00', r0}, 0x18) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_BIND_MAP(0x23, &(0x7f00000002c0)={r5, r4}, 0xc) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf701364b9aafa27c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300)={0x0, r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 9m29.23955415s ago: executing program 3 (id=1726): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0xa9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r4}, 0x10) 9m28.285084058s ago: executing program 1 (id=1730): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x208, 0x10, 0x0, 0x9, 0x0, 0x7, 0x0, 0x0, 0xd4000000, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0xc00, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x406, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000440)='./file0\x00', 0x0, 0x4000, r1}, 0x18) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) close(0xffffffffffffffff) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0x1, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@ifindex=r6, 0x2b, 0x0, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000500), 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000540)={0x5a28ace1}, 0x8) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYRES32=r5, @ANYBLOB="2b00000001000000", @ANYRES64, @ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="d5380b2432bc54790d17ad7f63c18e622a5104a02e4ce6bb21aaba5dcdcc7e5459dc9297b6892386da1a562e58cad4d4e93297e8268aa8ad2401d013c488d467a6c4fc27a3466be13ad9121a5d92e91f8c52ed34ae6afa0b9c5d8309b42e95e7e01c962441038be3ceabc656f1f904729748d38da0fdb86994d99c2c1116b4e1494f7c3678f92f20a179355a409a82a214", @ANYRES64=r7], 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000680)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8983, 0x0) 9m28.21415689s ago: executing program 1 (id=1732): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES16, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000b0b4a5b93a21952e47983553d196000000000000000000e5936b786fa2c7c0d0876434a8dfd000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRES8=r0, @ANYRES8=r1, @ANYRESOCT=r0], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r4}, &(0x7f00000002c0), &(0x7f0000000300)=r4}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r4, &(0x7f0000000000)="d521", &(0x7f0000000380)=""/221}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 9m28.110616762s ago: executing program 3 (id=1736): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b7"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 9m27.958805475s ago: executing program 3 (id=1738): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002340)=ANY=[@ANYBLOB="fcffffff0000000000", @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001000)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000180)="87057e28d4f34bc83c374df5198532c0774e69b67fec2cc5611664aa017cf91d199a76c0edda19531d23a7ea0cd49d245458c75be3a7e3d1b2c6a9b1983bb4a1e7e1467775d5e250f9e2e69fd71ab355e880e8b41771876027035e8855366b9fd5b21dd42aafb551ffb9250ef40a30b119b5e1a3e6d08495742bac74c08cd166e63322e3aea6fbe3010290efaf56f34cf1", 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\x00'/12], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) 9m27.933076855s ago: executing program 1 (id=1739): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%+9llu \x00'}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0xffffffff, 0x9b6, 0x5, 0x1001, r2, 0x0, '\x00', r1, r3, 0x5, 0x4, 0x0, 0x8}, 0x50) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x40, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xa58a}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r5}, &(0x7f0000000280), &(0x7f00000002c0)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r7}, 0x10) unlink(0x0) 9m26.707408069s ago: executing program 4 (id=1746): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000073000095000000000000009500a50500000000163d9cd6c61c967af99610ee3233e3a8e299372948dc27ddceb54a2dcfecd2836bb442ad1516ef58249c7ca3b9e8dc07447d7743f7f44e000000000000080000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r4, 0x139, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000000340)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10000073, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd85, 0x0, 0x0, 0x0, 0xf0}, 0x94) perf_event_open(&(0x7f0000000c00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x4}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) 9m26.384420255s ago: executing program 4 (id=1748): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="1c00000000000300000000000000010045"], 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x2d, 'hugetlb'}, {0x2b, 'perf_event'}, {0x0, 'freezer'}, {0x2d, 'hugetlb'}, {0x2d, 'devices'}, {0x2b, 'perf_event'}, {0x2b, 'net_prio'}, {0x2b, 'blkio'}, {0x2b, 'io'}]}, 0x51) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 9m26.322675276s ago: executing program 4 (id=1749): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES16, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000b0b4a5b93a21952e47983553d196000000000000000000e5936b786fa2c7c0d0876434a8dfd000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b7040000860629c98500000015000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRES8=r0, @ANYRES8=r1, @ANYRESOCT=r0], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r4}, &(0x7f00000002c0), &(0x7f0000000300)=r4}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r4, &(0x7f0000000000)="d521", &(0x7f0000000380)=""/221}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 9m26.181626319s ago: executing program 4 (id=1752): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000005c0)=r1, 0x12) r4 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000040)=0x1, 0x12) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r9}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f00000004c0)="0465095aa69bdf7db3ab7151422bfa2ff96ad5dc76e898f1d3e814ef19db74a0c8a95c0e785e661aba033956607c7e48cc1c5c097e7fdc342bcacbaf73b57662aa53b0764d416e05be2fc49a4ce7877ef958f5e388fd0f8e044cb28a71d1ae8e8508b530953278aabdab8694b2bd2bbecc66c3b97b4c0d6dd1c1239f1bee81f23ca8e775f5903b02d74e85eaf82f205464d27b43d260ffbf16cbdecf1fe165be1920b87d62be4f2d4b27e9f2d452cd"}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 9m26.043415381s ago: executing program 4 (id=1753): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) close(r0) 9m25.918507114s ago: executing program 4 (id=1754): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000400000000000000000000008500000007000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095c44dc854bc32ff9ee0a1090a63deb7b7454ed84b00e8f202dc5440b9f1a90e84da6016c52feba3a8b537df0b201597217fc393e4ae24c47f7f348248dd57dfbd3fef5f66545517b4f36b77b4443231185fdd3e88e81db23a4fd12a6c6209af90d32a4b2c42486e0501f1d7bbd4"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc, 0x1c, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000000000010000000180000018110000ed18850eb25a91a05cb5018c35770075df3d074a682f9c71cfe10647a2468470aef748ea5e80f2c54c73e924e03aaf4edd177186708a81f833dadf5518abef36ca92344e85b7f58eb07b048a9ecff7649eb7905f685703e187cf292ba83211a24e0f07d4ac3c2cb3cf9a8fdffb2b7bf18cc3e327e99900050e2c5c6306479a4b92d9ae8d052b1484ae0d07499567e0e11584d9d5e7b5439eae4a2647416f08f128cb275fc97e", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000008000000bf91000000000000b7020000000000008500000085000000b70000000000000095000000"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b80a000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r5, &(0x7f0000000380)="d772575eb91d61733e046326f4302ed27f2e5e85325c79d51a3b9707b801bfd29395d59237d55443d91fb13cbdb3e6ee5512e35917229886030cdfebaea1add4189418da819131b6c860b831f7384564", &(0x7f0000000600)=""/240}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r6}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r5, 0x58, &(0x7f0000000400)}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r8}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r9}, 0x10) r11 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r10}, 0x8) write$cgroup_int(r11, &(0x7f00000001c0), 0xfffffdef) write$cgroup_int(r11, &(0x7f00000002c0)=0x9, 0x12) write$cgroup_subtree(r11, 0x0, 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 9m25.896620314s ago: executing program 32 (id=1754): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000400000000000000000000008500000007000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095c44dc854bc32ff9ee0a1090a63deb7b7454ed84b00e8f202dc5440b9f1a90e84da6016c52feba3a8b537df0b201597217fc393e4ae24c47f7f348248dd57dfbd3fef5f66545517b4f36b77b4443231185fdd3e88e81db23a4fd12a6c6209af90d32a4b2c42486e0501f1d7bbd4"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc, 0x1c, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000000000010000000180000018110000ed18850eb25a91a05cb5018c35770075df3d074a682f9c71cfe10647a2468470aef748ea5e80f2c54c73e924e03aaf4edd177186708a81f833dadf5518abef36ca92344e85b7f58eb07b048a9ecff7649eb7905f685703e187cf292ba83211a24e0f07d4ac3c2cb3cf9a8fdffb2b7bf18cc3e327e99900050e2c5c6306479a4b92d9ae8d052b1484ae0d07499567e0e11584d9d5e7b5439eae4a2647416f08f128cb275fc97e", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000008000000bf91000000000000b7020000000000008500000085000000b70000000000000095000000"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b80a000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r5, &(0x7f0000000380)="d772575eb91d61733e046326f4302ed27f2e5e85325c79d51a3b9707b801bfd29395d59237d55443d91fb13cbdb3e6ee5512e35917229886030cdfebaea1add4189418da819131b6c860b831f7384564", &(0x7f0000000600)=""/240}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r6}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r5, 0x58, &(0x7f0000000400)}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r8}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r9}, 0x10) r11 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r10}, 0x8) write$cgroup_int(r11, &(0x7f00000001c0), 0xfffffdef) write$cgroup_int(r11, &(0x7f00000002c0)=0x9, 0x12) write$cgroup_subtree(r11, 0x0, 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 9m25.734007618s ago: executing program 1 (id=1757): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6}, 0x805, 0x0, 0xfffffffc, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"/1671], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 9m25.692790548s ago: executing program 3 (id=1758): syz_clone(0x81120280, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x3, &(0x7f0000000000)='+#\x00'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f00000100000012"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000740), 0x80000002, r2}, 0x38) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r2, &(0x7f0000000240)="cc92658534417a963bf033bafad860850e8249ad72ad767b033b9b8803507c59f8d29c95b8f38495a3d6e71120ac78e559c039e82221a1ce2d5d263b543cea0d660816e628b9fd80a985a6dd702386f92d970af117e742365c831a09fee5178af6eff2ef1aa4961f735f71feb716e31ec759497d53ee5a717fc3f9fc05d3adea75eaee6dd51f4081551dcd6e036b512be64f7a0ea84bd0ad43c6c2bedb8c6302536e8af2aff52952e2d209f22c"}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 9m25.667095749s ago: executing program 5 (id=1756): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000040), &(0x7f00000003c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r1}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (fail_nth: 2) 9m25.63887861s ago: executing program 33 (id=1756): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000040), &(0x7f00000003c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r1}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (fail_nth: 2) 9m25.59755898s ago: executing program 1 (id=1760): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b700000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 9m25.59735253s ago: executing program 3 (id=1761): syz_clone(0x81120280, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x3, &(0x7f0000000000)='+#\x00'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f00000100000012"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000740), 0x80000002, r2}, 0x38) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r2, &(0x7f0000000240)="cc92658534417a963bf033bafad860850e8249ad72ad767b033b9b8803507c59f8d29c95b8f38495a3d6e71120ac78e559c039e82221a1ce2d5d263b543cea0d660816e628b9fd80a985a6dd702386f92d970af117e742365c831a09fee5178af6eff2ef1aa4961f735f71feb716e31ec759497d53ee5a717fc3f9fc05d3adea75eaee6dd51f4081551dcd6e036b512be64f7a0ea84bd0ad43c6c2bedb8c6302536e8af2aff52952e2d209f22c"}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 9m25.555706381s ago: executing program 34 (id=1760): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b700000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 9m25.552907611s ago: executing program 35 (id=1761): syz_clone(0x81120280, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x3, &(0x7f0000000000)='+#\x00'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f00000100000012"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000740), 0x80000002, r2}, 0x38) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r2, &(0x7f0000000240)="cc92658534417a963bf033bafad860850e8249ad72ad767b033b9b8803507c59f8d29c95b8f38495a3d6e71120ac78e559c039e82221a1ce2d5d263b543cea0d660816e628b9fd80a985a6dd702386f92d970af117e742365c831a09fee5178af6eff2ef1aa4961f735f71feb716e31ec759497d53ee5a717fc3f9fc05d3adea75eaee6dd51f4081551dcd6e036b512be64f7a0ea84bd0ad43c6c2bedb8c6302536e8af2aff52952e2d209f22c"}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 9m25.481307423s ago: executing program 6 (id=1759): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000a8427259dc1749a10000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r3}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x915940ab3f6031c7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r1, 0x18000000000002a0, 0xeff, 0x7, &(0x7f0000001240)="b9ff03076804268c989e14f088a8657986dd", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x406, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x35, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x4e, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000ff0f000000000000000000009500000000000000c19e64d705df64200ccc3f310dfd95ba3823f33a37d0f6828e05826a4d66ef1bccbfd5242014fe6f6e0ab6906bac8cbd0fb7baaf324b12d7780121ba290946a95fdfe31ba3b4fe36810a3d1c65af9eeac7d9de5b3db68501d7d37ae0f09df4041b61c63216536c15ab5f"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000007000000000000000000000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4d, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x94) 9m25.383313664s ago: executing program 36 (id=1759): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000a8427259dc1749a10000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r3}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x915940ab3f6031c7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r1, 0x18000000000002a0, 0xeff, 0x7, &(0x7f0000001240)="b9ff03076804268c989e14f088a8657986dd", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x406, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x35, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x4e, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000ff0f000000000000000000009500000000000000c19e64d705df64200ccc3f310dfd95ba3823f33a37d0f6828e05826a4d66ef1bccbfd5242014fe6f6e0ab6906bac8cbd0fb7baaf324b12d7780121ba290946a95fdfe31ba3b4fe36810a3d1c65af9eeac7d9de5b3db68501d7d37ae0f09df4041b61c63216536c15ab5f"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000007000000000000000000000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x4d, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x94) 22.527063506s ago: executing program 8 (id=6210): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0xa4a0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6d}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x61000300, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x19}, @generic={0xa7}, @initr0, @exit]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x0, 0xb, 0x5, 0xa, 0xfffffffffffffffc, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xce, &(0x7f00000004c0)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x7, 0x1da6, 0x963b}, 0x10, 0x1e7e6, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[r6], 0x0, 0x10, 0x9}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="120000000800000004000000b47c000000000000", @ANYRES32, @ANYBLOB="000000000000000800000020000000000000001e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x50) 17.537815642s ago: executing program 8 (id=6210): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0xa4a0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6d}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x61000300, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x19}, @generic={0xa7}, @initr0, @exit]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x0, 0xb, 0x5, 0xa, 0xfffffffffffffffc, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xce, &(0x7f00000004c0)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x7, 0x1da6, 0x963b}, 0x10, 0x1e7e6, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[r6], 0x0, 0x10, 0x9}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="120000000800000004000000b47c000000000000", @ANYRES32, @ANYBLOB="000000000000000800000020000000000000001e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x50) 13.371124562s ago: executing program 8 (id=6210): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0xa4a0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6d}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x61000300, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x19}, @generic={0xa7}, @initr0, @exit]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x0, 0xb, 0x5, 0xa, 0xfffffffffffffffc, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xce, &(0x7f00000004c0)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x7, 0x1da6, 0x963b}, 0x10, 0x1e7e6, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[r6], 0x0, 0x10, 0x9}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="120000000800000004000000b47c000000000000", @ANYRES32, @ANYBLOB="000000000000000800000020000000000000001e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x50) 8.323374789s ago: executing program 8 (id=6210): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0xa4a0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6d}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x61000300, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x19}, @generic={0xa7}, @initr0, @exit]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x0, 0xb, 0x5, 0xa, 0xfffffffffffffffc, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xce, &(0x7f00000004c0)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x7, 0x1da6, 0x963b}, 0x10, 0x1e7e6, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[r6], 0x0, 0x10, 0x9}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="120000000800000004000000b47c000000000000", @ANYRES32, @ANYBLOB="000000000000000800000020000000000000001e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x50) 4.440911934s ago: executing program 8 (id=6210): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0xa4a0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6d}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x61000300, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x19}, @generic={0xa7}, @initr0, @exit]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x0, 0xb, 0x5, 0xa, 0xfffffffffffffffc, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xce, &(0x7f00000004c0)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x7, 0x1da6, 0x963b}, 0x10, 0x1e7e6, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[r6], 0x0, 0x10, 0x9}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="120000000800000004000000b47c000000000000", @ANYRES32, @ANYBLOB="000000000000000800000020000000000000001e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x50) 2.0588583s ago: executing program 0 (id=6879): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'pim6reg\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb0100d8ace95f42ec7de5f4152f321800000000000000240000002400000002000000000000000000676de2f68b2b8615d8000000000604000000000000000000002d020000000081"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) socketpair(0x1, 0x2, 0x0, 0x0) (async) socketpair(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r4}, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x3, 0x0}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) 1.910448214s ago: executing program 0 (id=6880): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x7fffffff}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r3, 0x7fff}, 0xc) close(r4) 1.724836927s ago: executing program 0 (id=6881): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x3f) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000400000004000000040000000000", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@d, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x1, 0x6, 0x2, 0x200}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x100004, 0x220104, 0xb, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000, 0x180}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9e}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) 1.60019176s ago: executing program 9 (id=6883): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000200400000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xa, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018170000", @ANYRES32=r0, @ANYBLOB="000000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x20, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/21, 0x15}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r3}, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8982, &(0x7f0000000080)) 1.498452371s ago: executing program 9 (id=6885): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)) 1.257658656s ago: executing program 9 (id=6888): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) 991.724651ms ago: executing program 9 (id=6895): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40c02080, 0x0, 0x0, 0x0, 0x0, 0x0) 621.000418ms ago: executing program 2 (id=6896): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000200400000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xa, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018170000", @ANYRES32=r0, @ANYBLOB="000000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x20, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/21, 0x15}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8982, &(0x7f0000000080)) 559.982899ms ago: executing program 0 (id=6897): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0xa4a0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 453.325962ms ago: executing program 2 (id=6898): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x9, 0x9, 0x81, 0x0, 0x9, 0x10282, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0xf45, 0x8a}, 0x1404, 0x40, 0x1, 0x9, 0x1ddd, 0x6, 0x8, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7, 0x2, 0x7, 0x8, 0x0, 0x9, 0x2354, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xc0e, 0x2, @perf_bp={&(0x7f0000000040), 0x5}, 0x20, 0x9, 0x2, 0x1, 0xf, 0x3, 0x847d, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xb, r1, 0x8) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x10280, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000001c0)={'erspan0\x00', 0x300}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1c, 0x7f, 0x9, 0x8d0d, 0x0, 0xffffffffffffffff, 0xb9f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0xfffffffe, 0x0, 0x85c, 0x9, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3, 0x6}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001600)={0x1, 0x58, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001640)=0xffffffffffffffff, 0x4) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001700)={0x1b, 0x0, 0x0, 0xfffffffa, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x50) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001800)={{0x1, 0xffffffffffffffff}, &(0x7f0000001780), &(0x7f00000017c0)='%ps \x00'}, 0x20) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)=@generic={&(0x7f0000001840)='./file0\x00', 0x0, 0x10}, 0x18) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x2c, &(0x7f00000003c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x95}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}], &(0x7f0000000540)='GPL\x00', 0x50, 0x1000, &(0x7f0000000580)=""/4096, 0x41100, 0x6, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000001680)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000016c0)={0x3, 0x5, 0xb69f, 0x2}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000018c0)=[r8, r9, 0x1, r10], &(0x7f0000001900)=[{0x3, 0x2, 0xb, 0xd}, {0x1, 0x4, 0x9, 0x3}, {0x3, 0x3, 0x4, 0x4}, {0x2, 0x3, 0xb, 0x6}, {0x1, 0x4, 0x0, 0x9}, {0x4, 0x2, 0x1, 0xa}, {0x2, 0x4, 0x2, 0x8}], 0x10, 0x1}, 0x94) (async) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x11, 0x8, &(0x7f0000001a40)=@raw=[@generic={0x0, 0xf, 0x2, 0x5, 0x7}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xa}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001a80)='GPL\x00', 0x8, 0x1e, &(0x7f0000001ac0)=""/30, 0x41000, 0x8, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000001b00)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000001b40)={0x4, 0x0, 0xa, 0x8}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001b80)=[r3, r4, r5, r9, r8, r9, r3, r8], &(0x7f0000001bc0)=[{0x4, 0x2, 0x4, 0x4}, {0x3, 0x2, 0x3, 0x2}, {0x5, 0x4, 0x2}, {0x3, 0x2, 0x0, 0x4}, {0x4, 0x3, 0x8, 0x4}, {0x1, 0x1, 0x10, 0x3}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001d00)={@map=r9, r12, 0x24, 0x3172c87e52a263a3}, 0x20) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001d40)=@bloom_filter={0x1e, 0xb1fbade0, 0x6, 0xffff, 0x100, r10, 0xd1ec, '\x00', r6, r7, 0x1, 0x4, 0x1, 0x9}, 0x50) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001ec0)={@ifindex=r6, 0x7, 0x1, 0x9c, &(0x7f0000001dc0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000001e00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001e40)=[0x0, 0x0, 0x0], &(0x7f0000001e80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001f40)={0x5, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001f00)={@cgroup, r11, 0x7, 0x2020, 0x0, @void, @void, @value=r15, @void, r14}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002240)={r11, 0x0, 0x56, 0x0, &(0x7f0000001f80)="e7a9febb21c8c9a8ca13c92f90cea645bcf04cf67693892b914f3ef9e8584a6baacad18c2be2774c4fd86415187e11174ab9bb0690672ad16a465c5ad8a972c3d104cf427472edc6ab5f64fb5190645a64f12f78b2b3", &(0x7f0000002000), 0x5, 0x0, 0xe6, 0xd8, &(0x7f0000002040)="dd53b7f62312d59fe1201cf3376680cd9cac4ffa72dd433adf0edcb3573ca71f39938e7b9392e7e0f18b4fcfc6e59356c5049ca9d9585b37adecea378623b96f8dbb9d4baae09d960aab592e088eb6c3413c344dd779298bb2834707dffa3ebd55f8082f689051bdf338f4a623806f03b5e446303845b1225bcadc619952eb7141a6c662500130feab3c2861cc168ed1c93008fc3be04d418e97186f831c146a46c5408aac5f3c69bd9d25e087f2a5aacb25ecbc2ba640bbab21cc436060e5f33763cf15745d2153f49f0552e659571ea4c34bbb216cee34ae2fe837fcd3d3e3692186d2b407", &(0x7f0000002140)="d9f2a77d5fcf4cb89388865feffcd0f9115a99547c04b2fdfb30d48726f37ea82514a01992662c8790db416d8d01fd83c6f60c0fad2623180b172d9acaf58e56e579f15fbf1b9937ab5c09c139b45a3f0dd6b073fb7839a8b6fe33de8f65666f129c26a9de11350edda8df2d91054a9a85e8b4396ef279c1155a8f7478632b00f92efc3cc83e5a410d4f8aed83cfd6a35c3ac7a69a68765891e2734b1fa7e26affb446772a5eaba4127795e9b9410661302efa2ea171e30bcd6915db94a4e6627ecca7135435d3e82e5fca1a09f4ea7b64142e0b5b0e8aa6", 0x1, 0x0, 0x1}, 0x50) (async) r16 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000024c0)={0x6, 0x11, &(0x7f00000022c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@alu={0x4, 0x1, 0x3, 0x5, 0x3, 0x8, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0xb3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002380)='syzkaller\x00', 0xfffffff9, 0x0, 0x0, 0x41000, 0x8, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000023c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000002400)={0x3, 0x10, 0xf, 0xffffff7c}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000002440)=[r4, r10], &(0x7f0000002480)=[{0x1, 0x2, 0xa, 0x1}, {0x5, 0x1, 0xc, 0xb}], 0x10, 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000002640)={r16, 0x0, 0x31, 0x0, &(0x7f0000002580)="5317bfa330cfdb67305708236f9b04a9d943624af211d6a505180d2265580d210fcd8806bee5b70d912a615fadc7d87b8b", 0x0, 0xfffffffe, 0x0, 0x51, 0x0, &(0x7f00000025c0)="2a81dbe2737a508fe543e8b005a14b4deef925715f650588644525d43a05565081a2d442143e7412198880be1ed8e25f042f9263a6c6af68837439c85abdb16a1f3b7f268d4dbf787ff971153d5da4468b", 0x0, 0x2, 0x0, 0x4}, 0x50) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002880)={r5, &(0x7f00000026c0)="01b4ad60c287cd41de549a3d3faa9763470928b3ce0b44537d1f2449d94a1cd230a2ce38a39ffc247399e47928194b310ec6676a7ce0197c66a8c90f228bb37bd0ead1996e98a57c5e27c97acf90baf230205098a7c274e0ab54971b7b4c4b2a426a445d37b2d217f1b7545260dbc2d93581be58774706c5dbfc1a9a0484bdebdfa49279ec3f7717e823db8c7a34a1c5f63006d365f80c43651290be77e2e26f76a09b6abe2dd13ddcd0e046ce156fb46839b02bc54a8812c99732d81a07abbc962ef52f63b14c9b42defea782d7ca6e81bffeb3af9b98fdf9706cbe7ff6812920edb62805073d662014f1ced1dc77574063bb", &(0x7f00000027c0)=""/164, 0x4}, 0x20) (async) r17 = openat$cgroup_pressure(r8, &(0x7f00000028c0)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r17, &(0x7f0000002900)={'full', 0x20, 0x9, 0x20, 0x8001}, 0x2f) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002d40)={r7, 0x20, &(0x7f0000002d00)={&(0x7f0000002bc0)=""/97, 0x61, 0x0, &(0x7f0000002c40)=""/159, 0x9f}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000002e00)={0x5, 0x14, &(0x7f0000002940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@exit, @call={0x85, 0x0, 0x0, 0x1a}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}, @ldst={0x1, 0x3, 0x2, 0x3, 0x4, 0x6, 0xffffffffffffffff}, @alu={0x4, 0x1, 0x1, 0x8, 0xb, 0x8, 0x4}]}, &(0x7f0000002a00)='syzkaller\x00', 0x2, 0xdb, &(0x7f0000002a40)=""/219, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, r7, 0x8, &(0x7f0000002b40)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000002b80)={0x3, 0x5, 0x79fffaa2, 0xc}, 0x10, r18, r16, 0x3, &(0x7f0000002d80)=[r4, r3, r13, r3, r4], &(0x7f0000002dc0)=[{0x4, 0x5, 0x1, 0x4}, {0x5, 0x5, 0x3, 0x5}, {0x3, 0x3, 0xa, 0x9}], 0x10, 0x2}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002f80)={r19, 0x58, &(0x7f0000002f00)}, 0x10) 443.831072ms ago: executing program 2 (id=6899): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1}, [@printk={@llu}, @call={0x85, 0x0, 0x0, 0x5}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xbc) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='percpu_create_chunk\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) (fail_nth: 18) 404.818042ms ago: executing program 2 (id=6900): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000070000002a00000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x7, [@float={0x5, 0x0, 0x0, 0x10, 0x2}, @enum={0xb, 0x2, 0x0, 0x6, 0x4, [{0xe, 0x3}, {0x0, 0x1}]}, @union={0x7, 0x1, 0x0, 0x5, 0x1, 0x7, [{0x8, 0x5, 0x24}]}, @restrict={0xd, 0x0, 0x0, 0xb, 0x3}, @const={0x5}, @struct={0x4, 0x2, 0x0, 0x4, 0x1, 0x2, [{0x2, 0x1, 0x3}, {0xc, 0x3, 0x6}]}]}, {0x0, [0x61, 0x2e, 0x30, 0x5f, 0x0]}}, &(0x7f0000000d80)=""/4096, 0x9b, 0x1000, 0x0, 0x3}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x2, 0x0, r0, 0xb, '\x00', 0x0, r1, 0x0, 0x4, 0x2}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 355.851043ms ago: executing program 7 (id=6901): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 355.417453ms ago: executing program 7 (id=6902): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000280)='mm_lru_insertion\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x27, 0x14, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b0800", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70b000008000000b704000000001100850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) 330.863264ms ago: executing program 2 (id=6903): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) 294.196864ms ago: executing program 7 (id=6904): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@s}]}, &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000740)=r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0x7e, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xdd, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="001a000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffff070000000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=r1, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x41, &(0x7f0000000100)=r7, 0x8) setsockopt$sock_attach_bpf(r6, 0x1, 0x41, &(0x7f0000000100)=r5, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000080000000500000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r8}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r8, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0xa, 0x16, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000780)='syzkaller\x00', 0x2, 0x84, &(0x7f0000000c00)=""/132, 0x41100, 0x0, '\x00', 0x0, @fallback, r4, 0x8, &(0x7f0000000840)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0xd, 0x9, 0x9}, 0x10, r1, r0, 0x0, &(0x7f0000000d80)=[r2, r5, r2, r8], 0x0, 0x10, 0xd}, 0x94) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x833, '\x00', 0x0, 0x0}, 0x50) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 256.761735ms ago: executing program 9 (id=6905): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) 254.156745ms ago: executing program 2 (id=6906): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0xa4a0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 193.538087ms ago: executing program 7 (id=6907): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc0200000000000000ae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fc40848228567ffb400000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df2624f56da648d28ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71400fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada10eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff00000000000f000000ef0000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18aba6b16455a66c3b84b138efc20a546d3d5227e23b03f2a834391ade2ff3e93ee296c4082ee73e7c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0847a1ff2f7fc3c2b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f05c7f0be31491eb8c9ff68236c8600040000000000000000000066e034c81c3cab64e4fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f224baf1221c15fa12313ffbfa7c2730309f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca205081173bd03c4754fc4674812daab482fd390a1c903b5d28a1eb247b5837d7603b92495d5c569f6433c3fca5206cb0000003fdbbd3892c52c2e7612e05de32322e980a3d69931e2c9312dd517c96f2ee90362476ed853c4c9b7d4ebf13cbaa795860e92a3d7d004f2c491db38eb769f094d5d48b262cc35c40682138cf13a49aa9f27abec00002f01ba1251aaf2385416ca719300"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18090000000000000000000000010000181200", @ANYRES32=r1], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000540), &(0x7f0000000580)=r2}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000400000000000000000000850000005000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, 0x2}, 0x94) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r4}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r6) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r8, 0x2000012, 0x8ff, 0x0, &(0x7f00000004c0)="4133c9e924380000000000000000", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r3}, 0x68) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0x1, 0x0, r9}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r11}, &(0x7f0000000840), &(0x7f0000000880)=r10, 0x1000000}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r1, &(0x7f0000000780)}, 0x20) 182.299167ms ago: executing program 0 (id=6908): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='sched_switch\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000001000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x702, 0xe, 0x0, &(0x7f0000000580)="e460334470d8d400eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 175.092877ms ago: executing program 7 (id=6909): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c4300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0x20000060, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xfffffe21, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 112.396488ms ago: executing program 7 (id=6910): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r0}, &(0x7f0000001c00), &(0x7f0000001c40)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x15, 0x8, 0x10001, 0x9}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x3000000, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r6, 0x40047440, &(0x7f00000017c0)) 111.900578ms ago: executing program 0 (id=6911): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000b1cebe3aac31776d27fdd73c0d657f164dec867a5bf7ab817c4b78f27507988bb8f762b978196e744f7e08a24f56029ef55544ccb30d8e45710f79777687857577c1bc946c7842cd384eca0d865593c0b2477292f915612cd6609b1bf88a3205609c46cd77e6b92555e1f99023d9fcd4b082398a3ce753db26753dc6dcf7db8bb7f5cc75a117d4755c77599a2e29e1969bafe5f28d6eac5030bd2c41d27898"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000900000049a200006c0a000000010000", @ANYRES32, @ANYBLOB="7f00000000000000000000000000000000000000a5756b17cc7c01be7d8b06ddc5bcf871ef96bde54db3ab2f4b27", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000500"/28], 0x50) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r1}, 0x38) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000"], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x0) 11.11308ms ago: executing program 9 (id=6912): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) 0s ago: executing program 8 (id=6210): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0xa4a0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x6d}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x61000300, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x19}, @generic={0xa7}, @initr0, @exit]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x0, 0xb, 0x5, 0xa, 0xfffffffffffffffc, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xce, &(0x7f00000004c0)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x7, 0x1da6, 0x963b}, 0x10, 0x1e7e6, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[r6], 0x0, 0x10, 0x9}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="120000000800000004000000b47c000000000000", @ANYRES32, @ANYBLOB="000000000000000800000020000000000000001e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x50) kernel console output (not intermixed with test programs): +0x1bb/0x1520 [ 633.870118][T17487] dump_stack+0x15/0x24 [ 633.874271][T17487] should_fail_ex+0x3d4/0x520 [ 633.878968][T17487] should_fail+0xb/0x10 [ 633.883140][T17487] should_fail_usercopy+0x1a/0x20 [ 633.888186][T17487] _copy_from_user+0x1e/0xc0 [ 633.892771][T17487] kstrtouint_from_user+0xbe/0x150 [ 633.897959][T17487] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 633.903731][T17487] ? __kasan_check_read+0x11/0x20 [ 633.908743][T17487] ? _copy_to_user+0x72/0x90 [ 633.913319][T17487] ? simple_read_from_buffer+0x10f/0x160 [ 633.919030][T17487] proc_fail_nth_write+0x85/0x1f0 [ 633.924141][T17487] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 633.929758][T17487] ? security_file_permission+0x8a/0xb0 [ 633.935316][T17487] ? security_file_permission+0x94/0xb0 [ 633.940848][T17487] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 633.946465][T17487] vfs_write+0x40c/0xca0 [ 633.950696][T17487] ? __kasan_check_read+0x11/0x20 [ 633.955712][T17487] ? __cfi_vfs_write+0x10/0x10 [ 633.960463][T17487] ? __kasan_check_write+0x14/0x20 [ 633.965567][T17487] ? mutex_lock+0x8d/0x1a0 [ 633.969983][T17487] ? __cfi_mutex_lock+0x10/0x10 [ 633.974827][T17487] ? __fdget_pos+0x2cd/0x380 [ 633.979488][T17487] ? ksys_write+0x71/0x240 [ 633.983894][T17487] ksys_write+0x140/0x240 [ 633.988218][T17487] ? __cfi_ksys_write+0x10/0x10 [ 633.993059][T17487] ? debug_smp_processor_id+0x17/0x20 [ 633.998514][T17487] __x64_sys_write+0x7b/0x90 [ 634.003099][T17487] x64_sys_call+0x27b/0x9a0 [ 634.007615][T17487] do_syscall_64+0x4c/0xa0 [ 634.012111][T17487] ? clear_bhb_loop+0x30/0x80 [ 634.016784][T17487] ? clear_bhb_loop+0x30/0x80 [ 634.021552][T17487] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 634.027521][T17487] RIP: 0033:0x7fb13e98d69f [ 634.031929][T17487] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 634.051610][T17487] RSP: 002b:00007fb13f8a9030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 634.060014][T17487] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb13e98d69f [ 634.067986][T17487] RDX: 0000000000000001 RSI: 00007fb13f8a90a0 RDI: 0000000000000008 [ 634.075942][T17487] RBP: 00007fb13f8a9090 R08: 0000000000000000 R09: 0000000000000000 [ 634.083917][T17487] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 634.092052][T17487] R13: 00007fb13ebc6038 R14: 00007fb13ebc5fa0 R15: 00007ffddcd62198 [ 634.100215][T17487] [ 635.313788][T17545] FAULT_INJECTION: forcing a failure. [ 635.313788][T17545] name failslab, interval 1, probability 0, space 0, times 0 [ 635.328868][T17545] CPU: 0 PID: 17545 Comm: syz.9.6152 Tainted: G W syzkaller #0 [ 635.337931][T17545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 635.348091][T17545] Call Trace: [ 635.351382][T17545] [ 635.354321][T17545] __dump_stack+0x21/0x24 [ 635.358664][T17545] dump_stack_lvl+0xee/0x150 [ 635.363272][T17545] ? __cfi_dump_stack_lvl+0x8/0x8 [ 635.368306][T17545] ? selinux_kernfs_init_security+0x12b/0x400 [ 635.374375][T17545] dump_stack+0x15/0x24 [ 635.378529][T17545] should_fail_ex+0x3d4/0x520 [ 635.383213][T17545] ? __kernfs_new_node+0xdb/0x680 [ 635.388241][T17545] __should_failslab+0xac/0xf0 [ 635.393008][T17545] should_failslab+0x9/0x20 [ 635.397526][T17545] kmem_cache_alloc+0x3b/0x330 [ 635.402562][T17545] __kernfs_new_node+0xdb/0x680 [ 635.407427][T17545] ? clear_nonspinnable+0x60/0x60 [ 635.412455][T17545] ? rwsem_write_trylock+0x130/0x300 [ 635.417745][T17545] ? kernfs_new_node+0x260/0x260 [ 635.422705][T17545] ? up_write+0x7b/0x290 [ 635.426956][T17545] kernfs_new_node+0x150/0x260 [ 635.431736][T17545] __kernfs_create_file+0x4e/0x270 [ 635.436850][T17545] sysfs_add_file_mode_ns+0x1ce/0x270 [ 635.442224][T17545] internal_create_group+0x495/0xd00 [ 635.447513][T17545] ? sysfs_create_group+0x30/0x30 [ 635.452535][T17545] ? up_write+0x7b/0x290 [ 635.456786][T17545] ? kernfs_activate+0x1ea/0x200 [ 635.461818][T17545] sysfs_create_groups+0x58/0x120 [ 635.466933][T17545] device_add_attrs+0xdb/0x810 [ 635.471702][T17545] ? get_device_parent+0x410/0x410 [ 635.476821][T17545] ? sysfs_do_create_link_sd+0xe9/0x110 [ 635.482453][T17545] device_add+0x5f1/0xef0 [ 635.486786][T17545] netdev_register_kobject+0x179/0x320 [ 635.492245][T17545] ? raw_notifier_call_chain+0xfa/0x110 [ 635.497899][T17545] register_netdevice+0xe3d/0x14a0 [ 635.503029][T17545] ? kvmalloc_node+0x294/0x480 [ 635.507820][T17545] ? __cfi_register_netdevice+0x10/0x10 [ 635.513449][T17545] ? memset+0x35/0x40 [ 635.517449][T17545] ? memcpy+0x56/0x70 [ 635.521432][T17545] vti6_tnl_create2+0xbe/0x360 [ 635.526196][T17545] ? memcpy+0x56/0x70 [ 635.530180][T17545] vti6_locate+0x5f9/0x6d0 [ 635.534690][T17545] ? memcpy+0x56/0x70 [ 635.538701][T17545] ? vti6_link_config+0x550/0x550 [ 635.543723][T17545] ? memcpy+0x56/0x70 [ 635.547700][T17545] vti6_siocdevprivate+0x6d7/0xd20 [ 635.552910][T17545] ? __cfi_vti6_siocdevprivate+0x10/0x10 [ 635.558543][T17545] ? full_name_hash+0xba/0xf0 [ 635.563324][T17545] dev_ifsioc+0xbc4/0xed0 [ 635.567683][T17545] ? ioctl_has_perm+0x391/0x4c0 [ 635.572539][T17545] ? dev_ioctl+0xd10/0xd10 [ 635.577042][T17545] ? __kasan_check_write+0x14/0x20 [ 635.582335][T17545] ? mutex_lock+0x8d/0x1a0 [ 635.586841][T17545] ? __cfi_mutex_lock+0x10/0x10 [ 635.591783][T17545] ? dev_get_by_name_rcu+0xe5/0x130 [ 635.597162][T17545] dev_ioctl+0x5f3/0xd10 [ 635.601523][T17545] sock_ioctl+0x675/0x6e0 [ 635.605880][T17545] ? __cfi_sock_ioctl+0x10/0x10 [ 635.611018][T17545] ? security_file_ioctl+0x95/0xc0 [ 635.616242][T17545] ? __cfi_sock_ioctl+0x10/0x10 [ 635.621103][T17545] __se_sys_ioctl+0x12f/0x1b0 [ 635.625783][T17545] __x64_sys_ioctl+0x7b/0x90 [ 635.630370][T17545] x64_sys_call+0x58b/0x9a0 [ 635.634876][T17545] do_syscall_64+0x4c/0xa0 [ 635.639302][T17545] ? clear_bhb_loop+0x30/0x80 [ 635.643991][T17545] ? clear_bhb_loop+0x30/0x80 [ 635.650335][T17545] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 635.656441][T17545] RIP: 0033:0x7f552898ebe9 [ 635.660976][T17545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 635.680773][T17545] RSP: 002b:00007f552982d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 635.689199][T17545] RAX: ffffffffffffffda RBX: 00007f5528bc5fa0 RCX: 00007f552898ebe9 [ 635.697180][T17545] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 635.705149][T17545] RBP: 00007f552982d090 R08: 0000000000000000 R09: 0000000000000000 [ 635.713210][T17545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 635.721264][T17545] R13: 00007f5528bc6038 R14: 00007f5528bc5fa0 R15: 00007ffc1d8e97e8 [ 635.729245][T17545] [ 635.795171][T17547] device macsec0 left promiscuous mode [ 637.509314][T17575] FAULT_INJECTION: forcing a failure. [ 637.509314][T17575] name failslab, interval 1, probability 0, space 0, times 0 [ 637.685299][T17575] CPU: 0 PID: 17575 Comm: syz.2.6163 Tainted: G W syzkaller #0 [ 637.694375][T17575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 637.704543][T17575] Call Trace: [ 637.707838][T17575] [ 637.710785][T17575] __dump_stack+0x21/0x24 [ 637.715220][T17575] dump_stack_lvl+0xee/0x150 [ 637.719839][T17575] ? __cfi_dump_stack_lvl+0x8/0x8 [ 637.724976][T17575] ? __kasan_kmalloc+0x95/0xb0 [ 637.729759][T17575] dump_stack+0x15/0x24 [ 637.734041][T17575] should_fail_ex+0x3d4/0x520 [ 637.738744][T17575] ? build_skb+0x2a/0x220 [ 637.743099][T17575] __should_failslab+0xac/0xf0 [ 637.747884][T17575] should_failslab+0x9/0x20 [ 637.752417][T17575] kmem_cache_alloc+0x3b/0x330 [ 637.757207][T17575] build_skb+0x2a/0x220 [ 637.761416][T17575] bpf_prog_test_run_skb+0x39f/0x1290 [ 637.766816][T17575] ? __fget_files+0x2d5/0x330 [ 637.771525][T17575] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 637.777360][T17575] bpf_prog_test_run+0x3e3/0x630 [ 637.782321][T17575] ? bpf_prog_query+0x270/0x270 [ 637.787297][T17575] ? selinux_bpf+0xce/0xf0 [ 637.791757][T17575] ? security_bpf+0x93/0xb0 [ 637.796284][T17575] __sys_bpf+0x56d/0x780 [ 637.800562][T17575] ? bpf_link_show_fdinfo+0x320/0x320 [ 637.805967][T17575] ? __cfi_ksys_write+0x10/0x10 [ 637.811006][T17575] ? debug_smp_processor_id+0x17/0x20 [ 637.816425][T17575] __x64_sys_bpf+0x7c/0x90 [ 637.820881][T17575] x64_sys_call+0x488/0x9a0 [ 637.825415][T17575] do_syscall_64+0x4c/0xa0 [ 637.829850][T17575] ? clear_bhb_loop+0x30/0x80 [ 637.834564][T17575] ? clear_bhb_loop+0x30/0x80 [ 637.839269][T17575] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 637.845384][T17575] RIP: 0033:0x7f6a08d8ebe9 [ 637.849837][T17575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 637.869482][T17575] RSP: 002b:00007f6a077f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 637.877937][T17575] RAX: ffffffffffffffda RBX: 00007f6a08fc5fa0 RCX: 00007f6a08d8ebe9 [ 637.886015][T17575] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 637.894015][T17575] RBP: 00007f6a077f7090 R08: 0000000000000000 R09: 0000000000000000 [ 637.902003][T17575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 637.909995][T17575] R13: 00007f6a08fc6038 R14: 00007f6a08fc5fa0 R15: 00007ffe7becab08 [ 637.918077][T17575] [ 643.089399][T17719] FAULT_INJECTION: forcing a failure. [ 643.089399][T17719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 643.193766][T17719] CPU: 1 PID: 17719 Comm: syz.2.6215 Tainted: G W syzkaller #0 [ 643.202757][T17719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 643.212830][T17719] Call Trace: [ 643.216122][T17719] [ 643.219066][T17719] __dump_stack+0x21/0x24 [ 643.223415][T17719] dump_stack_lvl+0xee/0x150 [ 643.228031][T17719] ? __cfi_dump_stack_lvl+0x8/0x8 [ 643.233089][T17719] ? irqentry_exit+0x37/0x40 [ 643.237715][T17719] dump_stack+0x15/0x24 [ 643.241895][T17719] should_fail_ex+0x3d4/0x520 [ 643.246598][T17719] should_fail+0xb/0x10 [ 643.250781][T17719] should_fail_usercopy+0x1a/0x20 [ 643.255832][T17719] strncpy_from_user+0x24/0x2d0 [ 643.260715][T17719] strncpy_from_user_nofault+0x73/0x150 [ 643.266297][T17719] bpf_probe_read_user_str+0x2a/0x70 [ 643.271608][T17719] bpf_prog_6d75a33551be1a78+0x3a/0x3c [ 643.277073][T17719] bpf_test_run+0x349/0x8d0 [ 643.281579][T17719] ? __kasan_slab_alloc+0x72/0x80 [ 643.286601][T17719] ? convert___skb_to_skb+0x5b0/0x5b0 [ 643.291973][T17719] ? __cfi_eth_type_trans+0x10/0x10 [ 643.297262][T17719] ? convert___skb_to_skb+0x40/0x5b0 [ 643.302548][T17719] bpf_prog_test_run_skb+0xaec/0x1290 [ 643.307973][T17719] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 643.313865][T17719] bpf_prog_test_run+0x3e3/0x630 [ 643.318793][T17719] ? slab_free_freelist_hook+0xc2/0x190 [ 643.324339][T17719] ? bpf_prog_query+0x270/0x270 [ 643.329300][T17719] ? selinux_bpf+0xce/0xf0 [ 643.333719][T17719] ? security_bpf+0x93/0xb0 [ 643.338307][T17719] __sys_bpf+0x56d/0x780 [ 643.342663][T17719] ? bpf_link_show_fdinfo+0x320/0x320 [ 643.348034][T17719] ? __cfi_ksys_write+0x10/0x10 [ 643.353059][T17719] ? debug_smp_processor_id+0x17/0x20 [ 643.358435][T17719] __x64_sys_bpf+0x7c/0x90 [ 643.362852][T17719] x64_sys_call+0x488/0x9a0 [ 643.367352][T17719] do_syscall_64+0x4c/0xa0 [ 643.371764][T17719] ? clear_bhb_loop+0x30/0x80 [ 643.376446][T17719] ? clear_bhb_loop+0x30/0x80 [ 643.381119][T17719] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 643.387011][T17719] RIP: 0033:0x7f6a08d8ebe9 [ 643.391427][T17719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 643.411316][T17719] RSP: 002b:00007f6a077f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 643.419817][T17719] RAX: ffffffffffffffda RBX: 00007f6a08fc5fa0 RCX: 00007f6a08d8ebe9 [ 643.427786][T17719] RDX: 0000000000000050 RSI: 0000200000000a40 RDI: 000000000000000a [ 643.435841][T17719] RBP: 00007f6a077f7090 R08: 0000000000000000 R09: 0000000000000000 [ 643.444095][T17719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 643.452061][T17719] R13: 00007f6a08fc6038 R14: 00007f6a08fc5fa0 R15: 00007ffe7becab08 [ 643.460123][T17719] [ 643.563382][T17721] bridge0: port 1(bridge_slave_0) entered blocking state [ 643.570582][T17721] bridge0: port 1(bridge_slave_0) entered disabled state [ 643.578182][T17721] device bridge_slave_0 entered promiscuous mode [ 643.585785][T17721] bridge0: port 2(bridge_slave_1) entered blocking state [ 643.593272][T17721] bridge0: port 2(bridge_slave_1) entered disabled state [ 643.600948][T17721] device bridge_slave_1 entered promiscuous mode [ 643.754410][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 643.787299][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 643.843430][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 643.867514][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 643.879794][T10928] bridge0: port 1(bridge_slave_0) entered blocking state [ 643.886921][T10928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 643.922733][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 643.941420][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 643.950048][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 643.958905][T10928] bridge0: port 2(bridge_slave_1) entered blocking state [ 643.965999][T10928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 644.074321][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 644.095272][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 644.157887][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 644.200549][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 644.229199][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 644.264714][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 644.314861][T17721] device veth0_vlan entered promiscuous mode [ 644.378381][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 644.405628][T17769] device sit0 entered promiscuous mode [ 644.576063][T17721] device veth1_macvtap entered promiscuous mode [ 644.630758][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 644.667699][T10953] device veth1_macvtap left promiscuous mode [ 644.971562][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 645.503154][T17800] bridge0: port 2(bridge_slave_1) entered disabled state [ 645.510508][T17800] bridge0: port 1(bridge_slave_0) entered disabled state [ 645.574407][T17804] FAULT_INJECTION: forcing a failure. [ 645.574407][T17804] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 645.596876][T17800] device bridge_slave_1 left promiscuous mode [ 645.605644][T17800] bridge0: port 2(bridge_slave_1) entered disabled state [ 645.607146][T17804] CPU: 0 PID: 17804 Comm: syz.2.6244 Tainted: G W syzkaller #0 [ 645.621915][T17804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 645.631988][T17804] Call Trace: [ 645.635294][T17804] [ 645.638343][T17804] __dump_stack+0x21/0x24 [ 645.642778][T17804] dump_stack_lvl+0xee/0x150 [ 645.647470][T17804] ? __cfi_dump_stack_lvl+0x8/0x8 [ 645.652499][T17804] dump_stack+0x15/0x24 [ 645.656668][T17804] should_fail_ex+0x3d4/0x520 [ 645.661348][T17804] should_fail+0xb/0x10 [ 645.665503][T17804] should_fail_usercopy+0x1a/0x20 [ 645.670622][T17804] _copy_from_user+0x1e/0xc0 [ 645.675212][T17804] bpf_test_init+0x106/0x160 [ 645.679803][T17804] bpf_prog_test_run_xdp+0x359/0xe50 [ 645.685267][T17804] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 645.691074][T17804] ? __kasan_check_write+0x14/0x20 [ 645.696191][T17804] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 645.701998][T17804] bpf_prog_test_run+0x3e3/0x630 [ 645.706940][T17804] ? slab_free_freelist_hook+0xc2/0x190 [ 645.712489][T17804] ? bpf_prog_query+0x270/0x270 [ 645.717337][T17804] ? selinux_bpf+0xce/0xf0 [ 645.721749][T17804] ? security_bpf+0x93/0xb0 [ 645.726252][T17804] __sys_bpf+0x56d/0x780 [ 645.730488][T17804] ? bpf_link_show_fdinfo+0x320/0x320 [ 645.735860][T17804] ? __cfi_ksys_write+0x10/0x10 [ 645.740713][T17804] ? debug_smp_processor_id+0x17/0x20 [ 645.746087][T17804] __x64_sys_bpf+0x7c/0x90 [ 645.750515][T17804] x64_sys_call+0x488/0x9a0 [ 645.755014][T17804] do_syscall_64+0x4c/0xa0 [ 645.759514][T17804] ? clear_bhb_loop+0x30/0x80 [ 645.764201][T17804] ? clear_bhb_loop+0x30/0x80 [ 645.768964][T17804] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 645.774987][T17804] RIP: 0033:0x7f6a08d8ebe9 [ 645.779396][T17804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 645.799095][T17804] RSP: 002b:00007f6a077f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 645.807527][T17804] RAX: ffffffffffffffda RBX: 00007f6a08fc5fa0 RCX: 00007f6a08d8ebe9 [ 645.815509][T17804] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 000000000000000a [ 645.823481][T17804] RBP: 00007f6a077f7090 R08: 0000000000000000 R09: 0000000000000000 [ 645.831540][T17804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 645.839510][T17804] R13: 00007f6a08fc6038 R14: 00007f6a08fc5fa0 R15: 00007ffe7becab08 [ 645.847486][T17804] [ 645.852828][T17800] device bridge_slave_0 left promiscuous mode [ 645.861341][T17800] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.259039][T17809] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.266709][T17809] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.275556][T17809] device bridge_slave_0 entered promiscuous mode [ 646.283476][T17809] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.300814][T17809] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.321506][T17809] device bridge_slave_1 entered promiscuous mode [ 647.090064][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 647.132605][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 647.179430][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 647.201917][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 647.228270][T10382] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.235430][T10382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 647.257213][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 647.272316][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 647.288282][T10382] bridge0: port 2(bridge_slave_1) entered blocking state [ 647.295368][T10382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 647.347606][T17859] ÿÿÿÿÿÿ: renamed from vlan1 [ 647.362699][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 647.410847][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 647.419131][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 647.455357][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 647.486284][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 647.517573][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 647.557544][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 647.571210][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 647.584365][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 647.593504][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 647.603759][T17809] device veth0_vlan entered promiscuous mode [ 647.721714][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 647.738063][T17809] device veth1_macvtap entered promiscuous mode [ 647.763423][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 647.772898][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 647.839074][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 647.854230][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 647.878157][T10953] device bridge_slave_1 left promiscuous mode [ 647.885085][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 647.902058][T10953] device bridge_slave_0 left promiscuous mode [ 647.945184][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 647.961527][T10953] device veth1_macvtap left promiscuous mode [ 647.968015][T10953] device veth0_vlan left promiscuous mode [ 649.384550][T17931] FAULT_INJECTION: forcing a failure. [ 649.384550][T17931] name failslab, interval 1, probability 0, space 0, times 0 [ 649.397741][T17931] CPU: 0 PID: 17931 Comm: syz.9.6287 Tainted: G W syzkaller #0 [ 649.406978][T17931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 649.417152][T17931] Call Trace: [ 649.420457][T17931] [ 649.423414][T17931] __dump_stack+0x21/0x24 [ 649.427762][T17931] dump_stack_lvl+0xee/0x150 [ 649.432359][T17931] ? __cfi_dump_stack_lvl+0x8/0x8 [ 649.437379][T17931] ? skb_release_data+0x1d2/0x890 [ 649.442579][T17931] ? skb_ensure_writable+0x2f8/0x470 [ 649.447931][T17931] dump_stack+0x15/0x24 [ 649.452097][T17931] should_fail_ex+0x3d4/0x520 [ 649.456837][T17931] ? skb_clone+0x1f5/0x380 [ 649.461347][T17931] __should_failslab+0xac/0xf0 [ 649.466145][T17931] should_failslab+0x9/0x20 [ 649.470688][T17931] kmem_cache_alloc+0x3b/0x330 [ 649.475579][T17931] skb_clone+0x1f5/0x380 [ 649.479911][T17931] bpf_clone_redirect+0xa7/0x3c0 [ 649.485012][T17931] bpf_prog_b36a1f39e2fdd4f4+0x56/0x5b [ 649.490520][T17931] ? kasan_set_track+0x60/0x70 [ 649.495317][T17931] ? kasan_set_track+0x4b/0x70 [ 649.500196][T17931] ? kasan_save_alloc_info+0x25/0x30 [ 649.505523][T17931] ? __kasan_slab_alloc+0x72/0x80 [ 649.510757][T17931] ? slab_post_alloc_hook+0x4f/0x2d0 [ 649.516103][T17931] ? kmem_cache_alloc+0x16e/0x330 [ 649.521139][T17931] ? build_skb+0x2a/0x220 [ 649.525561][T17931] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 649.531123][T17931] ? bpf_prog_test_run+0x3e3/0x630 [ 649.536325][T17931] ? __sys_bpf+0x56d/0x780 [ 649.540740][T17931] ? __x64_sys_bpf+0x7c/0x90 [ 649.545335][T17931] ? x64_sys_call+0x488/0x9a0 [ 649.550116][T17931] ? do_syscall_64+0x4c/0xa0 [ 649.555246][T17931] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 649.561328][T17931] ? __kasan_check_read+0x11/0x20 [ 649.566387][T17931] ? bpf_test_timer_continue+0x147/0x4a0 [ 649.572200][T17931] bpf_test_run+0x349/0x8d0 [ 649.576820][T17931] ? __kasan_slab_alloc+0x72/0x80 [ 649.581884][T17931] ? convert___skb_to_skb+0x5b0/0x5b0 [ 649.587280][T17931] ? __cfi_eth_type_trans+0x10/0x10 [ 649.592488][T17931] ? convert___skb_to_skb+0x40/0x5b0 [ 649.597779][T17931] bpf_prog_test_run_skb+0xaec/0x1290 [ 649.603188][T17931] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 649.609257][T17931] bpf_prog_test_run+0x3e3/0x630 [ 649.614302][T17931] ? slab_free_freelist_hook+0xc2/0x190 [ 649.619854][T17931] ? bpf_prog_query+0x270/0x270 [ 649.624789][T17931] ? selinux_bpf+0xce/0xf0 [ 649.629213][T17931] ? security_bpf+0x93/0xb0 [ 649.633804][T17931] __sys_bpf+0x56d/0x780 [ 649.638274][T17931] ? bpf_link_show_fdinfo+0x320/0x320 [ 649.643735][T17931] ? __cfi_ksys_write+0x10/0x10 [ 649.648677][T17931] ? debug_smp_processor_id+0x17/0x20 [ 649.654227][T17931] __x64_sys_bpf+0x7c/0x90 [ 649.658651][T17931] x64_sys_call+0x488/0x9a0 [ 649.663267][T17931] do_syscall_64+0x4c/0xa0 [ 649.667706][T17931] ? clear_bhb_loop+0x30/0x80 [ 649.672504][T17931] ? clear_bhb_loop+0x30/0x80 [ 649.677199][T17931] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 649.683122][T17931] RIP: 0033:0x7f552898ebe9 [ 649.687544][T17931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 649.707426][T17931] RSP: 002b:00007f552982d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 649.715895][T17931] RAX: ffffffffffffffda RBX: 00007f5528bc5fa0 RCX: 00007f552898ebe9 [ 649.723976][T17931] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 649.731954][T17931] RBP: 00007f552982d090 R08: 0000000000000000 R09: 0000000000000000 [ 649.739926][T17931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 649.747982][T17931] R13: 00007f5528bc6038 R14: 00007f5528bc5fa0 R15: 00007ffc1d8e97e8 [ 649.756068][T17931] [ 650.152625][T17944] FAULT_INJECTION: forcing a failure. [ 650.152625][T17944] name failslab, interval 1, probability 0, space 0, times 0 [ 650.227028][T17944] CPU: 0 PID: 17944 Comm: syz.9.6289 Tainted: G W syzkaller #0 [ 650.236101][T17944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 650.246264][T17944] Call Trace: [ 650.249575][T17944] [ 650.252526][T17944] __dump_stack+0x21/0x24 [ 650.256936][T17944] dump_stack_lvl+0xee/0x150 [ 650.261559][T17944] ? __cfi_dump_stack_lvl+0x8/0x8 [ 650.266625][T17944] ? avc_has_perm+0x158/0x240 [ 650.271334][T17944] dump_stack+0x15/0x24 [ 650.275513][T17944] should_fail_ex+0x3d4/0x520 [ 650.280224][T17944] __should_failslab+0xac/0xf0 [ 650.285106][T17944] should_failslab+0x9/0x20 [ 650.289643][T17944] slab_pre_alloc_hook+0x30/0x1e0 [ 650.294789][T17944] kmem_cache_alloc_lru+0x49/0x280 [ 650.299940][T17944] ? sock_alloc_inode+0x28/0xc0 [ 650.304939][T17944] sock_alloc_inode+0x28/0xc0 [ 650.309706][T17944] ? __cfi_sock_alloc_inode+0x10/0x10 [ 650.315093][T17944] new_inode_pseudo+0x70/0x1f0 [ 650.319907][T17944] __sock_create+0x12c/0x7c0 [ 650.324502][T17944] __sys_socketpair+0x218/0x5b0 [ 650.329444][T17944] __x64_sys_socketpair+0x9b/0xb0 [ 650.334558][T17944] x64_sys_call+0x6e/0x9a0 [ 650.339154][T17944] do_syscall_64+0x4c/0xa0 [ 650.344086][T17944] ? clear_bhb_loop+0x30/0x80 [ 650.348887][T17944] ? clear_bhb_loop+0x30/0x80 [ 650.353591][T17944] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 650.359483][T17944] RIP: 0033:0x7f552898ebe9 [ 650.364082][T17944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 650.383704][T17944] RSP: 002b:00007f552982d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 650.392213][T17944] RAX: ffffffffffffffda RBX: 00007f5528bc5fa0 RCX: 00007f552898ebe9 [ 650.400442][T17944] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 650.408589][T17944] RBP: 00007f552982d090 R08: 0000000000000000 R09: 0000000000000000 [ 650.416893][T17944] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000001 [ 650.424863][T17944] R13: 00007f5528bc6038 R14: 00007f5528bc5fa0 R15: 00007ffc1d8e97e8 [ 650.433012][T17944] [ 650.586450][T17927] bridge0: port 1(bridge_slave_0) entered blocking state [ 650.593562][T17927] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.607485][T17927] device bridge_slave_0 entered promiscuous mode [ 650.614658][T17927] bridge0: port 2(bridge_slave_1) entered blocking state [ 650.627034][T17944] socket: no more sockets [ 650.631578][T17927] bridge0: port 2(bridge_slave_1) entered disabled state [ 650.647532][T17927] device bridge_slave_1 entered promiscuous mode [ 651.185540][T17927] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.192744][T17927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 651.200141][T17927] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.207204][T17927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 651.541299][ T690] bridge0: port 1(bridge_slave_0) entered disabled state [ 651.553760][ T690] bridge0: port 2(bridge_slave_1) entered disabled state [ 651.561738][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 651.569926][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 651.657460][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 651.677130][ T690] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.684281][ T690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 651.767201][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 651.775817][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 651.784301][ T690] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.791369][ T690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 651.800722][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 651.814719][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 651.874806][T17927] device veth0_vlan entered promiscuous mode [ 651.941631][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 651.950102][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 651.958471][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 651.967135][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 651.975877][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 651.984146][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 651.998590][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 652.022928][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 652.052311][T17927] device veth1_macvtap entered promiscuous mode [ 652.080835][T10953] device bridge_slave_1 left promiscuous mode [ 652.087264][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.095063][T10953] device bridge_slave_0 left promiscuous mode [ 652.101583][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 652.110104][T10953] device veth1_macvtap left promiscuous mode [ 652.118842][T10953] device veth0_vlan left promiscuous mode [ 652.246986][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 652.255853][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 652.264548][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 652.281119][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 652.307759][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 652.429016][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 652.457708][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 653.527112][T18001] device pim6reg1 entered promiscuous mode [ 653.533202][T18001] FAULT_INJECTION: forcing a failure. [ 653.533202][T18001] name failslab, interval 1, probability 0, space 0, times 0 [ 653.616946][T18001] CPU: 1 PID: 18001 Comm: syz.9.6307 Tainted: G W syzkaller #0 [ 653.625959][T18001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 653.636034][T18001] Call Trace: [ 653.639415][T18001] [ 653.642381][T18001] __dump_stack+0x21/0x24 [ 653.646899][T18001] dump_stack_lvl+0xee/0x150 [ 653.651692][T18001] ? __cfi_dump_stack_lvl+0x8/0x8 [ 653.656737][T18001] ? kasan_set_track+0x60/0x70 [ 653.661616][T18001] dump_stack+0x15/0x24 [ 653.665787][T18001] should_fail_ex+0x3d4/0x520 [ 653.670569][T18001] __should_failslab+0xac/0xf0 [ 653.675349][T18001] ? fib6_info_alloc+0x34/0xe0 [ 653.680204][T18001] should_failslab+0x9/0x20 [ 653.684726][T18001] __kmem_cache_alloc_node+0x3d/0x2c0 [ 653.690102][T18001] ? fib6_info_alloc+0x34/0xe0 [ 653.694864][T18001] __kmalloc+0xa1/0x1e0 [ 653.699027][T18001] fib6_info_alloc+0x34/0xe0 [ 653.703796][T18001] ip6_route_info_create+0x526/0x1510 [ 653.709255][T18001] ? __cfi_mutex_unlock+0x10/0x10 [ 653.714284][T18001] ip6_route_add+0x27/0x130 [ 653.718796][T18001] addrconf_add_dev+0x32c/0x420 [ 653.723648][T18001] ? addrconf_verify_rtnl+0xe60/0xe60 [ 653.729028][T18001] ? __local_bh_enable_ip+0x58/0x80 [ 653.734225][T18001] ? _raw_write_unlock_bh+0x2f/0x50 [ 653.739427][T18001] ? addrconf_permanent_addr+0x867/0x8c0 [ 653.745069][T18001] ? __kasan_check_read+0x11/0x20 [ 653.750105][T18001] addrconf_init_auto_addrs+0x76e/0xb80 [ 653.755730][T18001] ? addrconf_dad_run+0x590/0x590 [ 653.760889][T18001] ? igmpv3_del_delrec+0x700/0x700 [ 653.766015][T18001] ? __local_bh_enable_ip+0x58/0x80 [ 653.771208][T18001] ? _raw_spin_unlock_bh+0x50/0x60 [ 653.776314][T18001] ? __kasan_check_write+0x14/0x20 [ 653.781599][T18001] ? tun_sock_write_space+0x13b/0x1b0 [ 653.787172][T18001] ? __kasan_check_write+0x14/0x20 [ 653.792373][T18001] ? mutex_unlock+0x89/0x220 [ 653.796959][T18001] ? __cfi_mutex_unlock+0x10/0x10 [ 653.801996][T18001] ? macsec_notify+0xff/0x490 [ 653.806702][T18001] ? inetdev_event+0xe17/0x10e0 [ 653.811576][T18001] ? addrconf_link_ready+0x134/0x190 [ 653.816884][T18001] addrconf_notify+0x803/0xe40 [ 653.821669][T18001] raw_notifier_call_chain+0xa1/0x110 [ 653.827058][T18001] __dev_notify_flags+0x28f/0x500 [ 653.832091][T18001] ? __cfi___dev_notify_flags+0x10/0x10 [ 653.837640][T18001] ? __dev_change_flags+0x521/0x6b0 [ 653.842924][T18001] ? __cfi___dev_change_flags+0x10/0x10 [ 653.848469][T18001] dev_change_flags+0xe8/0x1a0 [ 653.853228][T18001] dev_ifsioc+0x159/0xed0 [ 653.857554][T18001] ? dev_ioctl+0xd10/0xd10 [ 653.862082][T18001] ? __mutex_lock_slowpath+0xe/0x10 [ 653.867285][T18001] ? mutex_lock+0xf8/0x1a0 [ 653.871864][T18001] ? __cfi_mutex_lock+0x10/0x10 [ 653.876707][T18001] ? dev_get_by_name_rcu+0xe5/0x130 [ 653.881907][T18001] dev_ioctl+0x556/0xd10 [ 653.886241][T18001] sock_do_ioctl+0x23f/0x310 [ 653.890830][T18001] ? sock_show_fdinfo+0xb0/0xb0 [ 653.895774][T18001] ? selinux_file_ioctl+0x377/0x480 [ 653.900979][T18001] sock_ioctl+0x4d8/0x6e0 [ 653.905316][T18001] ? __cfi_sock_ioctl+0x10/0x10 [ 653.910165][T18001] ? __fget_files+0x2d5/0x330 [ 653.914837][T18001] ? security_file_ioctl+0x95/0xc0 [ 653.919954][T18001] ? __cfi_sock_ioctl+0x10/0x10 [ 653.924804][T18001] __se_sys_ioctl+0x12f/0x1b0 [ 653.929476][T18001] __x64_sys_ioctl+0x7b/0x90 [ 653.934066][T18001] x64_sys_call+0x58b/0x9a0 [ 653.938587][T18001] do_syscall_64+0x4c/0xa0 [ 653.943085][T18001] ? clear_bhb_loop+0x30/0x80 [ 653.947782][T18001] ? clear_bhb_loop+0x30/0x80 [ 653.952462][T18001] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 653.958355][T18001] RIP: 0033:0x7f552898ebe9 [ 653.962769][T18001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 653.982386][T18001] RSP: 002b:00007f552982d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 653.991078][T18001] RAX: ffffffffffffffda RBX: 00007f5528bc5fa0 RCX: 00007f552898ebe9 [ 653.999233][T18001] RDX: 0000200000000380 RSI: 0000000000008914 RDI: 0000000000000007 [ 654.007207][T18001] RBP: 00007f552982d090 R08: 0000000000000000 R09: 0000000000000000 [ 654.015200][T18001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 654.023166][T18001] R13: 00007f5528bc6038 R14: 00007f5528bc5fa0 R15: 00007ffc1d8e97e8 [ 654.031139][T18001] [ 654.217173][T10953] device bridge_slave_1 left promiscuous mode [ 654.223320][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.234454][T10953] device bridge_slave_0 left promiscuous mode [ 654.240849][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.251004][T10953] device veth1_macvtap left promiscuous mode [ 654.257391][T10953] device veth0_vlan left promiscuous mode [ 655.177711][T18011] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.208611][T18011] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.229732][T18011] device bridge_slave_0 entered promiscuous mode [ 655.308953][T18011] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.316047][T18011] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.325093][T18011] device bridge_slave_1 entered promiscuous mode [ 655.375183][T18050] syz.9.6323[18050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.375282][T18050] syz.9.6323[18050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.487268][T18052] kfree: port 1(veth0) entered blocking state [ 655.510780][T18052] kfree: port 1(veth0) entered disabled state [ 655.521571][T18052] device veth0 entered promiscuous mode [ 655.646530][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 655.655453][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 655.686147][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 655.694951][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 655.703440][ T690] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.710532][ T690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 655.718950][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 655.728259][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 655.736488][ T690] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.743552][ T690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 655.752027][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 655.761963][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 655.770100][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 655.807576][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 655.838343][T18011] device veth0_vlan entered promiscuous mode [ 655.844878][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 655.854028][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 655.865540][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 655.884168][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 655.893794][T18011] device veth1_macvtap entered promiscuous mode [ 657.072594][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 657.117452][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 658.299974][T10953] device bridge_slave_1 left promiscuous mode [ 658.306298][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.338543][T10953] device bridge_slave_0 left promiscuous mode [ 658.344718][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.395642][T10953] device veth1_macvtap left promiscuous mode [ 658.403248][T10953] device veth0_vlan left promiscuous mode [ 658.644495][T18112] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.677297][T18112] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.684999][T18112] device bridge_slave_0 entered promiscuous mode [ 658.693646][T18112] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.701497][T18112] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.709176][T18112] device bridge_slave_1 entered promiscuous mode [ 658.862890][T18143] FAULT_INJECTION: forcing a failure. [ 658.862890][T18143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 658.936253][T18143] CPU: 0 PID: 18143 Comm: syz.2.6355 Tainted: G W syzkaller #0 [ 658.945739][T18143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 658.955830][T18143] Call Trace: [ 658.959121][T18143] [ 658.962150][T18143] __dump_stack+0x21/0x24 [ 658.966494][T18143] dump_stack_lvl+0xee/0x150 [ 658.971116][T18143] ? __cfi_dump_stack_lvl+0x8/0x8 [ 658.976165][T18143] ? format_decode+0x1bb/0x1520 [ 658.981201][T18143] dump_stack+0x15/0x24 [ 658.985371][T18143] should_fail_ex+0x3d4/0x520 [ 658.990066][T18143] should_fail+0xb/0x10 [ 658.994236][T18143] should_fail_usercopy+0x1a/0x20 [ 658.999281][T18143] _copy_from_user+0x1e/0xc0 [ 659.003887][T18143] kstrtouint_from_user+0xbe/0x150 [ 659.009018][T18143] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 659.014762][T18143] ? __kasan_check_read+0x11/0x20 [ 659.019814][T18143] ? _copy_to_user+0x72/0x90 [ 659.024407][T18143] ? simple_read_from_buffer+0x10f/0x160 [ 659.030035][T18143] proc_fail_nth_write+0x85/0x1f0 [ 659.035055][T18143] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 659.040683][T18143] ? security_file_permission+0x8a/0xb0 [ 659.046228][T18143] ? security_file_permission+0x94/0xb0 [ 659.051776][T18143] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 659.057411][T18143] vfs_write+0x40c/0xca0 [ 659.061654][T18143] ? __kasan_check_read+0x11/0x20 [ 659.066682][T18143] ? __cfi_vfs_write+0x10/0x10 [ 659.071457][T18143] ? __kasan_check_write+0x14/0x20 [ 659.076569][T18143] ? mutex_lock+0x8d/0x1a0 [ 659.080978][T18143] ? __cfi_mutex_lock+0x10/0x10 [ 659.085830][T18143] ? __fdget_pos+0x2cd/0x380 [ 659.090414][T18143] ? ksys_write+0x71/0x240 [ 659.094832][T18143] ksys_write+0x140/0x240 [ 659.099163][T18143] ? __cfi_ksys_write+0x10/0x10 [ 659.104017][T18143] ? debug_smp_processor_id+0x17/0x20 [ 659.109392][T18143] __x64_sys_write+0x7b/0x90 [ 659.113983][T18143] x64_sys_call+0x27b/0x9a0 [ 659.118482][T18143] do_syscall_64+0x4c/0xa0 [ 659.122890][T18143] ? clear_bhb_loop+0x30/0x80 [ 659.127567][T18143] ? clear_bhb_loop+0x30/0x80 [ 659.132238][T18143] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 659.138125][T18143] RIP: 0033:0x7f6a08d8d69f [ 659.142534][T18143] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 659.162222][T18143] RSP: 002b:00007f6a077f7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 659.170633][T18143] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6a08d8d69f [ 659.178604][T18143] RDX: 0000000000000001 RSI: 00007f6a077f70a0 RDI: 0000000000000008 [ 659.186662][T18143] RBP: 00007f6a077f7090 R08: 0000000000000000 R09: 0000000000000000 [ 659.194740][T18143] R10: 0000200000000940 R11: 0000000000000293 R12: 0000000000000002 [ 659.202726][T18143] R13: 00007f6a08fc6038 R14: 00007f6a08fc5fa0 R15: 00007ffe7becab08 [ 659.210789][T18143] [ 659.521266][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 659.532263][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 659.551054][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 659.564639][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.574413][T10390] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.581602][T10390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.667217][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 659.696014][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 659.736286][T10390] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.743480][T10390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.831905][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 659.840770][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 659.850996][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.860115][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 659.868988][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.914784][T18112] device veth0_vlan entered promiscuous mode [ 659.929661][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 659.938222][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 659.946658][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 659.956364][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 660.006113][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 660.017354][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 660.071449][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 660.088703][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 660.136579][T18112] device veth1_macvtap entered promiscuous mode [ 660.223457][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 660.231433][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 660.240090][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 660.249968][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 660.258378][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 661.207293][T18193] FAULT_INJECTION: forcing a failure. [ 661.207293][T18193] name failslab, interval 1, probability 0, space 0, times 0 [ 661.226354][T18192] device macsec0 entered promiscuous mode [ 661.227802][T18193] CPU: 0 PID: 18193 Comm: syz.0.6368 Tainted: G W syzkaller #0 [ 661.241168][T18193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 661.251250][T18193] Call Trace: [ 661.254550][T18193] [ 661.257501][T18193] __dump_stack+0x21/0x24 [ 661.261847][T18193] dump_stack_lvl+0xee/0x150 [ 661.266465][T18193] ? __cfi_dump_stack_lvl+0x8/0x8 [ 661.271513][T18193] ? do_syscall_64+0x4c/0xa0 [ 661.276201][T18193] dump_stack+0x15/0x24 [ 661.280364][T18193] should_fail_ex+0x3d4/0x520 [ 661.285050][T18193] __should_failslab+0xac/0xf0 [ 661.289831][T18193] ? sk_prot_alloc+0xed/0x320 [ 661.294521][T18193] should_failslab+0x9/0x20 [ 661.299548][T18193] __kmem_cache_alloc_node+0x3d/0x2c0 [ 661.304933][T18193] ? sk_prot_alloc+0xed/0x320 [ 661.309614][T18193] __kmalloc+0xa1/0x1e0 [ 661.313783][T18193] sk_prot_alloc+0xed/0x320 [ 661.318296][T18193] sk_alloc+0x3b/0x460 [ 661.322369][T18193] ? __kasan_check_write+0x14/0x20 [ 661.327513][T18193] bpf_prog_test_run_skb+0x37e/0x1290 [ 661.332896][T18193] ? __fget_files+0x2d5/0x330 [ 661.337583][T18193] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 661.343419][T18193] bpf_prog_test_run+0x3e3/0x630 [ 661.348362][T18193] ? slab_free_freelist_hook+0xc2/0x190 [ 661.353937][T18193] ? bpf_prog_query+0x270/0x270 [ 661.358823][T18193] ? selinux_bpf+0xce/0xf0 [ 661.363333][T18193] ? security_bpf+0x93/0xb0 [ 661.367849][T18193] __sys_bpf+0x56d/0x780 [ 661.372094][T18193] ? bpf_link_show_fdinfo+0x320/0x320 [ 661.377473][T18193] ? __cfi_ksys_write+0x10/0x10 [ 661.382334][T18193] ? debug_smp_processor_id+0x17/0x20 [ 661.387718][T18193] __x64_sys_bpf+0x7c/0x90 [ 661.392147][T18193] x64_sys_call+0x488/0x9a0 [ 661.396657][T18193] do_syscall_64+0x4c/0xa0 [ 661.401079][T18193] ? clear_bhb_loop+0x30/0x80 [ 661.405796][T18193] ? clear_bhb_loop+0x30/0x80 [ 661.410487][T18193] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 661.416389][T18193] RIP: 0033:0x7fe3c5f8ebe9 [ 661.420922][T18193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 661.440629][T18193] RSP: 002b:00007fe3c6e58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 661.449074][T18193] RAX: ffffffffffffffda RBX: 00007fe3c61c5fa0 RCX: 00007fe3c5f8ebe9 [ 661.457170][T18193] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 661.465156][T18193] RBP: 00007fe3c6e58090 R08: 0000000000000000 R09: 0000000000000000 [ 661.473308][T18193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 661.481327][T18193] R13: 00007fe3c61c6038 R14: 00007fe3c61c5fa0 R15: 00007ffcb9592338 [ 661.489312][T18193] [ 661.738788][T10953] device bridge_slave_1 left promiscuous mode [ 661.745047][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.752898][T10953] device bridge_slave_0 left promiscuous mode [ 661.770954][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.782979][T10953] device veth1_macvtap left promiscuous mode [ 661.789174][T10953] device veth0_vlan left promiscuous mode [ 662.127600][T18201] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.136814][T18201] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.158589][T18201] device bridge_slave_0 entered promiscuous mode [ 662.278213][T18201] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.289712][T18201] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.326096][T18201] device bridge_slave_1 entered promiscuous mode [ 663.231823][T18257] device syzkaller0 entered promiscuous mode [ 663.448523][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 663.467885][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 663.506790][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 663.532524][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 663.541076][ T690] bridge0: port 1(bridge_slave_0) entered blocking state [ 663.548242][ T690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 663.568370][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 663.578284][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 663.586865][ T690] bridge0: port 2(bridge_slave_1) entered blocking state [ 663.593989][ T690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 663.821046][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 663.895272][T18291] device pim6reg1 entered promiscuous mode [ 664.089201][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 664.097591][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 664.107200][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 664.115647][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 664.523142][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 664.531647][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 664.562041][T18201] device veth0_vlan entered promiscuous mode [ 664.577392][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 664.585685][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 664.615062][T18201] device veth1_macvtap entered promiscuous mode [ 664.627510][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 664.637460][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 664.657496][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 664.677413][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 664.707325][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 664.764077][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 664.774788][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 664.783456][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 664.793527][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 666.428966][T10953] device bridge_slave_1 left promiscuous mode [ 666.437203][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 666.489614][T10953] device bridge_slave_0 left promiscuous mode [ 666.529426][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 666.576604][T10953] device veth1_macvtap left promiscuous mode [ 666.607110][T10953] device veth0_vlan left promiscuous mode [ 666.835946][T18318] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.843624][T18318] bridge0: port 1(bridge_slave_0) entered disabled state [ 666.851260][T18318] device bridge_slave_0 entered promiscuous mode [ 666.859406][T18318] bridge0: port 2(bridge_slave_1) entered blocking state [ 666.866465][T18318] bridge0: port 2(bridge_slave_1) entered disabled state [ 666.874398][T18318] device bridge_slave_1 entered promiscuous mode [ 667.119109][ T28] audit: type=1400 audit(1756845077.633:167): avc: denied { getattr } for pid=18345 comm="syz.2.6421" path="net:[4026533026]" dev="nsfs" ino=4026533026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 667.646597][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 667.657327][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 667.691084][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 667.702860][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 667.746339][ T690] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.753558][ T690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 667.820289][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 667.850538][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 667.877125][ T690] bridge0: port 2(bridge_slave_1) entered blocking state [ 667.884232][ T690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 667.897074][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 667.905366][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 667.914445][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 668.014626][T18398] FAULT_INJECTION: forcing a failure. [ 668.014626][T18398] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 668.057086][T18398] CPU: 0 PID: 18398 Comm: syz.0.6438 Tainted: G W syzkaller #0 [ 668.066088][T18398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 668.076256][T18398] Call Trace: [ 668.079557][T18398] [ 668.082968][T18398] __dump_stack+0x21/0x24 [ 668.087410][T18398] dump_stack_lvl+0xee/0x150 [ 668.092046][T18398] ? __cfi_dump_stack_lvl+0x8/0x8 [ 668.097268][T18398] dump_stack+0x15/0x24 [ 668.101438][T18398] should_fail_ex+0x3d4/0x520 [ 668.106142][T18398] should_fail+0xb/0x10 [ 668.110547][T18398] should_fail_usercopy+0x1a/0x20 [ 668.115645][T18398] _copy_to_user+0x1e/0x90 [ 668.120098][T18398] generic_map_lookup_batch+0x6c8/0xa90 [ 668.125690][T18398] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 668.131778][T18398] ? __fdget+0x19c/0x220 [ 668.136040][T18398] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 668.142255][T18398] bpf_map_do_batch+0x2e8/0x620 [ 668.147162][T18398] ? __sys_bpf+0x2ed/0x780 [ 668.151596][T18398] __sys_bpf+0x624/0x780 [ 668.155853][T18398] ? bpf_link_show_fdinfo+0x320/0x320 [ 668.161267][T18398] ? __cfi_sched_clock_cpu+0x10/0x10 [ 668.166662][T18398] __x64_sys_bpf+0x7c/0x90 [ 668.171105][T18398] x64_sys_call+0x488/0x9a0 [ 668.175643][T18398] do_syscall_64+0x4c/0xa0 [ 668.180216][T18398] ? clear_bhb_loop+0x30/0x80 [ 668.184919][T18398] ? clear_bhb_loop+0x30/0x80 [ 668.189611][T18398] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 668.195515][T18398] RIP: 0033:0x7fe3c5f8ebe9 [ 668.199939][T18398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 668.219682][T18398] RSP: 002b:00007fe3c6e58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 668.228114][T18398] RAX: ffffffffffffffda RBX: 00007fe3c61c5fa0 RCX: 00007fe3c5f8ebe9 [ 668.236267][T18398] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 668.244261][T18398] RBP: 00007fe3c6e58090 R08: 0000000000000000 R09: 0000000000000000 [ 668.252331][T18398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 668.260459][T18398] R13: 00007fe3c61c6038 R14: 00007fe3c61c5fa0 R15: 00007ffcb9592338 [ 668.268541][T18398] [ 668.274238][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 668.298492][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 668.334694][T18318] device veth0_vlan entered promiscuous mode [ 668.383084][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 668.404800][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 668.473971][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 668.537134][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 668.642349][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 668.657297][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.671252][T18318] device veth1_macvtap entered promiscuous mode [ 668.709653][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 669.256246][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 669.279051][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 669.317108][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 669.335568][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 670.347288][T10953] device bridge_slave_1 left promiscuous mode [ 670.353571][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.364232][T10953] device bridge_slave_0 left promiscuous mode [ 670.370619][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.400122][T10953] device veth1_macvtap left promiscuous mode [ 670.406375][T10953] device veth0_vlan left promiscuous mode [ 670.824317][T18447] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.849556][T18447] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.857447][T18447] device bridge_slave_0 entered promiscuous mode [ 670.865099][T18447] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.872497][T18447] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.880124][T18447] device bridge_slave_1 entered promiscuous mode [ 671.375269][T18447] bridge0: port 2(bridge_slave_1) entered blocking state [ 671.382369][T18447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 671.389776][T18447] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.396992][T18447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 671.520869][T18494] device pim6reg1 entered promiscuous mode [ 671.635369][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 671.649010][ T690] bridge0: port 1(bridge_slave_0) entered disabled state [ 671.838128][ T690] bridge0: port 2(bridge_slave_1) entered disabled state [ 671.867014][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 671.889886][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 671.931362][ T690] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.938553][ T690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 672.014842][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 672.039256][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 672.047982][ T690] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.055133][ T690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 672.098659][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 672.127765][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 672.137631][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 672.156383][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 672.196832][T18447] device veth0_vlan entered promiscuous mode [ 672.217441][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 672.236284][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 672.276861][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 672.291823][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 672.303252][T18447] device veth1_macvtap entered promiscuous mode [ 672.323405][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 672.337815][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 672.346054][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 672.355363][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 672.365140][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 672.435676][T18523] device wg2 entered promiscuous mode [ 672.453923][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 672.463393][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 672.493027][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 672.522367][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 673.847523][T10953] device bridge_slave_1 left promiscuous mode [ 673.853758][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.861299][T10953] device bridge_slave_0 left promiscuous mode [ 673.867779][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.895506][T10953] device veth1_macvtap left promiscuous mode [ 673.903426][T10953] device veth0_vlan left promiscuous mode [ 674.367279][T18556] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.409592][T18556] bridge0: port 1(bridge_slave_0) entered disabled state [ 674.440400][T18556] device bridge_slave_0 entered promiscuous mode [ 674.559743][T18556] bridge0: port 2(bridge_slave_1) entered blocking state [ 674.574158][T18556] bridge0: port 2(bridge_slave_1) entered disabled state [ 674.619784][T18556] device bridge_slave_1 entered promiscuous mode [ 675.071717][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 675.091539][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 675.281915][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 675.307700][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 675.343320][T10390] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.350448][T10390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 675.358412][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 675.367351][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 675.383622][T10390] bridge0: port 2(bridge_slave_1) entered blocking state [ 675.390832][T10390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 675.417383][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 675.508599][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 675.524796][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 675.638855][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 675.683100][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 675.718631][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 675.727448][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 675.859624][T18556] device veth0_vlan entered promiscuous mode [ 675.955690][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 675.974837][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 676.008740][T18556] device veth1_macvtap entered promiscuous mode [ 676.040930][T18640] device sit0 left promiscuous mode [ 676.116015][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 676.126072][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 676.157199][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 676.251091][T18641] device sit0 entered promiscuous mode [ 676.363488][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 676.377406][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 677.577515][T10953] device bridge_slave_1 left promiscuous mode [ 677.583722][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.591427][T10953] device bridge_slave_0 left promiscuous mode [ 677.597863][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.605828][T10953] device veth1_macvtap left promiscuous mode [ 677.611941][T10953] device veth0_vlan left promiscuous mode [ 678.375627][T18675] FAULT_INJECTION: forcing a failure. [ 678.375627][T18675] name failslab, interval 1, probability 0, space 0, times 0 [ 678.438737][T18675] CPU: 0 PID: 18675 Comm: syz.9.6525 Tainted: G W syzkaller #0 [ 678.447730][T18675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 678.457810][T18675] Call Trace: [ 678.461110][T18675] [ 678.464068][T18675] __dump_stack+0x21/0x24 [ 678.468436][T18675] dump_stack_lvl+0xee/0x150 [ 678.473055][T18675] ? __cfi_dump_stack_lvl+0x8/0x8 [ 678.478100][T18675] ? __cfi_synchronize_rcu_expedited+0x10/0x10 [ 678.484294][T18675] ? bpf_dispatcher_xdp_func+0x20/0x30 [ 678.489823][T18675] dump_stack+0x15/0x24 [ 678.494009][T18675] should_fail_ex+0x3d4/0x520 [ 678.498704][T18675] __should_failslab+0xac/0xf0 [ 678.503478][T18675] ? kvmalloc_node+0x294/0x480 [ 678.508240][T18675] should_failslab+0x9/0x20 [ 678.512741][T18675] __kmem_cache_alloc_node+0x3d/0x2c0 [ 678.518109][T18675] ? mutex_unlock+0x89/0x220 [ 678.522820][T18675] ? kvmalloc_node+0x294/0x480 [ 678.527582][T18675] __kmalloc_node+0xa1/0x1e0 [ 678.532170][T18675] kvmalloc_node+0x294/0x480 [ 678.536753][T18675] ? __cfi_kvmalloc_node+0x10/0x10 [ 678.542207][T18675] ? synchronize_rcu+0x93/0x3a0 [ 678.547068][T18675] ? schedule_delayed_monitor_work+0x110/0x160 [ 678.553318][T18675] bpf_test_run_xdp_live+0x182/0x19e0 [ 678.558699][T18675] ? __cfi_mutex_unlock+0x10/0x10 [ 678.563851][T18675] ? text_poke_copy+0x7b/0x90 [ 678.568520][T18675] ? 0xffffffffa0004440 [ 678.572660][T18675] ? 0xffffffffa0004440 [ 678.576808][T18675] ? 0xffffffffa0004440 [ 678.580977][T18675] ? xdp_convert_md_to_buff+0x370/0x370 [ 678.586894][T18675] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 678.592821][T18675] ? __kasan_check_write+0x14/0x20 [ 678.597966][T18675] ? _copy_from_user+0x8f/0xc0 [ 678.602840][T18675] bpf_prog_test_run_xdp+0x6f1/0xe50 [ 678.608245][T18675] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 678.614172][T18675] ? __kasan_check_write+0x14/0x20 [ 678.619413][T18675] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 678.625244][T18675] bpf_prog_test_run+0x3e3/0x630 [ 678.630303][T18675] ? slab_free_freelist_hook+0xc2/0x190 [ 678.636308][T18675] ? bpf_prog_query+0x270/0x270 [ 678.641264][T18675] ? selinux_bpf+0xce/0xf0 [ 678.645681][T18675] ? security_bpf+0x93/0xb0 [ 678.650196][T18675] __sys_bpf+0x56d/0x780 [ 678.654454][T18675] ? bpf_link_show_fdinfo+0x320/0x320 [ 678.659927][T18675] ? __cfi_ksys_write+0x10/0x10 [ 678.665056][T18675] ? debug_smp_processor_id+0x17/0x20 [ 678.670535][T18675] __x64_sys_bpf+0x7c/0x90 [ 678.674957][T18675] x64_sys_call+0x488/0x9a0 [ 678.679459][T18675] do_syscall_64+0x4c/0xa0 [ 678.684045][T18675] ? clear_bhb_loop+0x30/0x80 [ 678.689178][T18675] ? clear_bhb_loop+0x30/0x80 [ 678.693893][T18675] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 678.699785][T18675] RIP: 0033:0x7f552898ebe9 [ 678.704284][T18675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 678.724072][T18675] RSP: 002b:00007f552982d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 678.732486][T18675] RAX: ffffffffffffffda RBX: 00007f5528bc5fa0 RCX: 00007f552898ebe9 [ 678.740464][T18675] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 000000000000000a [ 678.748607][T18675] RBP: 00007f552982d090 R08: 0000000000000000 R09: 0000000000000000 [ 678.756671][T18675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 678.764962][T18675] R13: 00007f5528bc6038 R14: 00007f5528bc5fa0 R15: 00007ffc1d8e97e8 [ 678.773305][T18675] [ 678.862067][T18673] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.939970][T18673] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.068310][T18673] device bridge_slave_0 entered promiscuous mode [ 679.115132][T18673] bridge0: port 2(bridge_slave_1) entered blocking state [ 679.129673][T18673] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.165487][T18673] device bridge_slave_1 entered promiscuous mode [ 679.555759][T18673] bridge0: port 2(bridge_slave_1) entered blocking state [ 679.563238][T18673] bridge0: port 2(bridge_slave_1) entered forwarding state [ 679.570680][T18673] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.577926][T18673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 679.751414][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.771139][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.821177][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 679.850452][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 679.909260][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 679.957316][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 679.965840][T10953] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.972980][T10953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 680.091972][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 680.100710][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 680.119455][T10953] bridge0: port 2(bridge_slave_1) entered blocking state [ 680.126555][T10953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 680.161992][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 680.175264][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 680.223824][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 680.239690][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 680.378501][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 680.399886][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 680.539551][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 680.567939][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 680.600011][T18673] device veth0_vlan entered promiscuous mode [ 680.607125][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 680.624636][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 680.724290][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 680.739752][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 680.797247][T18673] device veth1_macvtap entered promiscuous mode [ 680.865223][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 680.874570][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 680.887578][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 680.911864][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 680.927475][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 681.798272][T10390] device bridge_slave_1 left promiscuous mode [ 681.805073][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 681.826761][T10390] device bridge_slave_0 left promiscuous mode [ 681.833091][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 681.842904][T10390] device veth1_macvtap left promiscuous mode [ 681.849059][T10390] device veth0_vlan left promiscuous mode [ 684.312580][T18781] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.319879][T18781] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.337726][T18781] device bridge_slave_0 entered promiscuous mode [ 684.373565][T18781] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.427094][T18781] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.434738][T18781] device bridge_slave_1 entered promiscuous mode [ 684.609904][T18823] syz.2.6573[18823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.609986][T18823] syz.2.6573[18823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.860234][T18823] syz.2.6573[18823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.929297][T18823] syz.2.6573[18823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 685.249824][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 685.269532][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 685.294175][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 685.303043][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 685.345701][T10382] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.352816][T10382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.397152][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 685.417780][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 685.443864][T10382] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.451059][T10382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.485077][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 685.506752][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 685.586121][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 685.637982][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 685.657233][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 685.703555][T18781] device veth0_vlan entered promiscuous mode [ 685.724375][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 685.739762][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 685.784245][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 685.828247][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 685.874232][T18856] device wg2 left promiscuous mode [ 685.899771][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 685.930346][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 685.979682][T18781] device veth1_macvtap entered promiscuous mode [ 686.014357][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 686.029573][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 686.077597][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 686.104761][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 686.127624][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 687.577590][T10390] device bridge_slave_1 left promiscuous mode [ 687.583946][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 687.591573][T10390] device bridge_slave_0 left promiscuous mode [ 687.597989][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.606086][T10390] device veth1_macvtap left promiscuous mode [ 687.612607][T10390] device veth0_vlan left promiscuous mode [ 687.705969][T18896] device pim6reg1 entered promiscuous mode [ 687.871440][T18901] bridge0: port 1(bridge_slave_0) entered blocking state [ 687.878836][T18901] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.887930][T18901] device bridge_slave_0 entered promiscuous mode [ 687.895075][T18901] bridge0: port 2(bridge_slave_1) entered blocking state [ 687.902316][T18901] bridge0: port 2(bridge_slave_1) entered disabled state [ 687.909944][T18901] device bridge_slave_1 entered promiscuous mode [ 688.037244][T18916] FAULT_INJECTION: forcing a failure. [ 688.037244][T18916] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 688.050546][T18916] CPU: 1 PID: 18916 Comm: syz.9.6603 Tainted: G W syzkaller #0 [ 688.059606][T18916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 688.069669][T18916] Call Trace: [ 688.073136][T18916] [ 688.076077][T18916] __dump_stack+0x21/0x24 [ 688.080424][T18916] dump_stack_lvl+0xee/0x150 [ 688.085038][T18916] ? __cfi_dump_stack_lvl+0x8/0x8 [ 688.090085][T18916] ? __kasan_check_write+0x14/0x20 [ 688.095229][T18916] ? _raw_spin_lock_irq+0x8f/0xe0 [ 688.100277][T18916] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 688.105843][T18916] dump_stack+0x15/0x24 [ 688.110033][T18916] should_fail_ex+0x3d4/0x520 [ 688.114767][T18916] should_fail+0xb/0x10 [ 688.118961][T18916] should_fail_usercopy+0x1a/0x20 [ 688.123980][T18916] copy_page_from_iter_atomic+0x35c/0x1210 [ 688.129782][T18916] ? __cfi_copy_page_from_iter_atomic+0x10/0x10 [ 688.136449][T18916] ? __kasan_check_read+0x11/0x20 [ 688.141466][T18916] ? shmem_write_begin+0x151/0x2c0 [ 688.146568][T18916] generic_perform_write+0x348/0x6d0 [ 688.151844][T18916] ? __cfi_generic_perform_write+0x10/0x10 [ 688.157645][T18916] ? __cfi_file_update_time+0x10/0x10 [ 688.163035][T18916] __generic_file_write_iter+0x227/0x580 [ 688.168685][T18916] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 688.174464][T18916] ? __cfi___generic_file_write_iter+0x10/0x10 [ 688.180639][T18916] ? rwsem_write_trylock+0x130/0x300 [ 688.185947][T18916] ? generic_write_checks_count+0x3c6/0x4a0 [ 688.191852][T18916] ? generic_write_checks+0xca/0x100 [ 688.197234][T18916] generic_file_write_iter+0xae/0x310 [ 688.203581][T18916] vfs_write+0x5db/0xca0 [ 688.207841][T18916] ? slab_free_freelist_hook+0xc2/0x190 [ 688.213413][T18916] ? __cfi_vfs_write+0x10/0x10 [ 688.218203][T18916] ? __cfi_mutex_lock+0x10/0x10 [ 688.223071][T18916] ? __fdget_pos+0x2cd/0x380 [ 688.227678][T18916] ? ksys_write+0x71/0x240 [ 688.232109][T18916] ksys_write+0x140/0x240 [ 688.236460][T18916] ? __cfi_ksys_write+0x10/0x10 [ 688.241417][T18916] ? __bpf_trace_sys_enter+0x62/0x70 [ 688.246723][T18916] __x64_sys_write+0x7b/0x90 [ 688.251338][T18916] x64_sys_call+0x27b/0x9a0 [ 688.256035][T18916] do_syscall_64+0x4c/0xa0 [ 688.260460][T18916] ? clear_bhb_loop+0x30/0x80 [ 688.265167][T18916] ? clear_bhb_loop+0x30/0x80 [ 688.269858][T18916] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 688.275763][T18916] RIP: 0033:0x7f552898ebe9 [ 688.280199][T18916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 688.299826][T18916] RSP: 002b:00007f552982d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 688.308526][T18916] RAX: ffffffffffffffda RBX: 00007f5528bc5fa0 RCX: 00007f552898ebe9 [ 688.316522][T18916] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000006 [ 688.324604][T18916] RBP: 00007f552982d090 R08: 0000000000000000 R09: 0000000000000000 [ 688.332593][T18916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 688.340589][T18916] R13: 00007f5528bc6038 R14: 00007f5528bc5fa0 R15: 00007ffc1d8e97e8 [ 688.348581][T18916] [ 688.451986][T18901] bridge0: port 2(bridge_slave_1) entered blocking state [ 688.459106][T18901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 688.466386][T18901] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.473461][T18901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 688.537568][T18928] FAULT_INJECTION: forcing a failure. [ 688.537568][T18928] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 688.592664][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 688.689169][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.697237][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 688.714546][T18928] CPU: 0 PID: 18928 Comm: syz.2.6606 Tainted: G W syzkaller #0 [ 688.723527][T18928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 688.733597][T18928] Call Trace: [ 688.736884][T18928] [ 688.739833][T18928] __dump_stack+0x21/0x24 [ 688.744179][T18928] dump_stack_lvl+0xee/0x150 [ 688.748803][T18928] ? __cfi_dump_stack_lvl+0x8/0x8 [ 688.753945][T18928] dump_stack+0x15/0x24 [ 688.758110][T18928] should_fail_ex+0x3d4/0x520 [ 688.762802][T18928] should_fail+0xb/0x10 [ 688.766967][T18928] should_fail_usercopy+0x1a/0x20 [ 688.772002][T18928] _copy_to_user+0x1e/0x90 [ 688.776599][T18928] simple_read_from_buffer+0xe9/0x160 [ 688.781996][T18928] proc_fail_nth_read+0x19a/0x210 [ 688.787038][T18928] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 688.792588][T18928] ? security_file_permission+0x94/0xb0 [ 688.798193][T18928] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 688.803788][T18928] vfs_read+0x26e/0x8c0 [ 688.808055][T18928] ? __cfi_vfs_read+0x10/0x10 [ 688.812775][T18928] ? __kasan_check_write+0x14/0x20 [ 688.817923][T18928] ? mutex_lock+0x8d/0x1a0 [ 688.822458][T18928] ? __cfi_mutex_lock+0x10/0x10 [ 688.827344][T18928] ? __fdget_pos+0x2cd/0x380 [ 688.832193][T18928] ? ksys_read+0x71/0x240 [ 688.836644][T18928] ksys_read+0x140/0x240 [ 688.841082][T18928] ? __cfi_ksys_read+0x10/0x10 [ 688.846039][T18928] ? debug_smp_processor_id+0x17/0x20 [ 688.851425][T18928] __x64_sys_read+0x7b/0x90 [ 688.855948][T18928] x64_sys_call+0x2f/0x9a0 [ 688.860491][T18928] do_syscall_64+0x4c/0xa0 [ 688.864939][T18928] ? clear_bhb_loop+0x30/0x80 [ 688.869731][T18928] ? clear_bhb_loop+0x30/0x80 [ 688.874514][T18928] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 688.880584][T18928] RIP: 0033:0x7f6a08d8d5fc [ 688.885013][T18928] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 688.905081][T18928] RSP: 002b:00007f6a077f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 688.913517][T18928] RAX: ffffffffffffffda RBX: 00007f6a08fc5fa0 RCX: 00007f6a08d8d5fc [ 688.921499][T18928] RDX: 000000000000000f RSI: 00007f6a077f70a0 RDI: 0000000000000008 [ 688.929478][T18928] RBP: 00007f6a077f7090 R08: 0000000000000000 R09: 0000000000000000 [ 688.937458][T18928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 688.945449][T18928] R13: 00007f6a08fc6038 R14: 00007f6a08fc5fa0 R15: 00007ffe7becab08 [ 688.953518][T18928] [ 688.994627][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 689.005817][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 689.014520][T10953] bridge0: port 1(bridge_slave_0) entered blocking state [ 689.021612][T10953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 689.036596][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 689.047266][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 689.055702][T10953] bridge0: port 2(bridge_slave_1) entered blocking state [ 689.062785][T10953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 689.071048][T18933] device pim6reg1 entered promiscuous mode [ 689.092482][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 689.102697][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 689.134124][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 689.145013][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 689.157054][T18939] device pim6reg1 entered promiscuous mode [ 689.493921][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 689.503325][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 689.516724][T18901] device veth0_vlan entered promiscuous mode [ 689.579784][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 689.601904][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 689.620385][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 689.646604][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 689.899243][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 689.913441][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 689.957355][T18901] device veth1_macvtap entered promiscuous mode [ 689.979684][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 690.017910][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 690.045452][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 690.078893][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 690.117521][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 690.967512][T10390] device bridge_slave_1 left promiscuous mode [ 690.974102][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.981838][T10390] device bridge_slave_0 left promiscuous mode [ 690.988035][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.995700][T10390] device veth1_macvtap left promiscuous mode [ 691.001939][T10390] device veth0_vlan left promiscuous mode [ 691.691467][T18984] device pim6reg1 entered promiscuous mode [ 691.925753][T18989] bridge0: port 1(bridge_slave_0) entered blocking state [ 692.107682][T18989] bridge0: port 1(bridge_slave_0) entered disabled state [ 692.129653][T18989] device bridge_slave_0 entered promiscuous mode [ 692.143680][T18989] bridge0: port 2(bridge_slave_1) entered blocking state [ 692.156919][T18989] bridge0: port 2(bridge_slave_1) entered disabled state [ 692.166554][T18989] device bridge_slave_1 entered promiscuous mode [ 692.209072][T19006] device syzkaller0 entered promiscuous mode [ 693.115938][T19027] device syzkaller0 entered promiscuous mode [ 693.436097][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 693.444584][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 693.459552][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 693.468089][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 693.476673][T10390] bridge0: port 1(bridge_slave_0) entered blocking state [ 693.483773][T10390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 693.563530][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 693.582513][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 693.597346][T10390] bridge0: port 2(bridge_slave_1) entered blocking state [ 693.604433][T10390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 693.626091][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 693.640595][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 693.649166][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 693.676679][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 693.712472][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 693.770363][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 693.786703][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 693.849102][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 693.886475][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 693.932449][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 693.957704][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 694.049750][T18989] device veth0_vlan entered promiscuous mode [ 694.094410][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 694.110871][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 694.191086][T18989] device veth1_macvtap entered promiscuous mode [ 694.226411][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 694.243114][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 694.287295][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 694.436992][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 694.445819][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 694.724673][T19076] device pim6reg1 entered promiscuous mode [ 695.355990][T10382] device bridge_slave_1 left promiscuous mode [ 695.362191][T10382] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.370052][T10382] device bridge_slave_0 left promiscuous mode [ 695.376201][T10382] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.384678][T10382] device veth1_macvtap left promiscuous mode [ 695.390786][T10382] device veth0_vlan left promiscuous mode [ 697.027854][T19108] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.077367][T19108] bridge0: port 1(bridge_slave_0) entered disabled state [ 697.084973][T19108] device bridge_slave_0 entered promiscuous mode [ 697.102674][T19108] bridge0: port 2(bridge_slave_1) entered blocking state [ 697.140491][T19108] bridge0: port 2(bridge_slave_1) entered disabled state [ 697.187527][T19108] device bridge_slave_1 entered promiscuous mode [ 697.772988][T19108] bridge0: port 2(bridge_slave_1) entered blocking state [ 697.780190][T19108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 697.787515][T19108] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.794574][T19108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 697.898300][T10382] bridge0: port 1(bridge_slave_0) entered disabled state [ 697.911104][T10382] bridge0: port 2(bridge_slave_1) entered disabled state [ 697.959185][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 697.995328][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 698.029705][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 698.047430][T10382] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.054504][T10382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 698.071454][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 698.087502][T10382] bridge0: port 2(bridge_slave_1) entered blocking state [ 698.094769][T10382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 698.182672][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 698.207799][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 698.226104][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 698.237328][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 698.262884][T19108] device veth0_vlan entered promiscuous mode [ 698.404262][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 698.420386][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 698.472374][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 698.507266][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 698.516126][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 698.523824][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 698.669510][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 698.678209][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 698.695536][T19108] device veth1_macvtap entered promiscuous mode [ 698.785447][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 698.807262][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 698.844066][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 699.009725][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 699.033681][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 699.191598][T19206] device macsec0 entered promiscuous mode [ 700.057371][T10390] device bridge_slave_1 left promiscuous mode [ 700.063502][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.071021][T10390] device bridge_slave_0 left promiscuous mode [ 700.077645][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.085371][T10390] device veth1_macvtap left promiscuous mode [ 700.091595][T10390] device veth0_vlan left promiscuous mode [ 701.428559][T19230] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.435725][T19230] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.443678][T19230] device bridge_slave_0 entered promiscuous mode [ 701.470941][T19244] device pim6reg1 entered promiscuous mode [ 701.507898][T19230] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.515048][T19230] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.545197][T19230] device bridge_slave_1 entered promiscuous mode [ 702.345185][T19230] bridge0: port 2(bridge_slave_1) entered blocking state [ 702.352409][T19230] bridge0: port 2(bridge_slave_1) entered forwarding state [ 702.359790][T19230] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.366852][T19230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 702.444635][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.458450][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 702.477628][T19268] tap0: tun_chr_ioctl cmd 1074025677 [ 702.483022][T19268] tap0: linktype set to 804 [ 702.516364][T19256] tap0: tun_chr_ioctl cmd 1074025675 [ 702.522006][T19256] tap0: persist disabled [ 702.613460][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 702.631265][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 702.777892][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 702.820055][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 702.847902][T10953] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.854998][T10953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 702.882893][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 702.915503][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 702.977799][T10953] bridge0: port 2(bridge_slave_1) entered blocking state [ 702.984879][T10953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 703.007532][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 703.021664][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 703.094361][T19289] device wg2 entered promiscuous mode [ 703.136843][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 703.168104][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 703.239104][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 703.268658][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 703.339506][T19230] device veth0_vlan entered promiscuous mode [ 703.371667][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 703.387956][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 703.408475][T19308] device pim6reg1 entered promiscuous mode [ 703.444007][T19230] device veth1_macvtap entered promiscuous mode [ 703.451952][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 703.460000][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 703.468635][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 703.477350][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 703.485858][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 703.524795][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 703.546153][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 703.562603][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 703.573711][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 704.857695][T10390] device bridge_slave_1 left promiscuous mode [ 704.863839][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 704.871424][T10390] device bridge_slave_0 left promiscuous mode [ 704.877870][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.885645][T10390] device veth1_macvtap left promiscuous mode [ 704.892104][T10390] device veth0_vlan left promiscuous mode [ 705.575817][ T28] audit: type=1400 audit(1756845116.083:168): avc: denied { create } for pid=19329 comm="syz.9.6741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 706.045802][T19346] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.066476][T19346] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.092213][T19346] device bridge_slave_0 entered promiscuous mode [ 706.180403][T19346] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.218009][T19346] bridge0: port 2(bridge_slave_1) entered disabled state [ 706.225652][T19346] device bridge_slave_1 entered promiscuous mode [ 706.541178][T19368] FAULT_INJECTION: forcing a failure. [ 706.541178][T19368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 706.624301][T19368] CPU: 1 PID: 19368 Comm: syz.9.6753 Tainted: G W syzkaller #0 [ 706.633369][T19368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 706.643446][T19368] Call Trace: [ 706.646895][T19368] [ 706.649820][T19368] __dump_stack+0x21/0x24 [ 706.654159][T19368] dump_stack_lvl+0xee/0x150 [ 706.659060][T19368] ? __cfi_dump_stack_lvl+0x8/0x8 [ 706.664085][T19368] dump_stack+0x15/0x24 [ 706.668238][T19368] should_fail_ex+0x3d4/0x520 [ 706.672941][T19368] should_fail+0xb/0x10 [ 706.677114][T19368] should_fail_usercopy+0x1a/0x20 [ 706.682169][T19368] _copy_to_user+0x1e/0x90 [ 706.686680][T19368] generic_map_lookup_batch+0x730/0xa90 [ 706.692585][T19368] ? irqentry_exit+0x37/0x40 [ 706.697189][T19368] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 706.703430][T19368] ? __cfi_generic_map_lookup_batch+0x10/0x10 [ 706.709500][T19368] bpf_map_do_batch+0x2e8/0x620 [ 706.714346][T19368] ? security_bpf+0x93/0xb0 [ 706.718853][T19368] __sys_bpf+0x624/0x780 [ 706.723094][T19368] ? bpf_link_show_fdinfo+0x320/0x320 [ 706.728479][T19368] ? __cfi_ksys_write+0x10/0x10 [ 706.733363][T19368] ? debug_smp_processor_id+0x17/0x20 [ 706.738734][T19368] __x64_sys_bpf+0x7c/0x90 [ 706.743511][T19368] x64_sys_call+0x488/0x9a0 [ 706.748020][T19368] do_syscall_64+0x4c/0xa0 [ 706.752433][T19368] ? clear_bhb_loop+0x30/0x80 [ 706.757110][T19368] ? clear_bhb_loop+0x30/0x80 [ 706.761874][T19368] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 706.767769][T19368] RIP: 0033:0x7f552898ebe9 [ 706.772180][T19368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 706.791791][T19368] RSP: 002b:00007f552982d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 706.800233][T19368] RAX: ffffffffffffffda RBX: 00007f5528bc5fa0 RCX: 00007f552898ebe9 [ 706.808214][T19368] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 706.816206][T19368] RBP: 00007f552982d090 R08: 0000000000000000 R09: 0000000000000000 [ 706.824283][T19368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 706.832445][T19368] R13: 00007f5528bc6038 R14: 00007f5528bc5fa0 R15: 00007ffc1d8e97e8 [ 706.840511][T19368] [ 706.926416][T19382] FAULT_INJECTION: forcing a failure. [ 706.926416][T19382] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 706.977689][T19382] CPU: 0 PID: 19382 Comm: syz.0.6758 Tainted: G W syzkaller #0 [ 706.986677][T19382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 706.996757][T19382] Call Trace: [ 707.000053][T19382] [ 707.003003][T19382] __dump_stack+0x21/0x24 [ 707.007349][T19382] dump_stack_lvl+0xee/0x150 [ 707.011960][T19382] ? __cfi_dump_stack_lvl+0x8/0x8 [ 707.017006][T19382] dump_stack+0x15/0x24 [ 707.021176][T19382] should_fail_ex+0x3d4/0x520 [ 707.026042][T19382] should_fail_alloc_page+0x61/0x90 [ 707.031267][T19382] prepare_alloc_pages+0x148/0x5f0 [ 707.036404][T19382] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 707.041613][T19382] ? __vmalloc_node_range+0x326/0x13d0 [ 707.047078][T19382] ? dev_map_create_hash+0x26/0x1c0 [ 707.052317][T19382] ? dev_map_alloc+0x2af/0x540 [ 707.057088][T19382] ? map_create+0x49c/0xd80 [ 707.061619][T19382] __alloc_pages+0x124/0x450 [ 707.066226][T19382] ? __cfi___alloc_pages+0x10/0x10 [ 707.071347][T19382] ? __cfi__raw_spin_lock+0x10/0x10 [ 707.076563][T19382] __get_free_pages+0xe/0x30 [ 707.081260][T19382] kasan_populate_vmalloc_pte+0x29/0x120 [ 707.086996][T19382] __apply_to_page_range+0x8c1/0xc00 [ 707.092388][T19382] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 707.098643][T19382] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 707.104912][T19382] apply_to_page_range+0x3b/0x50 [ 707.110038][T19382] kasan_populate_vmalloc+0x60/0x70 [ 707.115265][T19382] alloc_vmap_area+0x173e/0x1870 [ 707.120227][T19382] ? vm_map_ram+0x930/0x930 [ 707.124838][T19382] ? __kasan_kmalloc+0x95/0xb0 [ 707.129619][T19382] ? kmalloc_node_trace+0x3d/0xb0 [ 707.134776][T19382] __get_vm_area_node+0x160/0x360 [ 707.139825][T19382] ? __kmalloc_node+0xb2/0x1e0 [ 707.144708][T19382] __vmalloc_node_range+0x326/0x13d0 [ 707.150098][T19382] ? dev_map_create_hash+0x26/0x1c0 [ 707.155411][T19382] ? __cfi___vmalloc_node_range+0x10/0x10 [ 707.161143][T19382] ? bpf_map_area_alloc+0x4b/0xe0 [ 707.166363][T19382] ? kasan_save_alloc_info+0x25/0x30 [ 707.171750][T19382] bpf_map_area_alloc+0xd7/0xe0 [ 707.176825][T19382] ? dev_map_create_hash+0x26/0x1c0 [ 707.182049][T19382] dev_map_create_hash+0x26/0x1c0 [ 707.187095][T19382] dev_map_alloc+0x2af/0x540 [ 707.191709][T19382] map_create+0x49c/0xd80 [ 707.196581][T19382] __sys_bpf+0x30b/0x780 [ 707.200830][T19382] ? bpf_link_show_fdinfo+0x320/0x320 [ 707.206210][T19382] ? __cfi_ksys_write+0x10/0x10 [ 707.211083][T19382] ? debug_smp_processor_id+0x17/0x20 [ 707.216566][T19382] __x64_sys_bpf+0x7c/0x90 [ 707.221017][T19382] x64_sys_call+0x488/0x9a0 [ 707.225575][T19382] do_syscall_64+0x4c/0xa0 [ 707.230006][T19382] ? clear_bhb_loop+0x30/0x80 [ 707.234700][T19382] ? clear_bhb_loop+0x30/0x80 [ 707.239581][T19382] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 707.245535][T19382] RIP: 0033:0x7fe3c5f8ebe9 [ 707.250054][T19382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 707.269759][T19382] RSP: 002b:00007fe3c6e58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 707.278306][T19382] RAX: ffffffffffffffda RBX: 00007fe3c61c5fa0 RCX: 00007fe3c5f8ebe9 [ 707.286481][T19382] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 707.294551][T19382] RBP: 00007fe3c6e58090 R08: 0000000000000000 R09: 0000000000000000 [ 707.302625][T19382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 707.310625][T19382] R13: 00007fe3c61c6038 R14: 00007fe3c61c5fa0 R15: 00007ffcb9592338 [ 707.318615][T19382] [ 707.371375][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 707.392065][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 707.456698][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 707.475732][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 707.502445][T10928] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.509654][T10928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 707.570259][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 707.680439][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 707.713725][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 707.769476][T10928] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.776693][T10928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 707.826539][T19410] device sit0 entered promiscuous mode [ 708.030329][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 708.044778][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 708.084151][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 708.123020][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 708.164953][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 708.198160][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 708.226471][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 708.249236][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 708.268688][T19346] device veth0_vlan entered promiscuous mode [ 708.437074][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 708.454196][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 708.495341][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 708.517608][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 708.546743][T19346] device veth1_macvtap entered promiscuous mode [ 708.597312][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 708.622263][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 708.630862][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 708.639626][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 708.649944][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 710.037913][T10390] device bridge_slave_1 left promiscuous mode [ 710.044040][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 710.051525][T10390] device bridge_slave_0 left promiscuous mode [ 710.057910][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.065628][T10390] device veth1_macvtap left promiscuous mode [ 710.071706][T10390] device veth0_vlan left promiscuous mode [ 710.827911][T19475] device macsec0 left promiscuous mode [ 710.861671][T19475] device veth1_macvtap entered promiscuous mode [ 710.887376][T19475] device macsec0 entered promiscuous mode [ 710.918769][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 711.035747][T19481] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.051659][T19481] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.076758][T19481] device bridge_slave_0 entered promiscuous mode [ 711.091836][T19481] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.118986][T19481] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.160565][T19481] device bridge_slave_1 entered promiscuous mode [ 711.476520][T19481] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.483744][T19481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 711.491178][T19481] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.498355][T19481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 711.671060][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 711.698796][ T690] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.740652][ T690] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.857881][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 711.884816][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 711.921994][ T690] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.929196][ T690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 711.992080][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 712.029242][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 712.144342][ T690] bridge0: port 2(bridge_slave_1) entered blocking state [ 712.151447][ T690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 712.182352][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 712.190917][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 712.212715][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 712.230951][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 712.273543][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 712.295486][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 712.303827][ T28] audit: type=1400 audit(1756845122.803:169): avc: denied { create } for pid=19519 comm="syz.9.6802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 712.329991][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 712.338170][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 712.590235][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 712.599125][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 712.617706][T19481] device veth0_vlan entered promiscuous mode [ 712.632000][T19481] device veth1_macvtap entered promiscuous mode [ 712.644420][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 712.658167][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 712.679840][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 712.700681][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 712.717655][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 712.747175][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 712.765159][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 713.567801][T10390] device bridge_slave_1 left promiscuous mode [ 713.574013][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 713.581860][T10390] device bridge_slave_0 left promiscuous mode [ 713.588113][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 713.595921][T10390] device veth1_macvtap left promiscuous mode [ 713.601999][T10390] device veth0_vlan left promiscuous mode [ 715.064135][T19556] FAULT_INJECTION: forcing a failure. [ 715.064135][T19556] name failslab, interval 1, probability 0, space 0, times 0 [ 715.097155][T19556] CPU: 0 PID: 19556 Comm: syz.9.6813 Tainted: G W syzkaller #0 [ 715.106147][T19556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 715.116223][T19556] Call Trace: [ 715.119530][T19556] [ 715.122562][T19556] __dump_stack+0x21/0x24 [ 715.127083][T19556] dump_stack_lvl+0xee/0x150 [ 715.131956][T19556] ? __cfi_dump_stack_lvl+0x8/0x8 [ 715.137178][T19556] dump_stack+0x15/0x24 [ 715.141389][T19556] should_fail_ex+0x3d4/0x520 [ 715.146123][T19556] ? __kernfs_new_node+0xdb/0x680 [ 715.151251][T19556] __should_failslab+0xac/0xf0 [ 715.156140][T19556] should_failslab+0x9/0x20 [ 715.160695][T19556] kmem_cache_alloc+0x3b/0x330 [ 715.165477][T19556] __kernfs_new_node+0xdb/0x680 [ 715.170403][T19556] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 715.176688][T19556] ? make_kgid+0x1aa/0x640 [ 715.181118][T19556] ? kernfs_new_node+0x260/0x260 [ 715.186167][T19556] ? __cfi_make_kgid+0x10/0x10 [ 715.190951][T19556] ? stack_trace_save+0x98/0xe0 [ 715.195822][T19556] ? net_ns_get_ownership+0xf8/0x180 [ 715.201135][T19556] kernfs_new_node+0x150/0x260 [ 715.206183][T19556] kernfs_create_dir_ns+0x47/0x130 [ 715.211453][T19556] sysfs_create_dir_ns+0x11c/0x280 [ 715.216673][T19556] ? __x64_sys_ioctl+0x7b/0x90 [ 715.221478][T19556] ? __cfi_sysfs_create_dir_ns+0x10/0x10 [ 715.227163][T19556] ? _raw_spin_lock+0x8e/0xe0 [ 715.231864][T19556] ? net_namespace+0xd/0x40 [ 715.236387][T19556] kobject_add_internal+0x6fc/0xc20 [ 715.241601][T19556] kobject_add+0x154/0x210 [ 715.246116][T19556] ? mutex_unlock+0x89/0x220 [ 715.250719][T19556] ? __cfi_kobject_add+0x10/0x10 [ 715.255684][T19556] ? __kasan_check_write+0x14/0x20 [ 715.260816][T19556] ? get_device_parent+0x2a1/0x410 [ 715.265952][T19556] device_add+0x3c1/0xef0 [ 715.270302][T19556] netdev_register_kobject+0x179/0x320 [ 715.275790][T19556] ? raw_notifier_call_chain+0xfa/0x110 [ 715.281388][T19556] register_netdevice+0xe3d/0x14a0 [ 715.286782][T19556] ? kvmalloc_node+0x294/0x480 [ 715.291576][T19556] ? __cfi_register_netdevice+0x10/0x10 [ 715.297135][T19556] ? memset+0x35/0x40 [ 715.301133][T19556] ? memcpy+0x56/0x70 [ 715.305127][T19556] ip6_tnl_create2+0xc2/0x3d0 [ 715.309821][T19556] ip6_tnl_locate+0x675/0x790 [ 715.314518][T19556] ? cap_capable+0x1aa/0x230 [ 715.319124][T19556] ? ip6_tnl_link_config+0xa00/0xa00 [ 715.324425][T19556] ? memcpy+0x56/0x70 [ 715.328414][T19556] ip6_tnl_siocdevprivate+0x696/0xe30 [ 715.333804][T19556] ? __cfi_ip6_tnl_siocdevprivate+0x10/0x10 [ 715.339716][T19556] ? full_name_hash+0x9d/0xf0 [ 715.344402][T19556] dev_ifsioc+0xbc4/0xed0 [ 715.348748][T19556] ? ioctl_has_perm+0x391/0x4c0 [ 715.353615][T19556] ? dev_ioctl+0xd10/0xd10 [ 715.358041][T19556] ? __kasan_check_write+0x14/0x20 [ 715.363181][T19556] ? mutex_lock+0x8d/0x1a0 [ 715.367609][T19556] ? __cfi_mutex_lock+0x10/0x10 [ 715.372646][T19556] ? dev_get_by_name_rcu+0xe5/0x130 [ 715.377876][T19556] dev_ioctl+0x5f3/0xd10 [ 715.382226][T19556] sock_ioctl+0x675/0x6e0 [ 715.386569][T19556] ? __cfi_sock_ioctl+0x10/0x10 [ 715.391526][T19556] ? security_file_ioctl+0x95/0xc0 [ 715.396746][T19556] ? __cfi_sock_ioctl+0x10/0x10 [ 715.401612][T19556] __se_sys_ioctl+0x12f/0x1b0 [ 715.406410][T19556] __x64_sys_ioctl+0x7b/0x90 [ 715.411011][T19556] x64_sys_call+0x58b/0x9a0 [ 715.415527][T19556] do_syscall_64+0x4c/0xa0 [ 715.420038][T19556] ? clear_bhb_loop+0x30/0x80 [ 715.424732][T19556] ? clear_bhb_loop+0x30/0x80 [ 715.429421][T19556] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 715.435422][T19556] RIP: 0033:0x7f552898ebe9 [ 715.439863][T19556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 715.459745][T19556] RSP: 002b:00007f552982d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 715.468182][T19556] RAX: ffffffffffffffda RBX: 00007f5528bc5fa0 RCX: 00007f552898ebe9 [ 715.476261][T19556] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 715.484334][T19556] RBP: 00007f552982d090 R08: 0000000000000000 R09: 0000000000000000 [ 715.492321][T19556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 715.500379][T19556] R13: 00007f5528bc6038 R14: 00007f5528bc5fa0 R15: 00007ffc1d8e97e8 [ 715.508557][T19556] [ 715.562297][T19556] kobject_add_internal failed for ip6tnl2 (error: -12 parent: net) [ 715.707543][ T28] audit: type=1400 audit(1756845126.213:170): avc: denied { create } for pid=19568 comm="syz.7.6818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 715.766244][T19561] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.779322][T19561] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.800646][T19561] device bridge_slave_0 entered promiscuous mode [ 715.836172][T19561] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.847046][T19561] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.854766][T19561] device bridge_slave_1 entered promiscuous mode [ 716.386655][T19561] bridge0: port 2(bridge_slave_1) entered blocking state [ 716.393760][T19561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 716.401085][T19561] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.408141][T19561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 716.717810][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.727515][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 716.818366][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 716.837610][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 716.896942][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 716.933837][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 716.967172][T10390] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.974359][T10390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 717.025266][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 717.047966][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 717.076994][T10390] bridge0: port 2(bridge_slave_1) entered blocking state [ 717.084064][T10390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 717.137054][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 717.157125][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 717.197122][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 717.227135][T10390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 717.289452][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 717.305796][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 717.362588][T19561] device veth0_vlan entered promiscuous mode [ 717.374632][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 717.400113][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 717.435826][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 717.463463][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 717.513188][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 717.537340][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 717.573183][T19561] device veth1_macvtap entered promiscuous mode [ 717.616120][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 717.629705][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 717.661024][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 717.724633][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 717.734389][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 718.126436][T19642] device pim6reg1 entered promiscuous mode [ 719.027528][T10390] device bridge_slave_1 left promiscuous mode [ 719.033660][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.041170][T10390] device bridge_slave_0 left promiscuous mode [ 719.047395][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.055130][T10390] device veth1_macvtap left promiscuous mode [ 719.061206][T10390] device veth0_vlan left promiscuous mode [ 720.472537][T19658] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.526817][T19658] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.577499][T19658] device bridge_slave_0 entered promiscuous mode [ 720.644885][T19658] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.690862][T19658] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.738946][T19658] device bridge_slave_1 entered promiscuous mode [ 721.176984][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 721.205187][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 721.248321][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 721.257082][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 721.265865][ T690] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.272949][ T690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.282166][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 721.290779][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 721.299220][ T690] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.306294][ T690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.334729][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 721.365960][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 721.392751][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 721.461434][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 721.505887][T19658] device veth0_vlan entered promiscuous mode [ 721.528020][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 721.540487][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 721.562751][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 721.621673][T19658] device veth1_macvtap entered promiscuous mode [ 721.658851][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 721.763964][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 721.777190][T10928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 722.337418][T10928] device bridge_slave_1 left promiscuous mode [ 722.343640][T10928] bridge0: port 2(bridge_slave_1) entered disabled state [ 722.351222][T10928] device bridge_slave_0 left promiscuous mode [ 722.358033][T10928] bridge0: port 1(bridge_slave_0) entered disabled state [ 722.365867][T10928] device veth1_macvtap left promiscuous mode [ 722.371982][T10928] device veth0_vlan left promiscuous mode [ 724.328907][T19746] device sit0 left promiscuous mode [ 724.644755][T19743] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.652537][T19743] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.660417][T19743] device bridge_slave_0 entered promiscuous mode [ 724.687058][T19743] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.694311][T19743] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.710687][T19743] device bridge_slave_1 entered promiscuous mode [ 725.029771][T19743] bridge0: port 2(bridge_slave_1) entered blocking state [ 725.036842][T19743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 725.044156][T19743] bridge0: port 1(bridge_slave_0) entered blocking state [ 725.051221][T19743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 725.117527][T10382] bridge0: port 1(bridge_slave_0) entered disabled state [ 725.138537][T10382] bridge0: port 2(bridge_slave_1) entered disabled state [ 725.157599][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 725.175167][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 725.215030][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 725.243962][T10953] bridge0: port 1(bridge_slave_0) entered blocking state [ 725.251077][T10953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 725.277029][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 725.285557][T10953] bridge0: port 2(bridge_slave_1) entered blocking state [ 725.292673][T10953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 725.365939][T19811] FAULT_INJECTION: forcing a failure. [ 725.365939][T19811] name failslab, interval 1, probability 0, space 0, times 0 [ 725.413559][T19811] CPU: 0 PID: 19811 Comm: syz.9.6895 Tainted: G W syzkaller #0 [ 725.422649][T19811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 725.432718][T19811] Call Trace: [ 725.436003][T19811] [ 725.438945][T19811] __dump_stack+0x21/0x24 [ 725.443290][T19811] dump_stack_lvl+0xee/0x150 [ 725.447898][T19811] ? __cfi_dump_stack_lvl+0x8/0x8 [ 725.452950][T19811] dump_stack+0x15/0x24 [ 725.457118][T19811] should_fail_ex+0x3d4/0x520 [ 725.461822][T19811] ? vm_area_dup+0x27/0x280 [ 725.466333][T19811] __should_failslab+0xac/0xf0 [ 725.471107][T19811] should_failslab+0x9/0x20 [ 725.475622][T19811] kmem_cache_alloc+0x3b/0x330 [ 725.480486][T19811] vm_area_dup+0x27/0x280 [ 725.484831][T19811] ? copy_mm+0xac8/0x1a10 [ 725.489182][T19811] copy_mm+0xb45/0x1a10 [ 725.493355][T19811] ? copy_signal+0x630/0x630 [ 725.497961][T19811] ? _raw_spin_lock+0x8e/0xe0 [ 725.502653][T19811] ? __cfi__raw_spin_lock+0x10/0x10 [ 725.507869][T19811] ? __init_rwsem+0x12c/0x240 [ 725.512577][T19811] ? copy_signal+0x4ea/0x630 [ 725.517231][T19811] copy_process+0x12b4/0x3480 [ 725.522117][T19811] ? idle_dummy+0x10/0x10 [ 725.526471][T19811] kernel_clone+0x23a/0x810 [ 725.530990][T19811] ? __cfi_kernel_clone+0x10/0x10 [ 725.536028][T19811] ? __kasan_check_write+0x14/0x20 [ 725.541160][T19811] ? mutex_unlock+0x89/0x220 [ 725.545795][T19811] __x64_sys_clone+0x168/0x1b0 [ 725.550574][T19811] ? __cfi___x64_sys_clone+0x10/0x10 [ 725.555893][T19811] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 725.561981][T19811] x64_sys_call+0x990/0x9a0 [ 725.566513][T19811] do_syscall_64+0x4c/0xa0 [ 725.570945][T19811] ? clear_bhb_loop+0x30/0x80 [ 725.575637][T19811] ? clear_bhb_loop+0x30/0x80 [ 725.580329][T19811] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 725.586336][T19811] RIP: 0033:0x7f552898ebe9 [ 725.590762][T19811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 725.610553][T19811] RSP: 002b:00007f552982cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 725.619004][T19811] RAX: ffffffffffffffda RBX: 00007f5528bc5fa0 RCX: 00007f552898ebe9 [ 725.626985][T19811] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 725.635052][T19811] RBP: 00007f552982d090 R08: 0000000000000000 R09: 0000000000000000 [ 725.643076][T19811] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 725.651271][T19811] R13: 00007f5528bc6038 R14: 00007f5528bc5fa0 R15: 00007ffc1d8e97e8 [ 725.659269][T19811] [ 725.677154][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 725.696403][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 725.794964][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 725.805369][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 725.850131][T19743] device veth0_vlan entered promiscuous mode [ 725.862843][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 725.874947][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 725.929380][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 725.941337][T10953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 725.979164][T19743] device veth1_macvtap entered promiscuous mode [ 725.997807][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 726.009475][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 726.027688][T10382] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 726.051261][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 726.069808][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 726.107288][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 726.115755][ T690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=8 req=6210 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 726.391022][ T28] audit: type=1400 audit(1756845136.903:171): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14507]" dev="pipefs" ino=14507 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 727.340936][T10390] device erspan0 left promiscuous mode [ 727.346415][T10390] syzkaller: port 1(erspan0) entered disabled state [ 727.559052][T10390] device veth0 left promiscuous mode [ 727.564414][T10390] kfree: port 1(veth0) entered disabled state [ 727.571271][T10390] device bridge_slave_1 left promiscuous mode [ 727.578060][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 727.585928][T10390] device bridge_slave_0 left promiscuous mode [ 727.592263][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.600371][T10390] device bridge_slave_1 left promiscuous mode [ 727.606493][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 727.614193][T10390] device bridge_slave_0 left promiscuous mode [ 727.620412][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.629053][T10390] device veth1_macvtap left promiscuous mode [ 727.635544][T10390] device veth1_macvtap left promiscuous mode [ 727.642376][T10390] device veth1_macvtap left promiscuous mode [ 727.648614][T10390] device veth0_vlan left promiscuous mode